Use the command line to configure the appliance to authorize users by using access
policies that are defined in an XML file.
About this task
You can use commands to configure role based management such that the appliance uses access
policies that are defined in an XML file. You must have already created the XML file (see Credential mapping with an XML file)
You can specify that an LDAP directory is searched for groups that the authenticated user belongs
to, then the returned groups are mapped onto access policies in the XML file. The LDAP query should
search for groups that the user belongs to. Do not configure a search that looks for users in a
particular group; if the search returns users you will be attempting to map groups onto users,
rather than users onto groups.
Procedure
-
Connect to the IBM MQ Appliance as described in
Command line access. Log in as an administrative user.
-
Type
config
to enter global configuration mode.
-
Type the following command to configure role based management:
-
Enter the following command to specify the XML file authorization method:
-
Specify the URL of the XML file that you want to use.
-
If you have defined a user authentication method of LDAP, you can look up an attribute (usually
the distinguished name) of each group the user belongs to. These attributes are then used as the
input credential to the XML file. Otherwise, the distinguished name of the user is used as the input
credential. If you want to perform an LDAP search, you must then supply the details for connecting
to the LDAP server:
-
Specify that you want to perform an LDAP search:
-
Specify the server and password for connecting to the LDAP server:
mc-server-host host
mc-server-port port
Where
host is the IP address or domain name of the LDAP server and
port is usually 389, or 636 for an SSL connection.
-
If you have configured a load balancer group for LDAP access and created a profile, specify the
profile by using the following command:
mc-loadbalancer-group name
Where
name is the name of the load balancer group profile.
-
Specify the Distinguished Name and password that the appliance uses to bind to the LDAP server
to perform the search by using the following commands. (Omit these commands if you are using an
anonymous bind to access the LDAP server.)
mc-ldap-bind-dn dn
mc-ldap-bind-password password
Where
dn is the Distinguished Name and
password is the password.
-
Specify the LDAP search parameters by entering the following command:
mc-ldap-parameters parameters_name
Where
parameters_name is the name of a set of LDAP search parameters that you have
previously defined using the
ldap-search-parameters command. Your search must
look for the user group or groups that the authenticated user belongs to, and return one or more
user group names.
-
Specify a timeout for the LDAP search. This is the time that the appliance will attempt to
connect to the LDAP server before closing the connection. The default is 60 seconds. Specify 0 to
never timeout.
mc-ldap-readtimeout timeout
Where
timeout specifies the duration of the timeout period.
-
If you want to use an SSL (TLS) connection to the LDAP server, specify an SSL client profile to
use by entering the following commands:
ssl-client-type client
ssl-client client_profile
Where
client_profile is the name of a client profile that you have previously
created.
Example
The following example configures the appliance to use the authorization details defined in the
file store:///RBMInfo.xml.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
mqa(config rbm)# mc-method xmlfile
mqa(config rbm)# mc-info-url store:///RBMInfo.xml
mqa(config rbm)# exit
mqa(config)# write memory
Overwrite previously saved configuration? Yes/No [y/n]: y
Configuration saved successfully.
The following commands configure the appliance to use the authorization details defined in the
file
store:///RBMInfo.xml, performing an LDAP search to retrieve user group
names from an LDAP
repository:
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
mqa(config rbm)# mc-method xmlfile
mqa(config rbm)# mc-info-url store:///RBMInfo.xml
mqa(config rbm)# mc-ldap-search on
mqa(config rbm)# mc-server-host LDAP_serv1
mqa(config rbm)# mc-server-port 389
mqa(config rbm)# mc-ldap-bind-dn "cn=proxyuser"
mqa(config rbm)# mc-ldap-bind-password p@Ssw0rd
mqa(config rbm)# mc-ldap-parameters ldap1-MC
mqa(config rbm)# mc-ldap-readtimeout 120
mqa(config rbm)# exit
mqa(config)# write memory
Overwrite previously saved configuration? Yes/No [y/n]: y
Configuration saved successfully.
What to do next
After you specify the credential mapping method, you can next configure the password policy
for your local users (password policy does not apply to other user types).