HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.1.x administrator guide (5697 - Page 77

Programs> Administrative Tools> ADSI.msc, CN=Users, Properties, Attribute Editor,

Page 77 highlights

To set up LDAP: 1. Install a Certificate Authority (CA) certificate on the Windows Active Directory server for LDAP. Follow Microsoft's instructions for generating and installing CA certificates on a Windows server. 2. Create a user in Microsoft Active Directory server. For instructions on how to create a user, refer to Microsoft documentation to create a user in your Active Directory. 3. Create a group name that uses the switch's role name so that the Active Directory group's name is the same as the switch's role name. or Use the ldapCfg --maprole command to to map an LDAP server role to one of the default roles available on the switch. 4. Associate the user to the group by adding the user to the group. For instructions on how to create a user refer to Microsoft documentation to create a user in your Active Directory. 5. Add the user's Administrative Domains to the CN_list by editing the adminDescription value. This will map the admin domains to the user name. Multiple admin domains can be added as a string value separated by the underscore character ( _ ). To create a user: To create a user in Active Directory, refer to www.microsoft.com or Microsoft documentation. There are no special attributes. To create a group: To create a group in Active Directory, refer to www.microsoft.com or Microsoft documentation. You will need to verify that the group uses the following attributes: • The name of the group has to match the RBAC role. • The Group Type must be Security. • The Group Scope must be Global. To assign the group (role) to the user: To assign the user to a group in the Active Directory, refer to www.microsoft.com or Microsoft documentation. You will need to verify that the user has the following attributes: • Update the memberOf field with the login role (Root, Admin, SwitchAdmin, User, etc.) that the user must use to log in to the switch, or • If you have a user-defined group, then use the ldapCfg --maprole to map an LDAP server role to one of the default roles available on a switch. Adding the adlist 1. From the Windows Start menu, select Programs> Administrative Tools> ADSI.msc ADSI is a Microsoft Windows Resource Utility. This will need to be installed to proceed with the rest of the setup. For Windows 2003, this utility comes with Service Pack 1 or you can download this utility from the Microsoft website. 2. Go to CN=Users 3. Right click on Properties. Click the Attribute Editor tab. 4. Double-click the adminDescription attribute. This opens the String Attribute Editor dialog box. 5. Enter the value for the admin domains separated by an underscore ( _ ) into the Value field. Example adlist_0_10_200_endAd Home Admin Domain (homeAD) for the user will be the first value in the adlist (Admin Domain list). If a user has no values assigned in the adlist attribute, then the homeAD '0' will be the default administrative domain for the user. Fabric OS 6.1.x administrator guide 77

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492

Fabric OS 6.1.x administrator guide
77
To set up LDAP:
1.
Install a Certificate Authority (CA) certificate on the Windows Active Directory server for LDAP.
Follow Microsoft’s instructions for generating and installing CA certificates on a Windows server.
2.
Create a user in Microsoft Active Directory server.
For instructions on how to create a user, refer to Microsoft documentation to create a user in your Active
Directory.
3.
Create a group name that uses the switch’s role name so that the Active Directory group’s name is the
same as the switch’s role name.
or
Use the
ldapCfg
-–maprole
<
ldap_role_name
> <
switch_role
>
command to to map an
LDAP server role to one of the default roles available on the switch.
4.
Associate the user to the group by adding the user to the group.
For instructions on how to create a user refer to Microsoft documentation to create a user in your Active
Directory.
5.
Add the user’s Administrative Domains to the CN_list by editing the
adminDescription
value.
This will map the admin domains to the user name. Multiple admin domains can be added as a string
value separated by the underscore character ( _ ).
To create a user:
To create a user in Active Directory, refer to
www.microsoft.com
or Microsoft documentation. There are no
special attributes.
To create a group:
To create a group in Active Directory, refer to
www.microsoft.com
or Microsoft documentation. You will
need to verify that the group uses the following attributes:
The name of the group has to match the RBAC role.
The Group Type must be
Security
.
The Group Scope must be
Global
.
To assign the group (role) to the user:
To assign the user to a group in the Active Directory, refer to
www.microsoft.com
or Microsoft
documentation. You will need to verify that the user has the following attributes:
Update the
memberOf
field with the login role (Root, Admin, SwitchAdmin, User, etc.) that the user
must use to log in to the switch, or
If you have a user-defined group, then use the l
dapCfg -–maprole
<
ldap_role_name
>
<
switch_role
>
to map an LDAP server role to one of the default roles available on a switch.
Adding the adlist
1.
From the Windows Start menu, select
Programs> Administrative Tools> ADSI.msc
ADSI is a Microsoft Windows Resource Utility. This will need to be installed to proceed with the rest of
the setup. For Windows 2003, this utility comes with Service Pack 1 or you can download this utility
from the Microsoft website.
2.
Go to
CN=Users
3.
Right click on
Properties
. Click the
Attribute Editor
tab.
4.
Double-click the
adminDescription
attribute.
This opens the String Attribute Editor dialog box.
5.
Enter the value for the admin domains separated by an underscore ( _ ) into the
Value
field.
Example
adlist_0_10_200_endAd
Home Admin Domain (homeAD) for the user will be the first value in the
adlist
(Admin Domain list). If a
user has no values assigned in the
adlist
attribute, then the homeAD ‘0’ will be the default
administrative domain for the user.