Configuring external authentication for GUI users
You can manage administrative users either locally within the system or in an external authentication server such as Microsoft Active Directory (AD) or Lightweight Directory Access Protocol Server (LDAP). By default, the IBM Spectrum Scale uses an internal authentication repository for administrative GUI users.
You can log in to the IBM Spectrum Scale GUI and create group mappings through the GUI on the page by using the Create Group Mapping option.
You can edit or delete the external authentication by using the Edit and Delete options that are available in the page of the GUI.
Configuring external authentication by using CLI
Perform the following steps to configure external authentication by using CLI:
- Create your AD or LDAP configuration by issuing the mkldap command at the
following location: /usr/lpp/mmfs/gui/cli/mkldap.
This command writes the configuration automatically to /opt/ibm/wlp/usr/servers/gpfsgui/ldap.xml, which is then distributed across all GUI nodes. For secure AD or LDAP connection, make sure that the keystores are present on the respective GUI nodes.
The mkldap command accepts the following parameters.Table 1. mkldap command parameters Parameters Description idUnique ID of the LDAP configuration. --hostThe IP address or host name of the LDAP server. --baseDnBaseDn string for the repository. --bindDnBindDn string for the authentication user. --bindPasswordPassword of the authentication user. --portPort number of the LDAP. Default is 389 or 636 over SSL. --typeRepository type such as "Microsoft Active Directory, ids, domino, secureway, iplanet, netscape, edirectory" or "custom". Default value is "Microsoft Active Directory". --connectTimeoutMaximum time for establishing a connection with the LDAP server. Default value is 1 m. --searchTimeoutMaximum time for an LDAP server to respond before a request is canceled. Default value is 1 m. --keystoreLocation with file name of the keystore file (.jks, .p12 or .pfx). --keystorePasswordPassword of the keystore. --truststoreLocation with file name of the truststore file (.jks, .p12 or .pfx). --truststorePasswordPassword of the truststore. --userFilterUser filter for the LDAP repository. --userIdMapUser ID map for the LDAP repository. --groupFilterGroup filter for the LDAP repository. --groupIdMapGroup ID map for the LDAP repository. --groupMemberIdMapGroup member ID map for the LDAP repository. Example for standard ADmkldap myad --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=localExample for secure ADmkldap mysecuread --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=local --keystore /tmp/ad.jksIf you specify multiple AD or LDAP servers, you might encounter a problem that a user with the same user name exists in multiple user repositories. This user cannot be able to log in. To prevent this situation, you can specify LDAP filters for User Principal Names (UPN) for a selected server configuration.
Example for a scenario where UPN filters are enabledmkldap myfilteredad --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=local --userFilter "(&(userPrincipalName=%v)(objectcategory=person))" --groupFilter "(&(cn=%v)(objectcategory=group))" --userIdMap "*:userPrincipalName" --groupIdMap "*:cn" --groupMemberIdMap "memberOf:member" - Map an existing AD or LDAP group to the SecurityAdmin GUI role as shown in
the following
example:
/usr/lpp/mmfs/gui/cli/mkusergrp LDAPGroup --role securityadminNow you can log in with your AD or LDAP user and create more group mappings through the GUI on the page by using the Create Group Mapping option.
If you want to remove the existing configurations, use the rmldap command. To see all specified LDAP configurations, issue the lsldap command.