Configuring the system for external authentication
Infrastructure Management supports both LDAP and Windows Active Directory for centralized user authentication. Both server certificate and client certificate authentication are supported.
Basic LDAP and Active Directory configuration
Though the labels in the operator console UI display configuration for LDAP, you can use the same procedure to configure Active Directory.
To configure a LDAP or Active Directory integration, perform the following steps:
- From the operator console, navigate to Options > Administration.
- Under Integrations with other BMC Products, click Edit.
- The Configure Infrastructure Management Integrations dialog box displays the available integrations. Under Integrations, select LDAP.
To add a new LDAP or Active Directory integration, click Add LDAP Server.
Provide the following details:
Input field
Description
LDAP Alias
Alias name for the LDAP or Active Directory Server that is generated automatically by the system. You can also modify the name.
LDAP Protocol Version
LDAP protocol version number. The most recent version is 3.
Hostname
Fully qualified host name or the IP address of the LDAP or Active Directory server. You can verify the connection between the LDAP/ Active Directory server and the Infrastructure Management Server by using the ping command.
Port
Port number to connect to the LDAP or Active Directory server. The default non-secure port number is 389. The default secure (SSL) port number is 636.
Base DN
The top-level directory of the LDAP or Active Directory structure. This is the base fully qualified Distinguished Name (DN). The Distinguished Name represents an object and a path to the object in the directory hierarchical namespace. Objects are ordered from the most specific to the least specific.
User DN
Fully qualified distinguished name of the user which connects to the LDAP or Active Directory server.
Password
Authentication password (encrypted) that is used to connect to the LDAP or Active Directory server.
User SSL
Indicates whether the LDAP or Active Directory authentication is using the SSL protocol.
User ID Attribute
LDAP or Active Directory attribute in the user entry that contains the login ID.
User Search Filter
Search filter that the LDAP or Active Directory server uses to look up a user entry.
Group Search Filter
Search filter that the LDAP or Active Directory server uses to look up a user group entry.
Delete LDAP Server
Deletes the current LDAP or Active Directory server.
Click Test to test the LDAP integration status. A result window appears, indicating the integration status. It also gives information on errors and warnings. Warnings provide additional feedback on optimizing the configuration; however, they do not cause any issues to the system for connecting and communicating with the LDAP or Active Directory servers. The following tables list the possible errors and warnings:
The [confluence_table-plus] macro is a standalone macro and it cannot be used inline. Click on this message for details.
The [confluence_table-plus] macro is a standalone macro and it cannot be used inline. Click on this message for details.
- Click Apply for the changes to take effect and save your configuration.
Basic group configuration for LDAP and Active Directory
Every user must belong to a group which maps to the groups in Infrastructure Management Server. Groups assign the user’s roles and responsibilities to each other. That is, the external authentication system must be able to identify and authenticate the user but must also be able to identify which group that user belongs to. Following methods ensure proper functionality and identification between systems:
- Add the Infrastructure Management Server groups to your LDAP system
This method allows to take the desired Infrastructure Management Server groups and create them in your LDAP or Active Directory system. You must ensure that the users that you want to allow to log in, are members of those groups. - Add the LDAP groups to your Infrastructure Management Server
This method allows to create the desired LDAP or Active Directory groups and create them in the Infrastructure Management Server.
Advanced LDAP and Active Directory configuration
This section explains advanced configuration for LDAP and Active Directory. Most of the elements explained in this section are not available through the UI and require modifications to the .properties file.
SSL authentication
If you select the User SSL check box, then ensure that you have properly configured your keystore and SSL certificates to allow for authentication between the Infrastructure Management Server and the LDAP or Active Directory systems. Perform the following steps to test such connection:
- Obtain and copy the SSL certificate to any local folder on your Infrastructure Management server.
Import the SSL certificate into the installationDirectory/pw/pronto/conf/pnserver.ks JServer keystore.
Reference the keytool command in the installationDirectory/pw/jre/bin directory, and enter the following commands and parameters:keytool -import [-trustcacerts] [-alias <alias>] [-file <cert_file>] [-keystore <keystore>] [-storepass <storepass>]For example, to import the file ldapcert.cer, enter the following command:
keytool -import -trustcacerts -alias pnetv2 -file ldapcert.cer -keystore "usr/pw/pronto/conf/pnserver.ks" -storepass get2net- Restart TrueSight Infrastructure Management server.
Custom group mappings
Perform the following steps to retain the names of LDAP or Active Directory groups and Infrastructure Management groups separately using the mapping file:
- Configure the mapping file:
- In a text editor, open the /pw/pronto/conf/ldap_ppm_group_mapping.xml file.
Map each LDAP group to the appropriate Infrastructure Management group using the following format:
<entry key="<LDAPgroupName>"><ProactiveNetGroupName></entry>The following example shows multiple LDAP groups mapped to Infrastructure Management groups.
<properties>
<entry key="MyLdapGroup1">BPPM Administrators</entry>
<entry key="MyLdapGroup2">BPPM Supervisors</entry>
<entry key="MyLdapGroup3">User Defined User Group</entry>
...
</properties>- Save and close the ldap_ppm_group_mapping.xml file.
- Update the /pw/pronto/conf/ias.properties file:
- In a text editor, open the the /pw/pronto/conf/ias.properties file.
Turn off checking to determine whether the group(s) listed in com.bmc.sms.ixs.default.group.present.check are defined in Infrastructure Management by updating the following parameter:
com.bmc.sms.ixs.default.group.present.check=FALSEBy default this property is set to TRUE.
If this property is set to TRUE, you must define a group in Infrastructure Management for the corresponding LDAP group. After the group is defined in Infrastructure Management, users can be authenticated as belonging to the group.- Save and close the /pw/pronto/conf/ias.properties file.
- Restart TrueSight Infrastructure Management server.
Limiting group lookups
If you decide to use the default group settings and create Infrastructure Management Server groups in your LDAP system or vice versa then this method is used to help limit the group names that the system searches through during log in. It ensures that not all groups in your Infrastructure Management Server’s group lists are searched, thus allowing for a more efficient log in process as well as providing a more secure environment.
Perform the following steps to limit the authentication groups:
- Update the /pw/pronto/conf/ias.properties file:
- In a text editor, open the the /pw/pronto/conf/ias.properties file.
Enter a comma-separated list of LDAP groups that you need to authenticate the user against by updating the following parameter:
com.bmc.sms.ixs.search.ldap.group=<LdapGroup1>,<LdapGroup2>,<LdapGroup3>,<LdapGroup4>- Save and close the /pw/pronto/conf/ias.properties file.
- Restart TrueSight Infrastructure Management server.
Configuring cell permissions
Perform the following steps to configure the cell permissions:
Edit the self_collector.mrl file located at /pw/server/etc/<cellname>/kb/collectors/ and add the groups to the permissions that are needed.
r - Read-onlyw - Write
x - Execute
- Save the self_collector.mrl file.
- Recompile the cell using the commands
mccomp -n <cellname>
mcontrol -n <cell> restart