Task 2: Adding the LDAP to the security realm
In this task, you add your new LDAP server to the security realm of the sample server.
About this task
The sample server works on an instance of the Liberty
profile. The users available for the other samples and tutorials are
declared in the basic registry. To include the LDAP registry to the
security realm, you modify the server.xml file to
include a connection to the LDAP server.
Step 1: Enabling the LDAP registry
In this step, you add the LDAP registry, and add search filters to limit the number of users. The sample server authenticates the users in its basic user registry.
Procedure
Step 2: Binding groups and users
In the next task, you log in as the administrative power user to import the LDAP users to the database.
About this task
To log in to Decision Center, a user must be
mapped to one of the predefined Decision Center
roles. All regular users are mapped to the rtsUser role.
You also need the administrative power user to complete the initial configuration of Decision Center and do some configuration tasks. In the
basic registry, the user rtsAdmin belongs to two groups,
AdminGroup and InstallGroup. These groups can be named whatever
you like, but they must be bound to the rtsAdministrator and
rtsInstaller roles.
The recommended approach is to keep this administrative power user in the basic user registry to handle IT functions, and then use the LDAP registry for the other business users. It is also possible to create this user directly in your LDAP as described in the configuration guide Configuring user access to Decision Center.
Procedure
server.xml, notice the security role binding of the three Decision Center applications - the Business console, and
the REST API:
<application-bnd>
<security-role name="rtsAdministrator">
<group name="AdminGroup"/>
</security-role>
<security-role name="rtsInstaller">
<group name="InstallGroup"/>
</security-role>
<security-role name="rtsConfigManager">
<group name="ConfigGroup"/>
</security-role>
<security-role name="rtsUser">
<special-subject type="ALL_AUTHENTICATED_USERS" />
</security-role>
</application-bnd>
Step 3: Enabling automatic refresh
In this step, you enable automatic import of users and groups before you start the sample server. If you do not specify this option, you must manually import to the Decision Center database any group or user that you add to the LDAP repository.
Procedure
In most situations, manual import is not convenient. Two possibilities are available to provide automatic import:
- Automatically import LDAP users from groups that you specify in the Business console.
- Automatically import users from all groups that are found in the LDAP.
When you enable automatic import, all manually created users are deleted.
In this tutorial, you implement the first option:
