Initial LDAP group setup
Add the different LDAP group objects to the schema, and make the client administrator part of each of them. The user definition for the PTCADM1 user ID is pulled from the RACF® schema.
ldapadd –D "cn=LDAP admin" –w password –f /u/ibmuser/ptc_setup.ldif
where
/u/ibmuser/ptc_setup.ldif
holds the following:# banking workspace configuration
dn: cn=FEK.PTC.CONFIG.ENABLED.CDFMVS08.BANKING,o=PTC,c=zOSexplorer
objectclass: groupOfUniqueNames
cn: FEK.PTC.CONFIG.ENABLED.CDFMVS08.BANKING
description: z/OS EXPLORER push-to-client
# give client administrator access
uniqueMember: racfID=PTCADM1,profileType=user,cn=RACF,o=IBM,c=US
# insurance workspace configuration
dn: cn=FEK.PTC.CONFIG.ENABLED.CDFMVS08.INSURANCE,o=PTC,c=zOSexplorer
objectclass: groupOfUniqueNames
cn: FEK.PTC.CONFIG.ENABLED.CDFMVS08.INSURANCE
description: z/OS EXPLORER push-to-client
# give client administrator access
uniqueMember: racfID=PTCADM1,profileType=user,cn=RACF,o=IBM,c=US
# reject configuration updates
dn: cn=FEK.PTC.REJECT.CONFIG.UPDATES.CDFMVS08,o=PTC,c=zOSexplorer
objectclass: groupOfUniqueNames
cn: FEK.PTC.REJECT.CONFIG.UPDATES.CDFMVS08
description: z/OS EXPLORER push-to-client
# give client administrator access
uniqueMember: racfID=PTCADM1,profileType=user,cn=RACF,o=IBM,c=US
# reject product updates
dn: cn=FEK.PTC.REJECT.PRODUCT.UPDATES.CDFMVS08,o=PTC,c=zOSexplorer
objectclass: groupOfUniqueNames
cn: FEK.PTC.REJECT.PRODUCT.UPDATES.CDFMVS08
description: z/OS EXPLORER push-to-client
# give client administrator access
uniqueMember: racfID=PTCADM1,profileType=user,cn=RACF,o=IBM,c=US