Importing users from LDAP
You can import Guardium® user definitions from an LDAP server by configuring an operation that imports the set of users who need Guardium access.
You can run the import operation on demand, or schedule it to run on a periodic basis. You can elect to import only new users, or replace existing user definitions. In either case, LDAP groups can be imported as Guardium roles.
When you import LDAP users,
- The Guardium admin user definition is not changed in any way.
- Existing users are not deleted.
- Guardium passwords are not changed.
- New users who are added to Guardium:
- Are marked inactive by default.
- Have blank passwords.
- Are assigned the user role.
- You cannot use special characters in usernames.
- When you add a user manually via access management (either from Add User or LDAP user import), if no given name or surname is provided, the login name is used.
- The LDAP configuration menu has tooltips for certain menu choices. Move the cursor over a menu choice (such as Object Class for user), and a short description appears.
Configuring LDAP user import
The attribute that is used to identify users is defined by the Guardium administrator, in the User RDN Type box of the LDAP Authentication Configuration window. For more information, see Configuring authentication. The default is uid, but consult with your Guardium administrator to determine what value is being used. If a user is using SamAccountName as the RDN value, the user must use either a =search or =[domain name] in the full name. Examples: SamAccountName=search, SamAccountName=dom
- To open the LDAP User Import window, browse to . Note: See Tivoli LDAP configuration example for a reference in filling out the required information.
- For LDAP Host Name, enter the IP address or hostname for the LDAP server to be accessed.
- For Port, enter the port number for connecting to the LDAP server.
- Select the LDAP server type from the menu.
- Select Use SSL Connection if Guardium connects to your LDAP server using an SSL (secure socket layer) connection.
- For Log in as - Enter the user account information to connect to the LDAP server. If anonymous access is enabled in LDAP, then this parameter is optional.
- For Base DN, specify the node in the tree at which to begin the search. For example, a company tree might begin like: DC=encore,DC=corp,DC=root
- For Import mode, either keep or override existing
attributes. Important: The Override existing attributes and Keep existing attributes settings do not apply to user-role association.
- If an imported role is removed locally on the Guardium system, it will be imported again at the next sync.
- If a user is associated with a role in addition to any roles defined by the import, the association will remain even after the subsequent sync.
- For Attribute to Import, enter the attribute that is used to import users (for example: cn). Each attribute has a name and belongs to an objectClass.
- Check the Clear existing group members before importing checkbox if you want to delete all existing group members before importing.
- For Log In As and Password, enter the user account information to connect to the LDAP server.
- For Search Filter Scope, select One-Level to apply the search to the base level only, or select Sub-Tree to apply the search to levels beneath the base level.
- For Limit, enter the maximum number of items to be returned. Guardium recommends that you use this field to test new queries or modifications to existing queries so that you do not inadvertently load an excessive number of members.
- Optionally, for Search Filter, define a base DN, scope, and search filter. Typically, imports are based on membership in an LDAP group, so you would use the memberOF keyword. For example, memberOf=CN=syyTestGroup,DC=encore,DC=corp,DC=root
- Click Apply to save the configuration settings.Note: The Status indicator in the Configuration - General section changes to LDAP import currently set up for this group as follows and Modify Schedule and Run Once Now are enabled. You can now import from your LDAP server.
Scheduling LDAP user import
After you configure the LDAP user import, you can create an import schedule.
- From LDAP User Import, click Modify Schedule to open the LDAP user import schedule window.
- Create a schedule for importing LDAP users and roles. For more information about creating a schedule, see Scheduling. Select Run Once Now to import LDAP users immediately.
Running LDAP user import
When you run LDAP user import on demand, you have the opportunity to accept or reject each of the users who are returned by the query, which is especially useful for testing purposes. If LDAP Import is not yet configured, you must perform Configure LDAP User Import before you perform this procedure.
- Open the LDAP User Import window by clicking .
- Click Run Once Now. After the task completes, the set of members that satisfy your selection criteria will be displayed in the LDAP Query Results window.
- In the LDAP Query Results window, mark the checkbox for each user you want added, and click Import (or click Cancel to return without importing any users).
- To view the added users, open the User Browser by clicking . Verify that the correct user accounts are added.
Tivoli LDAP configuration example
LDAP Host Name | Values |
---|---|
Port |
389 |
Server Type |
Tivoli® Directory |
Use SSL connection |
|
Base DN |
cn=sample realm,o=sample |
Import Mode |
Choose Override existing attributes |
Disable user if not on import list |
|
Enable new Imported Users |
|
Log in as |
cn=root |
Password |
|
Search filter scope |
Sub-Tree |
Limit |
|
Attribute to Import as User Login |
cn (Configurable through Portal) |
Search filter |
|
Object Class for User |
Fill with Default Value - |(objectClass=organizationalPerson)(objectClass=inetOrgPerson)(objectClass=person) |
Import Roles |
Add a Checkmark |
Attribute to Import as Role |
cn |
Role Search Base DB |
Fill with Default Value - cn=sample realm,0=sample |
Role filter |
|
Object Class for Role |
Fill with Default Value - |(objectClass=groupOfNames)(objectClass=group)(objectClass=groupOfUniqueNames) |
Attribute in User to Associate Role |
Fill with Default Value - memberOf |
Attribute in Role to Associate User |
Fill with Default Value - member |