You must modify the authentication configuration file to enable the LDAP
directory server that you are using.
The aurora_auth.config file
contains three authentication modules:
-
Openpages - the default internal user directory
-
OpenpagesIP - a sample LDAP configuration for the Sun One
Directory Server
-
OpenpagesAD - a sample LDAP configuration for the Microsoft Active Directory Server
The only module that the IBM OpenPages® system pays attention to is the module that
is named Openpages. Therefore, you need to make a backup of the
Openpages module, rename the OpenpagesIP or
OpenpagesAD to Openpages, and then change the settings to reflect
the settings of your LDAP server.
Procedure
-
Stop all OpenPages services.
-
Open and edit the
<OP_HOME>/aurora/conf/aurora_auth.config file in a
text editor.
Where:
<OP_HOME>
is the installation location
of the OpenPages application.
-
Find the
Openpages module and change its name to
OpenpagesDefault.
-
Modify either the
OpenpagesIP or OpenpagesAD module name to
Openpages.
- If you are using a Microsoft Active Directory server,
change the name of the
OpenpagesAD module to Openpages.
- If you are using a Sun One Directory Server, change the name of the
OpenpagesIP
module to Openpages.
- If you are using a different LDAP server, you can use either of these modules. Choose a module
to use as a template and change its name to Openpages.
-
Specify the correct values for the following properties in the module that you named
Openpages:
- provider.url
- Change the value to the hostname and port number for the LDAP authentication server. For LDAP
over TLS (LDAPS), the protocol is
ldaps and the port is the LDAPS port number (by
default, 636).
- base.dn
- The top level of the LDAP directory tree structure (Domain Name) on the LDAP server. If the
users to be authenticated are located in multiple locations within your Active Directory structure,
list all of the locations explicitly by using the distinguished names of the locations, each
separated by a semi-colon.
For
example:
base.dn="DC=LDAPTesting,DC=local;CN=Users,DC=LDAPTesting,DC=local;
OU=Auditors,OU=External Auditors,OU=Staff,DC=LDAPTesting,DC=local"
- user.attr.id
- The attribute name of the user identifier (for example,
uid,
cn, etc.).
- Additional custom parameters
- You can add additional custom parameters that are supported by the Java™ Naming and Directory Interface (JNDI). Precede a JNDI property with the
ctx.env. prefix. For example, if you want to use the JNDI property
com.sun.jndi.ldap.connect.timeout, use
ctx.env.com.sun.jndi.ldap.connect.timeout="<value>" in the
aurora_auth.config file.
For information about JNDI properties, see the
Java SE
documentation.
For
example:
Openpages
{
com.openpages.aurora.service.security.namespace.LDAPLoginModule
required debug=false
provider.url="ldaps://myserver.company.com:636"
security.authentication="simple"
security.search.user.dn="cn=Directory Manager"
security.search.user.credentials="openpages"
base.dn="ou=people,o=IBM,c=US"
user.attr.id="uid"
;
};
-
When you are finished editing the file,
save your changes and exit.
-
Import the root certificate and any intermediate signer certificates for your LDAP server to
the truststore on the OpenPages application
servers.
-
Restart all services.
Results
You have configured the OpenPages system to use an external LDAP user authentication server over
TLS.