Solaris stand-alone: Mapping attributes
First, install and configure your LDAP user registry and query the defined attributes. Then, map the attributes so they match the configured LDAP servers and your business needs.
About this task
Procedure
- Use a text editor to open the wkplc.properties file, in the wp_profile_root/ConfigEngine/properties directory.
- Enter a value for one of the following
sets of parameters in the wkplc.properties file
to identify your LDAP server: Note: Make sure you use the same values that you used to configure your LDAP server.
Table 1. Identifying your LDAP server in the wkplc.properties file. Repository type Parameters Stand-alone The following parameters are found in the LDAP attribute configuration heading: Note: See the properties file for specific information about the advanced parameters.- standalone.ldap.id
- standalone.ldap.host
- standalone.ldap.port
- standalone.ldap.sslEnabled
- standalone.ldap.bindDN
- standalone.ldap.bindPassword
- standalone.ldap.baseDN
Federated The following parameters are found in the VMM Federated repository properties heading: Note: See the properties file for specific information about the advanced parameters.- federated.ldap.id
- federated.ldap.host
- federated.ldap.port
- federated.ldap.sslEnabled
- federated.ldap.bindDN
- federated.ldap.bindPassword
- federated.ldap.baseDN
- Run one of
the following tasks to check that all defined attributes are available
in the configured LDAP user registry:
Table 2. Task to check that all defined attributes are available in the configured LDAP user registry. Repository type Task Stand-alone ./ConfigEngine.sh wp-validate-standalone-ldap-attribute-config -DWasPassword=password task, from the wp_profile_root/ConfigEngine directory. Federated ./ConfigEngine.sh wp-validate-federated-ldap-attribute-config -DWasPassword=password task, from the wp_profile_root/ConfigEngine directory. - Open the ConfigTrace.log file,
in the wp_profile_root\ConfigEngine\log directory
to review the following output for the PersonAccount and Group entity
type:
- The following attributes are defined in WebSphere Portal but not in the LDAP server
- This list contains all attributes that are defined in WebSphere Portal but not available in the LDAP. Flag attributes that you do not plan to use in WebSphere Portal as unsupported. Map the attributes that you plan to use to the attributes that exist in the LDAP; you must also map the uid, cn, firstName, sn, preferredLanguage, and ibm-primaryEmail attributes if they are contained in the list.
- The following attributes are flagged as required in the LDAP server but not in WebSphere Portal
- This list contains all attributes that are defined as "must" in the LDAP server but not as required in WebSphere Portal. You must flag these attributes as required within WebSphere Portal; see the following step about flagging an attribute as either unsupported or required.
- The following attributes have a different type in WebSphere Portal and in the LDAP server
- This list contains all attributes that WebSphere Portal might ignore because the data type within WebSphere Portal and within the LDAP server does not match.
- Use a text editor to open the wkplc.properties file, in the wp_profile_root/ConfigEngine/properties directory.
- Enter a value for one of the following
sets of parameters in the wkplc.properties file
to correct any issues that are found in the configuration trace file:
Table 3. Parameters to define in the wkplc.properties file to correct any issues found in the configuration trace file. Repository type Parameters Stand-alone The following parameters are found in the LDAP attribute configuration heading: - standalone.ldap.id
- standalone.ldap.attributes.nonSupported
- standalone.ldap.attributes.nonSupported.delete
- standalone.ldap.attributes.mapping.ldapName
- standalone.ldap.attributes.mapping.portalName
- standalone.ldap.attributes.mapping.entityTypes
The following values flag certificate and members as unsupported attributes and maps ibm-primaryEmail to mail and ibm-jobTitle to title for the PersonAccount entityTypes:
If you want to map attributes for your groups instead of users, set the entityTypes to Group.standalone.ldap.attributes.nonSupported=certificate, members standalone.ldap.attributes.nonSupported.delete= standalone.ldap.attributes.mapping.ldapName=mail, title standalone.ldap.attributes.mapping.portalName=ibm-primaryEmail, ibm-jobTitle standalone.ldap.attributes.mapping.entityTypes=PersonAccountstandalone.ldap.attributes.mapping.entityTypes=GroupFederated The following parameters are found in the VMM Federated repository properties heading: - federated.ldap.attributes.nonSupported
- federated.ldap.attributes.nonSupported.delete
- federated.ldap.attributes.mapping.ldapName
- federated.ldap.attributes.mapping.portalName
- federated.ldap.attributes.mapping.entityTypes
The following values flag certificate and members as unsupported attributes and maps ibm-primaryEmail to mail and ibm-jobTitle to title for the PersonAccount entityTypes:
If you want to map attributes for your groups instead of users, set the entityTypes to Group.federated.ldap.attributes.nonSupported=certificate, members federated.ldap.attributes.nonSupported.delete= federated.ldap.attributes.mapping.ldapName=mail, title federated.ldap.attributes.mapping.portalName=ibm-primaryEmail, ibm-jobTitle federated.ldap.attributes.mapping.entityTypes=PersonAccountfederated.ldap.attributes.mapping.entityTypes=Group - Save your changes to the wkplc.properties file.
- Run one of the following
tasks to update the LDAP user registry configuration with the following
items:
- A list of unsupported attributes
- The mapping between WebSphere Portal and the LDAP user registry
Table 4. Task to update the LDAP user registry configuration with the list of unsupported attributes and the mapping between Portal and the LDAP user registry. Repository type Task Stand-alone ./ConfigEngine.sh wp-update-standalone-ldap-attribute-config -DWasPassword=password task, from the wp_profile_root/ConfigEngine directory Federated ./ConfigEngine.sh wp-update-federated-ldap-attribute-config -DWasPassword=password task, from the wp_profile_root/ConfigEngine directory - Stop and restart the appropriate servers to propagate the changes. For specific instructions, see Starting and stopping servers, deployment managers, and node agents.
- Optional: Complete
the following steps to flag an attribute as either unsupported or
required for the entire WebSphere Portal environment
instead of just for the specified LDAP:
- Enter a value for the following required
parameters in the wkplc.properties file: Note: See the properties file for specific information about the advanced parameters.
- user.attributes.required
- user.attributes.nonsupported
- Save your changes to the wkplc.properties file.
- Run the ./ConfigEngine.sh wp-update-attribute-config -DWasPassword=password task, from the wp_profile_root/ConfigEngine directory.
- Stop and restart all necessary servers to propagate your changes.
- Enter a value for the following required
parameters in the wkplc.properties file: