Configuring external authentication for GUI users
You can manage administrative users either locally within the system or in an external authentication server such as Microsoft Active Directory (AD) or Lightweight Directory Access Protocol Server (LDAP). By default, the IBM Storage Scale uses an internal authentication repository for administrative GUI users.
You can log in to the IBM Storage Scale GUI and create group mappings through the GUI on the page by using the Create Group Mapping option.
You can edit or delete the external authentication by using the Edit and Delete options that are available in the page of the GUI.
Configuring external authentication by using CLI
Perform the following steps to configure external authentication by using CLI:
- Create your AD or LDAP configuration by issuing the mkldap command at the
following location: /usr/lpp/mmfs/gui/cli/mkldap.
This command writes the configuration automatically to /opt/ibm/wlp/usr/servers/gpfsgui/ldap.xml, which is then distributed across all GUI nodes. For secure AD or LDAP connection, make sure that the keystores are present on the respective GUI nodes.
The mkldap command accepts the following parameters:Table 1. mkldap command parameters Parameters Description id
Unique ID of the LDAP configuration. --host
The IP address or host name of the LDAP server. --baseDn
BaseDn string for the repository. --bindDn
BindDn string for the authentication user. --bindPassword
Password of the authentication user. --port
Port number of the LDAP. Default is 389 or 636 over SSL. --type
Repository type such as "Microsoft Active Directory, ids, domino, secureway, iplanet, netscape, edirectory" or "custom". Default value is "Microsoft Active Directory". --connectTimeout
Maximum time for establishing a connection with the LDAP server. Default value is 1 m. --searchTimeout
Maximum time for an LDAP server to respond before a request is canceled. Default value is 1 m. --keystore
Location with file name of the keystore file (.jks, .p12 or .pfx). --keystorePassword
Password of the keystore. --truststore
Location with file name of the truststore file (.jks, .p12 or .pfx). --truststorePassword
Password of the truststore. --userFilter
User filter for the LDAP repository. --userIdMap
User ID map for the LDAP repository. --groupFilter
Group filter for the LDAP repository. --groupIdMap
Group ID map for the LDAP repository. --groupMemberIdMap
Group member ID map for the LDAP repository. Example for standard ADmkldap myad --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=local
Example for secure ADmkldap mysecuread --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=local --keystore /tmp/ad.jks
If you specify multiple AD or LDAP servers, you might encounter a problem that a user with the same user name exists in multiple user repositories. This user cannot be able to log in. To prevent this situation, you can specify LDAP filters for User Principal Names (UPN) for a selected server configuration.
Example for a scenario where UPN filters are enabledmkldap myfilteredad --host 9.155.106.19 --bindDn CN=Administrator,CN=Users,DC=mydomain,DC=local --baseDn CN=Users,DC=mydomain,DC=local --userFilter "(&(userPrincipalName=%v)(objectcategory=person))" --groupFilter "(&(cn=%v)(objectcategory=group))" --userIdMap "*:userPrincipalName" --groupIdMap "*:cn" --groupMemberIdMap "memberOf:member"
- Map an existing AD or LDAP group to the SecurityAdmin GUI role as shown in
the following
example:
/usr/lpp/mmfs/gui/cli/mkusergrp LDAPGroup --role securityadmin
Now you can log in with your AD or LDAP user and create more group mappings through the GUI on the Create Group Mapping option.
page by using theIf you want to remove the existing configurations, use the rmldap command. To see all specified LDAP configurations, issue the lsldap command.