How to map an LDAP user ID to a RACF user ID
Configure RACF® and a IBM® z/OS® Connect server to map an LDAP user ID to a RACF user ID.
zosConnect-2.0 Applies to zosConnect-2.0.
Perform this procedure if your IBM z/OS Connect server is configured to perform authorization using RACF, or the System of Record (SoR) requires a RACF user ID, but the client authenticates with an LDAP user ID as its identity. For example, the client might use a basic authentication (HTTP Authorization) header.
This task is applicable when IBM z/OS Connect is used as an API provider.
Before you begin
- You must have configured the IBM z/OS Connect server to require authentication and to use basic authentication, by following the appropriate steps in the task How to configure basic authentication with an LDAP user registry.
- You must have configured the IBM z/OS Connect
server to access RACF, by completing the task How to activate and configure the SAF user registry. However, you do not need to specify the
safRegistryelement in the server.xml configuration file. - If you specify both
safRegistryandldapRegistryelements in the server.xml configuration file, then you should also configure afederatedRepositoryelement, so that you can specify the primary realm name. This ensures that the primary realm name used by the IBM z/OS Connect server when it attempts to map the LDAP user ID to the RACF user ID, matches the REGISTRY NAME value you will specify on the RACMAP command. Only one security realm is supported. If you do not specify a primary realm name, the realm name from one of the existing user registries is used, but the same realm name might not be returned. For more information, see Federation of user registries in the WebSphere® Application Server for z/OS Liberty documentation. - You need to know the distinguished name (DN) of the LDAP user ID to be mapped.
- You need to know the RACF user ID to which the LDAP user ID is to be mapped, and that RACF user ID must exist.
- You must have write access to the server.xml configuration file.
About this task
- The client is sending an LDAP user ID and password in the HTTP Authorization header of a request to a IBM z/OS Connect server, to authenticate using basic authentication.
- RACF is being used as the security manager. If you are using an alternative External Security Manager, refer to the appropriate product documentation for the equivalent commands.
Procedure
Results
The LDAP user ID is now mapped to a RACF user ID. When this LDAP user ID is sent as the identity in a request, the IBM z/OS Connect server will attempt to authenticate the user ID and map it to the RACF user ID, so that the RACF user ID can be used for authorization and when connecting to the System of Record (SoR).