Use the command line to configure the appliance to authorize users by using local user
group definitions.
About this task
You can use commands to configure role based management such that the appliance uses local user
groups for user authorization. You must create user groups as a separate operation.
You can specify that an LDAP directory is searched for groups that the authenticated user belongs
to, then the returned groups are mapped onto local user groups. The LDAP query should search for
groups that the user belongs to. Do not configure a search that looks for users in a particular
group; if the search returns users you will be attempting to map groups onto users, rather than
users onto groups.
Procedure
-
Connect to the IBM® MQ Appliance as described in
Command line access. Log in as an administrative user.
-
Type
config
to enter global configuration mode.
-
Type the following command to configure role based management:
-
Enter the following command to specify the local user group authorization method:
-
If you are using local user groups to authorize LDAP users, define an LDAP search to retrieve
the user group for the authenticated user, that can in turn be mapped onto a local user group. Enter
the following commands:
-
Specify that you want to perform an LDAP search:
-
Specify the server and password for connecting to the LDAP server:
mc-server-host host
mc-server-port port
Where
host is the IP address or domain name of the LDAP server and
port is usually 389, or 636 for an SSL connection.
-
If you have configured a load balancer group for LDAP access and created a profile, specify the
profile by using the following command:
mc-loadbalancer-group name
Where
name is the name of the load balancer group profile.
-
Specify the Distinguished Name and password that the appliance uses to bind to the LDAP server
to perform the search by using the following commands. (Omit these commands if you are using an
anonymous bind to access the LDAP server.)
mc-ldap-bind-dn dn
mc-ldap-bind-password password
Where
dn is the Distinguished Name and
password is the password.
-
Specify the LDAP search parameters by entering the following command:
mc-ldap-parameters parameters_name
Where
parameters_name is the name of a set of LDAP search parameters that you have
previously defined using the
ldap-search-parameters command. Your search must
look for the user group or groups that the authenticated user belongs to, and return one or more
user group names.
-
Specify a timeout for the LDAP search. This is the time that the appliance will attempt to
connect to the LDAP server before closing the connection. The default is 60 seconds. Specify 0 to
never timeout.
mc-ldap-readtimeout timeout
Where
timeout specifies the duration of the timeout period.
-
If you want to use an SSL (TLS) connection to the LDAP server, specify an SSL client profile to
use by entering the following commands:
ssl-client-type client
ssl-client client_profile
Where
client_profile is the name of a client profile that you have previously
created.
-
Save your configuration and exit.
Example
The following example configures the appliance to use the authorization details defined by local
user groups.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
mqa(config rbm)# mc-method local
mqa(config rbm)# exit
mqa(config)# write memory
Overwrite previously saved configuration? Yes/No [y/n]: y
Configuration saved successfully.
The following commands configure the appliance to use the authorization details defined by local
user groups, performing an LDAP search to retrieve user group names from an LDAP
repository:
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
mqa(config rbm)# mc-method local
mqa(config rbm)# mc-ldap-search on
mqa(config rbm)# mc-server-host LDAP_serv1
mqa(config rbm)# mc-server-port 389
mqa(config rbm)# mc-ldap-bind-dn "cn=proxyuser"
mqa(config rbm)# mc-ldap-bind-password p@Ssw0rd
mqa(config rbm)# mc-ldap-parameters ldap1-MC
mqa(config rbm)# mc-ldap-readtimeout 120
mqa(config rbm)# exit
mqa(config)# write memory
Overwrite previously saved configuration? Yes/No [y/n]: y
Configuration saved successfully.
What to do next
After specifying the credential mapping method, you can next configure the password policy
for your local users (password policy does not apply to other user types).