HP 3PAR StoreServ 7400 2-node HP 3PAR Command Line Interface Administrator& - Page 28

Start, Connection, Server, window, click

Page 28 highlights

• (Optional) Set the CA certificate using the following command: ◦ setauthparam ladp-ssl-cacert • Configure account location parameters using the following commands: ◦ setauthparam accounts-dn ◦ setauthparam account-obj user ◦ setauthparam account-name-attr sAMAccount ◦ setauthparam memberof-attr memberOf ◦ checkpassword • Configure group-to-role mapping parameters using the following commands: ◦ setauthparam ◦ checkpassword Each step in the process above is discussed in the following sections. Each section is followed by an example showing the implementation of the instructions described. Configuring Connection Parameters To configure connection parameters: 1. If not already known, obtain the LDAP server's host name by running the ldapsearch command or using ldp.exe (available as part of the downloadable Windows Support Tools from Microsoft). You must know the LDAP server's IP address. NOTE: If you do not have access to the ldapsearch command, use the ldp.exe command. • Issue the ldapsearch command and record the displayed dnsHostName (the value used for the ldap-server-hn parameter; this is only necessary when setting CA certificates). • Run ldp.exe as follows: 1. Click Start→Run. 2. In the Open box, enter ldp and click OK. 3. The Ldp window opens. 4. In the Ldp window, click Connection→Connect. 5. In the Server box, enter the Active Directory server's IP address and click OK. The root DSE attributes and values are displayed in the right-side pane. 6. Record the displayed dnsHostName (the value used for the ldap-server-hn parameter; only necessary if setting CA certificates). 2. Set the address to which the LDAP server will connect by issuing the setauthparam ldap-server command, where is your LDAP server's IP address. 28 Managing User Accounts and Connections

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

(Optional) Set the CA certificate using the following command:
setauthparam ladp-ssl-cacert <certificate>
Configure account location parameters using the following commands:
setauthparam accounts-dn <DN_path>
setauthparam account-obj user
setauthparam account-name-attr sAMAccount
setauthparam memberof-attr memberOf
checkpassword <user_name>
Configure group-to-role mapping parameters using the following commands:
setauthparam <map_param> <map_value>
checkpassword <user_name>
Each step in the process above is discussed in the following sections. Each section is followed by
an example showing the implementation of the instructions described.
Configuring Connection Parameters
To configure connection parameters:
1.
If not already known, obtain the LDAP server’s host name by running the
ldapsearch
command or using
ldp.exe
(available as part of the downloadable Windows Support Tools
from Microsoft). You must know the LDAP server’s IP address.
NOTE:
If you do not have access to the
ldapsearch
command, use the
ldp.exe
command.
Issue the
ldapsearch
command and record the displayed
dnsHostName
(the value
used for the
ldap-server-hn
parameter; this is only necessary when setting CA
certificates).
Run
ldp.exe
as follows:
1.
Click
Start
Run
.
2.
In the
Open
box, enter
ldp
and click
OK
.
3.
The
Ldp
window opens.
4.
In the
Ldp
window, click
Connection
Connect
.
5.
In the
Server
box, enter the Active Directory server’s IP address and click
OK
.
The root DSE attributes and values are displayed in the right-side pane.
6.
Record the displayed
dnsHostName
(the value used for the
ldap-server-hn
parameter; only necessary if setting CA certificates).
2.
Set the address to which the LDAP server will connect by issuing the
setauthparam
ldap-server <IP_address>
command, where
<IP_address>
is your LDAP server’s IP
address.
28
Managing User Accounts and Connections