AIX stand-alone: Add an LDAP user registry without SSL
Add an LDAP user registry to the default federated repository to store user account information for authorization. We can add multiple LDAP user registries to the default federated repository although we can only add one LDAP server at a time.The flat-naming convention is...
cn=groupName
...the hierarchical format is...
cn=groupName,o=root
Ensure IDs are unique between the default federated repository and the LDAP we are adding. For example, if the default federated repository contains an ID such as wpsadmin, this ID cannot exist in the LDAP we are adding.
In a clustered environment, start the dmgr and nodeagent and verify they are able to synchronize.
Use the helper file...
WP_PROFILE/ConfigEngine/config/helpers/wp_add_federated_xxx.properties
Add an LDAP user registry to the default federated repository
Repeat these steps for each additional LDAP user registry to add:
- Run backupConfig
- Edit wkplc.properties
- Set parameters under the VMM Federated LDAP Properties heading:
federated.ldap.id
federated.ldap.host
federated.ldap.port
federated.ldap.bindDN
federated.ldap.bindPassword
federated.ldap.ldapServerType
federated.ldap.baseDN
- Set entity types parameters...
- Set group member parameters...
federated.ldap.gm.groupMemberName
federated.ldap.gm.objectClass
federated.ldap.gm.scope
federated.ldap.gm.dummyMember
- Save changes to wkplc.properties.
- Validate the LDAP server settings...
./ConfigEngine.sh validate-federated-ldap -DWasPassword=foo
In an environment configured with an LDAP with SSL, during the validation task, you will be prompted to add a signer to the truststore.
For example...
Add signer to the truststore now?
If you do, press y then Enter.
- To add an LDAP user registry to the default federated repository...
./ConfigEngine.sh wp-create-ldap -DWasPassword=foo
Users who are not in an LDAP do not have awareness and cannot see if other users are online. This can happen if you install WebSphere Portal and then enable a Federated LDAP or Federated database user repository that does not contain that user. Also, users who sign up using the Self Care portlet do not have awareness.
- Stop and restart servers, dmgrs, and node agents.
- To create additional base entries within the LDAP user registry; repeat these steps for each base entry :
- Edit wkplc.properties
- To create additional base entries within the LDAP user registry to use when creating realms, set parameters.
- Save changes to wkplc.properties.
- To create a base entry in a repository...
./ConfigEngine.sh wp-create-base-entry -DWasPassword=foo
- Stop and restart all necessary servers to propagate the changes.
- List the names and types of configured repositories...
./ConfigEngine.sh wp-query-repository
- To check that all defined attributes are available in the configured LDAP user registry...
./ConfigEngine.sh wp-validate-federated-ldap-attribute-config
See Adapting the attribute configuration
- To update the user registry where new users and groups are stored:
If we are using multiple LDAP user registries and/or a database user registry, only run this task for the user registry to define as the default user registry where new users and groups are stored.
- Edit wkplc.properties
- Set the following required parameters under the VMM supported entity types configuration heading:
The parameters groupParent and personAccountParent must be set to the same value.
For example:
- personAccountParent=dc=myco,dc=com
- groupParent=dc=myco,dc=com
- Save changes to wkplc.properties.
- To delete the old attributes before adding the new attributes...
./ConfigEngine.sh wp-set-entitytypes -DWasPassword=foo
- Stop and restart all necessary servers to propagate the changes.
To enable the full distinguished name login if the short names are not unique for the realm:
Run this task if the administrator name is in conflict with another user name in the attached repository. This command allows the Administrator to log in using the fully distinguished name instead of the short name.
- Edit wkplc.properties
- Enter a value for realmName or leave blank to update the default realm.
- Save changes to wkplc.properties.
- To enable the distinguished name login...
./ConfigEngine.sh wp-modify-realm-enable-dn-login -DWasPassword=foo
To disable this feature...
./ConfigEngine.sh wp-modify-realm-disable-dn-login -DWasPassword=foo
- Stop and restart all necessary servers to propagate the changes.
- Optional: Update the member names used by WCM with the corresponding members in the LDAP directory.
This step is only needed if you have installed the portal with WCM and intend to use the Intranet and Internet Site Templates that were optionally installed with the product by running configure-express.
- Edit...
WP_PROFILE/PortalServer/wcm/shared/app/config/wcmservices/MemberFixerModule.properties
- Add the following lines to the file:
uid=wpsadmin,o=defaultWIMFileBasedRealm -> portal_admin_DN
cn=contentauthors,o=defaultWIMFileBasedRealm -> content_authors_group_DNThe MemberFixerModule.properties file already contains lines for xyzadmin. We can ignore this line.
- Save the changes and close the file.
- Run...
./ConfigEngine.sh run-wcm-admin-task-member-fixer -DallLibraries=true -Dfix=true -DaltDn=update -DmismatchedId=update -DinvalidDn=update -DnoRealmDn=true -DPortalAdminPwd=wpsadmin
LDAP Value Standalone realm_name should match the value for standalone.ldap.realm in wkplc.properties. Federated realm_name should match the value for federated.realm in wkplc.properties. If value is empty, use defaultWIMFileBasedRealm.
- Optional: Assign access to the Web content libraries.
- Log in as a portal administrator and navigate to...
Administration | Portal Content | Web Content Libraries | web_library | Set permissions
- Click the Edit Role icon for Editor.
- Add the group specified for content_authors_group_DN as an Editor for the Intranet and Internet libraries.
- Click Apply then Done.
- If you have created any additional WCM libraries, run the Web content member fixer task to update the member names used by the libraries.
- Optional. Replace the WAS and portal administrator user and group IDs with users and groups that exist in the LDAP user registry.
Before starting...
- Review Special characters in user ID and passwords located under Planning for WebSphere Portal.
- Ensure the new user ID of the WAS administrator is not identical to the one that we are replacing.
This step is required in a production environment.
If you run these tasks after you create the cluster, run them on all nodes in the cluster.
- Run...
./ConfigEngine.sh wp-change-was-admin-user -DWasUser=adminid -DWasPassword=foo -DnewAdminId=newadminid -DnewAdminPw=newpassword
Provide the full DN for the newAdminId parameter.
- Verify the task completed successfully. Stop and restart all required servers.
- Run...
./ConfigEngine.sh wp-change-portal-admin-user -DWasPassword=foo -DnewAdminId=newadminid -DnewAdminPw=newpassword -DnewAdminGroupId=newadmingroupid
Provide the full DN for the newAdminId and newAdminGroupId parameters.
This task verifies the user against a running server instance. If the server is stopped, to skip the validation...
-Dskip.ldap.validation=true
- Update the SearchAdminUser alias to match the WebSphere Portal administrator information.
- Verify the task completed successfully. Stop and restart all required servers.
- This step is required in a production environment. Remove the file system repository if you do not use it. The federated file system user repository that was the default security setting might not be required after federating the user repository. If the file system repository is no longer needed, removing it can help prevent conflicts created by duplicate user identities existing in multiple repositories.
See the following topic under Related for instructions: Delete the repository, which is listed with the appropriate operating system.
Parent: AIX stand-alone: Configure a default federated user registry
Related:
Adapting the attribute configuration
Start and stop servers, dmgrs, and node agents
Related:
Delete the repository on AIX