Configuring an LDAP Namespace for IBM Directory Server
If you configure a new LDAP namespace for use with the IBM® Directory Server, you must modify the necessary settings and change the values for all properties of the IBM Directory objects.
Procedure
- Open IBM Cognos® Configuration.
- In the Explorer window, under Security, right-click Authentication.
- Click New resource > Namespace.
- In the Name box, type a name for your authentication namespace.
- In the Type list, click LDAP-General default values.
- Click OK. The new authentication namespace resource appears in the Explorer window, under the Authentication component.
- In the Properties window, for the Namespace
ID property, specify a unique identifier for the namespace.
Tip: Do not use colons (:) in the Namespace ID property.For Host and Port, specify
<Hostname>:<port>.For example,localhost:389. - Specify the values for all other properties to ensure that IBM Cognos Analytics can locate and use your existing
authentication namespace.
- For Base Distinguished Name, specify the entry for a user search.
- For User lookup, specify
(uid=${userID}). - For Bind user DN and password, specify
cn=root. For example,cn=rootas a user name andsecretas a password.Note: Specify the values if you want an LDAP authentication provider to bind to the directory server by using a specific bind user DN and password. If no values are specified, an LDAP authentication namespace binds as anonymous.
- If you do not use external identity mapping, use bind credentials to search an LDAP
directory server. Complete the following items.
- Set Use external identity to False.
- Set Use bind credentials for search to True.
- Specify the user ID and password for Bind user DN and password.
- To configure an LDAP advanced mapping properties, see the values that are specified in
the following table. If the schema is modified, you must make extra mapping changes.
Table 1. LDAP advanced mapping values Mappings LDAP property LDAP value Folder Object class organizationalunit,organization, andcontainerDescription descriptionName ou,o, andcnGroup Object class groupofnamesDescription descriptionMember memberName cnAccount Object class inetorgpersonBusiness phone telephonenumberContent locale (leave blank)Description descriptionEmail mailFax/Phone facsimiletelephonenumberGiven name givennameHome phone homephoneMobile phone mobileName cnPager phone pagerPassword userPasswordPostal address postaladdressProduct locale (leave blank)Surname snUsername uid - To prevent the anonymous access, complete the following steps:
- Go to Security > Authentication > Cognos.
- Set Allow anonymous access? to False.
- From the File menu, click Save.