HP 3PAR StoreServ 7400 2-node HP 3PAR Command Line Interface Administrator& - Page 30

Configuring Account Location Parameters, Details, Copy to File, Base-64 encoded x.5098, Finish

Page 30 highlights

b. Select the Details tab. c. Click Copy to File.... d. Click Next. e. Select Base-64 encoded x.5098 format. f. Click Next. g. Click Browse... and select a filename for the certificate (ending in the .cer file extension) and a folder in which the certificate will be stored. h. Click Next and then Finish. Or, use the openssl x509 program. 3. Set the certificate using the setauthparam ladp-ssl-cacert command, where is the name of the certificate you previously located or converted. Example: openssl x509 -inform DER -in ca.crt -outform PEM -out ca.cer In the example above, the openssl x509 command is used to convert the CA certificate from ca.crt format to ca.cer format, which can then be used with the setauthparam command. setauthparam -f ldap-ssl-cacert ca.cer In the example above, the setauthparam command is issued to set the CA certificate to the ca.cer file. Configuring Account Location Parameters To configure the account location parameters: 1. If you are unsure of the user's account information, select a known user's full name (to be entered as the cn value) and run the ldapsearch command using the defaultNamingContext value previously displayed in "Configuring Connection Parameters" (page 28). Make a note of the group information displayed in the command's output. 2. Issue the setauthparam accounts-dn command. 3. Issue the setauthparam account-obj user command. 4. Issue the setauthparam account-name-attr sAMAccount command. 5. Issue the setauthparam memberof-attr memberOf command. NOTE: You must know the user's password in order to successfully use the checkpassword command. 6. Issue the checkpassword command to obtain information about the user's group memberships from the LDAP server. Example: % ldapsearch -LLL -x -H ldap://192.168.10.13 -D 'NTDOM1\joeadmin' -W -b DC=3par,DC=com -s sub '(cn=3PARuser)' dn Enter LDAP Password: dn: CN=3PAR User,OU=Engineering,OU=Users,DC=3par,DC=com 30 Managing User Accounts and Connections

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

b.
Select the
Details
tab.
c.
Click
Copy to File
....
d.
Click
Next
.
e.
Select
Base-64 encoded x.5098
format.
f.
Click
Next
.
g.
Click
Browse...
and select a filename for the certificate (ending in the
.cer
file extension)
and a folder in which the certificate will be stored.
h.
Click
Next
and then
Finish
.
Or, use the
openssl x509
program.
3.
Set the certificate using the
setauthparam ladp-ssl-cacert <certicate>
command,
where
<certificate>
is the name of the certificate you previously located or converted.
Example
:
openssl x509 -inform DER -in ca.crt -outform PEM -out ca.cer
In the example above, the
openssl x509
command is used to convert the CA certificate
from
ca.crt
format to
ca.cer
format, which can then be used with the
setauthparam
command.
setauthparam -f ldap-ssl-cacert ca.cer
In the example above, the
setauthparam
command is issued to set the CA certificate to the
ca.cer
file.
Configuring Account Location Parameters
To configure the account location parameters:
1.
If you are unsure of the user’s account information, select a known user’s full name (to be
entered as the
cn
value) and run the
ldapsearch
command using the
defaultNamingContext
value previously displayed in
“Configuring Connection Parameters”
(page 28)
. Make a note of the group information displayed in the command’s output.
2.
Issue the
setauthparam accounts-dn <DN_path>
command.
3.
Issue the
setauthparam account-obj user
command.
4.
Issue the
setauthparam account-name-attr sAMAccount
command.
5.
Issue the
setauthparam memberof-attr memberOf
command.
NOTE:
You must know the user’s password in order to successfully use the
checkpassword
command.
6.
Issue the
checkpassword
command to obtain information about the user’s group memberships
from the LDAP server.
Example
:
% ldapsearch -LLL -x -H ldap://192.168.10.13 -D 'NTDOM1\joeadmin' -W -b
DC=3par,DC=com -s sub '(cn=3PARuser)' dn
Enter LDAP Password:
dn: CN=3PAR User,OU=Engineering,OU=Users,DC=3par,DC=com
30
Managing User Accounts and Connections