Basic users are users in the registry that
are not imported in to Security Access Manager.
Edit the ldap.conf file so that basic users can
authenticate in Security Access Manager.
Before you begin
The following limitations apply to basic users:
- Basic users work in minimal registry mode only.
- Basic users cannot use global sign-on.
- You cannot set access control lists for individual basic users.
However, basic users can be members of a Security Access Manager group
with access control lists.
- Registry direct Java API does not support basic users.
- Account and password valid settings are set to
yes.
You cannot modify them for basic users.
Warning: Basic users are not subject to any Security
Access Manager account and password policies. They always have their account-valid and password-valid values
set to yes. Basic users do not record the last login
or last password change even if [ldap] enable-last-login is
set. You must use the underlying registry equivalents for these capabilities.
About this task
Configure the run time so that basic users can authenticate
to Security Access Manager. Basic users have limitations.
When basic-user-support is enabled, basic
and full users are located by using the basic-user-principal-attribute suffix
in the LDAP native user entry. If the located native user entry has
full Security Access Manager user
metadata then it is treated as a full user. The value of the basic-user-principal-attribute is
used for the user ID even if the Security Access Manager full
user metadata has a different principalName.
Basic
users are managed in the corporate user registry by using LDAP management
tools. These users are not managed through Security Access Manager,
except when you change and reset passwords for basic users.
When searching for basic or full users,
Security Access Manager:
- Uses the configured
basic-user-principal-attribute and
the user-search-filter values to locate users in
the registry.
- Searches all suffixes that are defined by
basic-user-search-suffix entries
and in the order that they are defined, unless basic-user-suffix-optimizer is
enabled. If no basic-user-search-suffix entries are
specified, all suffixes are searched in an unspecified order.
- If
basic-user-suffix-optimizer is enabled, a
hit count is kept for each suffix that is used to search for users.
The suffix search order is based on a dynamic most-used suffix order.
This dynamic search order is not used if basic-user-no-duplicates is
enabled since in that situation, all suffixes must be searched to
ensure that there are no duplicates, thus the order is irrelevant.
Procedure
- Log in the local management interface.
- From the top menu, select .
- Click .
- Select ldap.conf.
- Add the following lines under the
[ldap] stanza.
basic-user-support = yes
- Set this option to yes to support basic users.
basic-user-principal-attribute = <uid>
- This attribute is the
principalName of the basic
and full users.
basic-user-search-suffix = <DN>
- Set this option for each suffix to search for full and basic users.
This must include suffixes to search on the primary LDAP server and
all federated registries.
- If
basic-user-support is enabled and one or more basic-user-search-suffix values
are configured, the ignore-suffix entries are disregarded.
The basic-user-search-suffix configuration entries
determine the suffixes that are searched. Note: When there are no basic-user-search-suffix entries,
the system searches all available suffixes, except for those specified
by the ignore-suffix entries. If you do not specify
any basic-user-search-suffix values, you can use ignore-suffix entries
to specify one or more suffixes to exclude from the search.
- If
basic-user-search-suffix is not set, then
all suffixes are chosen in an unspecified order.
- If you choose to specify one or more
basic-user-search-suffix entries, ensure
that you include an entry for every suffix that must be searched. Ensure that you include
the primary suffix for Security Access Manager
accounts. For example, secAuthority=Default. If you specify one or more
basic-user-search-suffix entries, but you do not include this suffix, the
search does not return the full Security Access Manager accounts. In this case, you are not
able to authenticate to pdadmin with the sec_master
account or any other Security Access Manager
accounts.
basic-user-no-duplicates = {yes | no}
- If set to yes, the search for basic users covers
all suffixes to ensure that no users with the same name are found.
If set to no, the search for basic users stops
immediately and ignores possible duplicates.
- Avoid configuring your environment to include suffixes that contain
duplicates. Ensure that the
basic-user-principal-attribute is
unique for all accounts across the specified suffixes. If there are
no duplicates in the environment, you can set basic-user-no-duplicates to no to
improve search efficiency. However, if duplicates exist in your environment,
set basic-user-no-duplicates to yes so
that the system can return an error if it encounters more than one
account with the same principal attribute value.
basic-user-suffix-optimizer = {yes | no}
- If set to yes and
basic-user-no-duplicates is
set to no, the search order of suffixes is sorted,
with the most hit of the basic user suffix at the head of the search
suffix list. If set to no, the search order is
provided by the basic-user-search-suffix order.Note: If basic-user-no-duplicates is
set to yes, the basic-user-suffix-optimizer entry
is disregarded. In this case, all suffixes are searched to check for
duplicates.
- Add the following line under the
[server:<fedreg>] stanza.
basic-user-principal-attribute = <uid>
- Click Save.