Connecting to your identity provider
You can optionally configure a connection to an existing identity provider, such as an LDAP server. At a minimum, you can use the identity provider to validate users' credentials. However, you can also use your identity provider to manage access to the platform. The information that you specify when you connect to your identity provider determines whether you use the identity provider for password management or for access management.
You have two options for connecting to your identity provider:
| Mechanism | Details |
|---|---|
| LDAP integration provided by IBM® Software Hub (deprecated) | When you install IBM Software Hub, the
Identity Management Service is automatically enabled. If
you want to use the LDAP integration provided by IBM Software Hub, see Configuring IBM Software Hub to use the embedded LDAP integration. After you configure IBM Software Hub to use the embedded LDAP integration, see Connecting to your identity provider.
|
| LDAP integration provided by the IBM Cloud Pak foundational services Identity Management Service | When you install IBM Software Hub, the
Identity Management Service is automatically enabled.
However, if you upgrade from an older release of IBM Software Hub and the Identity Management Service is not enabled, you can use the
|
- Who needs to complete this task?
- The permissions that you must have depend on whether IBM Software Hub is configured to use the Identity Management Service:
- Identity Management Service is not configured (default)
- To configure the connection to your LDAP server, you must have one of the following permissions:
- Administer platform
- Manage platform roles
- Identity Management Service is configured
- To configure the connection to your identity provider, you must have the Administer platform permission.
- When do you need to complete this task?
- Complete this task before you give users access to IBM Software Hub.
You can configure a connection to your LDAP server from the Access control page.
- The Identity Management Service is not enabled
If the Identity Management Service is not enabled, the Access control page includes a link to the LDAP configuration.
- The Identity Management Service is enabled
If the Identity Management Service is enabled, the Access control page includes a link to the Identity provider configuration.
The Identity Management Service is not enabled
- Log in to the IBM Software Hub web client.
- From the menu, click .
- Click LDAP configuration.
- In the LDAP server information section, provide the following information
about your LDAP server:
Field Description LDAP protocol - If you are connecting to a secure port on your LDAP server, select ldaps://.
- If you are connecting to an unsecured port on your LDAP server, select ldap://.
LDAP hostname Enter the host name of the LDAP server. LDAP port Enter the port that you are connecting to. Standard ports are 389 for
ldapand 636 forldaps.User search base Enter the point in the LDAP tree from which users are searched. This is also referred to as the
baseDNfor the LDAP configuration.User search field Enter the LDAP attribute that is used to identify users. For example, cn, uid, or sAMAccountName.
If you plan to use LDAP and a SAML identity provider, ensure that you use the same attribute to identify users. This field should have the same value as the fieldToAuthenticate parameter in your SSO configuration.
Domain search user If your LDAP server requires authentication to perform lookups, enter the username of a user that can perform lookups on the LDAP server. This is also referred to as the
bindDNfor the LDAP configuration.Domain search password If you specified a Domain search user, specify the password for this user. - If you want to add LDAP groups to user groups, select Use LDAP group and
provide the following information about your LDAP server:
Field Description Group search base Enter the point in the LDAP tree from which groups are searched. Group search field Enter the LDAP attribute that is used to identify groups. For example, cn.
- If you want to use the LDAP server to manage access to the platform, provide the LDAP attributes
that map to the following values:
Field Description First name Enter the LDAP attribute that is used to identify a user's given name. For example, givenName. Last name Enter the LDAP attribute that is used to identify a user's surname. For example, sn. Email Enter the LDAP attribute that is used to identify a user's email address. For example, mail. Group membership If you selected Use LDAP group, enter the LDAP attribute that is used to identify all of the LDAP groups that a user is a member of. For example memberOf. Group member field If you selected Use LDAP group, enter the LDAP attribute that is used to identify all of the members of a given group. For example member. If you use Microsoft Active Directory and you want to enable the nested groups search, add the following extension ID to the LDAP attribute: :1.2.840.113556.1.4.1941:
For example: memberOf:1.2.840.113556.1.4.1941:
Important: If you use nested group search in Microsoft Active Directory, you must disable the default LDAP sync on log in option and enable the periodic sync job. For details, see Syncing IBM Software Hub with your LDAP server. - To verify that you can connect to your LDAP server, enter the following information in the
Test connection section:
Field Description Username Enter the username of a user that exists in one of the following locations: - The user search base
- The group search base
Password Enter the password for the specified user. Note: These credentials are not saved. - Click Test connection.
- After you verify that you can connect to your LDAP server, click Save.
Syncing IBM Software Hub with your LDAP server
- Sync on log in (default)
- This is the default method. When this method is used, the platform syncs each user's data when
the user logs in to IBM Software Hub:
- The first time that a user logs in to IBM Software Hub, the platform creates a user profile and assigns the user the correct user groups based on their LDAP group membership.
- If the user has logged in before, the platform updates the use group membership based on their LDAP group membership.
This is the recommended method for most environments. If you want to continue using this method, no additional action is required.
- Periodic sync job
- This option is required if you use nested groups in Microsoft Active Directory. However, this
method can cause a lot of overhead for IBM Software Hub
instances that have large LDAP groups.
If you want to use this method:
- Log in to Red Hat®
OpenShift® Container Platform as a project
administrator:
oc login OpenShift_URL:port - Disable the sync on log in (
LDAP_SYNC_ON_LOGIN) by running the following command:oc patch configmap product-configmap \ --namespace=${PROJECT_CPD_INST_OPERANDS} \ --patch '{"data": {"LDAP_SYNC_ON_LOGIN" : "false"}}' - Delete the
usermgmtpods:oc delete pod \ --namespace=${PROJECT_CPD_INST_OPERANDS} \ -l component=usermgmt - Enable the periodic sync
job:
oc patch cj usermgmt-ldap-sync-cron-job \ --namespace=${PROJECT_CPD_INST_OPERANDS} \ --patch '{"spec": {"suspend": false}}'
- Log in to Red Hat®
OpenShift® Container Platform as a project
administrator:
The Identity Management Service is enabled
You can configure a connection to one or more identity providers from the Identity providers page.
- Log in to the IBM Software Hub web client.
- From the menu, click .
- Click New connection.
- Select LDAP. Then, click Next.
Follow the guidance in Configuring an LDAP connection in the IBM Cloud Pak foundational services documentation.