Setting Up LDAP - the simple method

Learn how to set up LDAP and import users the simple way to access the Monitoring module of IBM Cloud Pak® for Multicloud Management. Setting up LDAP is a requirement for cluster native monitoring.

Most users do not require the use of multiple accounts. Using multiple accounts introduces considerable complexity. These steps use the default account, id-mycluster-account.

Note: The Monitoring module does not support LDAP groups. It requires that users are directly added to the team. For more information about API calls that can be made to script this, see IAM APIs.

Prerequisites

Required user type or access level: Cluster administrator

Procedure

  1. Log in to IBM Cloud Pak® for Multicloud Management as a cluster administrator.

    cloudctl login -a https://<cluster-domain-name>:443
    
  2. Import users from the LDAP connection into IBM Cloud Pak® for Multicloud Management. Repeat the command for each LDAP user.

    cloudctl iam user-import -c <ldap_id> -u <user_id>
    

    You can use this command to find the LDAP ID:

    cloudctl iam ldaps
    
  3. Onboard the LDAP users imported in step 2. Users are unable to access IBM Cloud Pak® for Multicloud Management until they are added to a team.

    cloudctl iam user-onboard id-mycluster-account -r MEMBER -u user1ID,user2ID,...
    
  4. Create a team for the default account. Repeat as needed.

    cloudctl iam team-create <team_name>
    
  5. Assign users to the created team with a role of Administrator, Operator, or Viewer. Repeat as needed for each user.

    cloudctl iam team-add-users <team_id> <role> -u user2
    

    You can use this command to find the TEAM ID:

    cloudctl iam teams
    
  6. Add managed resources to the team.

    cloudctl iam resource-add <team_id> -r CRN
    

    For more information, see Add resources to a team Opens in a new tab.

    You can use this command to create namespace resources:

    kubectl create namespace <namespace_name>
    

    You can use this command to find the associated CRN:

    cloudctl iam resources | grep <namespace_name>