User authentication with LDAP
You can configure the IBM® MQ Appliance to authenticate users by using an LDAP server.
- Using credentials directly
- You can use your users' credentials directly to bind to the LDAP server. In this case, your user
names must be part of the X.500 distinguished names (DN) that the LDAP server uses to identify
directory entries. You specify the remainder of the DN as part of the configuration. Typically, the
user would log in using the common name (CN) part of the distinguished name. The appliance prefixes
the user name with
cn=
and suffixes it with a comma and the remaining distinguished name elements that are common to all appliance users.For example, your user might log in with the user name
Robin Dalemain
, which is the CN part of their DN. You have configured the suffix to bedc=appliance203, dc=com
. When Robin attempts to log in to the appliance, the distinguished namecn=Robin Dalemain, dc=appliance203, dc=com
, together with Robin's password are used to connect to the LDAP server. If Robin's credentials successfully bind to the LDAP server, then Robin is authenticated and can access the appliance. - Looking up users in LDAP
- You can configure the appliance so that users enter a user name that is not part of their DN.
You specify search parameters so that this user name can be passed to the LDAP server and used to
look up the user's distinguished name, which is then used with the entered password to authenticate
the user. To look up a user's distinguished name the appliance can either bind to the LDAP server
anonymously, or you can specify a bind ID and password alias it must use.
For example, Robin Dalemain might have the user name
RWD123
. When Robin attempts to log in to the appliance, Robin's user name is sent to the LDAP server and the distinguished name for Robin's entry is returned. Robin is authenticated using his distinguished name and password to determine if he can access the appliance. - Using TLS (SSL)
- You can specify that the appliance acts as an SSL client when connecting to the LDAP server. If you use this option, user credentials are encrypted when sent to the LDAP server, so user passwords are never sent across the network in plain text.
- Using load balancing
- You can specify that the appliance uses a pool of LDAP servers rather than a single server, and configure how the load is balanced between the LDAP servers in the pool.
- Specifying fallback users
- It is important that you specify one or more fallback users. These are local users who can log in to the appliance if you lose the connection with your LDAP server.
After you have configured how users are authenticated using LDAP, you must go on to specify how authenticated users are authorized to use the appliance resources. You do this by configuring credential mapping.