HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.2 administrator guide (5697-0 - Page 94

Creating a user, Creating a group, Assigning the group role to the user, Adding an Admin Domain list

Page 94 highlights

1. Install a Certificate Authority (CA) certificate on the Windows Active Directory server for LDAP. Follow Microsoft instructions for generating and installing CA certificates on a Windows server. 2. Create a user in Microsoft Active Directory server. For instructions on how to create a user, see www.microsoft.com or Microsoft documentation to create a user in your Active Directory. 3. Create a group name that uses the switch's role name so that the Active Directory group's name is the same as the switch's role name. or Use the ldapCfg --maprole ldap_role_name switch_role command to map an LDAP server role to one of the default roles available on the switch. 4. Associate the user to the group by adding the user to the group. For instructions on how to create a user see www.microsoft.com or Microsoft documentation. 5. Add the user's Administrative Domains to the CN_list by editing the adminDescription value. This will map the Admin Domains to the user name. Multiple Admin Domains can be added as a string value separated by the underscore character ( _ ). Creating a user To create a user in Active Directory, see www.microsoft.com or Microsoft documentation. There are no special attributes to set. You can use a fully qualified name for logging in, for example you can log in as [email protected]. Creating a group To create a group in Active Directory, see www.microsoft.com or Microsoft documentation. You will need to verify that the group has the following attributes: • The name of the group has to match the RBAC role. • The Group Type must be Security. • The Group Scope must be Global. Assigning the group (role) to the user To assign the user to a group in Active Directory, see www.microsoft.com or Microsoft documentation. You will need to verify that the user has the following attributes: • Update the memberOf field with the login role (Root, Admin, SwitchAdmin, User, etc.) that the user must use to log in to the switch. • If you have a user-defined group, use the ldapCfg --maprole ldap_role_name switch_role command to map an LDAP server role to one of the default roles available on a switch. Adding an Admin Domain list 1. From the Windows Start menu, select Programs > Administrative Tools > ADSI.msc ADSI is a Microsoft Windows Resource Utility. This will need to be installed to proceed with the rest of the setup. For Windows 2003, this utility comes with Service Pack 1 or you can download this utility from the Microsoft web site. 2. Go to CN=Users. 3. Right click on select Properties. Click the Attribute Editor tab. 4. Double-click the adminDescription attribute. This opens the String Attribute Editor dialog box. 5. Perform the appropriate action based on whether you are using Administrative Domains or Virtual Fabrics: • If you are using Administrative Domains, enter the value of the Admin Domain separated by an underscore ( _ ) into the Value field. 94 Managing user accounts

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576

94
Managing user accounts
1.
Install a Certificate Authority (CA) certificate on the Windows Active Directory server for LDAP.
Follow Microsoft instructions for generating and installing CA certificates on a Windows server.
2.
Create a user in Microsoft Active Directory server.
For instructions on how to create a user, see
www.microsoft.com
or Microsoft documentation to create a
user in your Active Directory.
3.
Create a group name that uses the switch’s role name so that the Active Directory group’s name is the
same as the switch’s role name.
or
Use the
ldapCfg -–maprole
ldap_role_name switch_role
command to map an LDAP
server role to one of the default roles available on the switch.
4.
Associate the user to the group by adding the user to the group.
For instructions on how to create a user see
www.microsoft.com
or Microsoft documentation.
5.
Add the user’s Administrative Domains to the CN_list by editing the
adminDescription
value.
This will map the Admin Domains to the user name. Multiple Admin Domains can be added as a string
value separated by the underscore character ( _ ).
Creating a user
To create a user in Active Directory, see
www.microsoft.com
or Microsoft documentation. There are no
special attributes to set. You can use a fully qualified name for logging in, for example you can log in as
.
Creating a group
To create a group in Active Directory, see
www.microsoft.com
or Microsoft documentation. You will need to
verify that the group has the following attributes:
The name of the group has to match the RBAC role.
The Group Type must be
Security
.
The Group Scope must be
Global
.
Assigning the group (role) to the user
To assign the user to a group in Active Directory, see
www.microsoft.com
or Microsoft documentation. You
will need to verify that the user has the following attributes:
Update the
memberOf
field with the login role (Root, Admin, SwitchAdmin, User, etc.) that the user must
use to log in to the switch.
If you have a user-defined group, use the
ldapCfg -–maprole
ldap_role_name switch_role
command to map an LDAP server role to one of the default roles available on a switch.
Adding an Admin Domain list
1.
From the Windows Start menu, select
Programs > Administrative Tools > ADSI.msc
ADSI is a Microsoft Windows Resource Utility. This will need to be installed to proceed with the rest of
the setup. For Windows 2003, this utility comes with Service Pack 1 or you can download this utility
from the Microsoft web site.
2.
Go to
C
N=Users.
3.
Right click on select
Properties
. Click the
Attribute Editor
tab.
4.
Double-click the
adminDescription
attribute.
This opens the String Attribute Editor dialog box.
5.
Perform the appropriate action based on whether you are using Administrative Domains or Virtual
Fabrics:
If you are using Administrative Domains, enter the value of the Admin Domain separated by an
underscore ( _ ) into the
Value
field.