HP A7533A HP StorageWorks Fabric OS 6.x administrator guide (5697-0015, May 20 - Page 75

LDAP configuration and Microsoft's Active Directory

Page 75 highlights

6. In the Add Remote Access Policy window, enter an easily identifiable Policy friendly name that will enable you to see the switch login for which the policy is being created; then click Next. 7. After the Add Remote Access Policy window refreshes, click Add. 8. In the Select Attribute window, select Windows Groups and click Add. 9. In the Groups window, click Add. 10. In the Select Groups window, select the user-defined group for which you are creating a policy and click Add. After adding all appropriate groups, click OK. In the Groups window, click OK. 11. In the Add Remote Access Policy window, confirm that the Conditions section displays the group(s) that you selected and click Next. 12. After the Add Remote Access Policy window refreshes, select the Grant remote access permission radio button and click Next. 13. After the Add Remote Access Policy window refreshes again, click Edit Profile. 14. In the Edit Dial-in Profile window, click the Authentication tab and check only the Encrypted Authentication (CHAP) and Unencrypted Authentication (PAP, SPAP) checkboxes; then click the Advanced tab and click Add. 15. In the Add Attributes window, select Vendor-Specific and click Add. 16. In the Multivalued Attribute Information window, click Add. 17. In the Vendor-Specific Attribute Information window, click the Enter Vendor Code radio button and enter the value 1588. Click the Yes. It conforms radio button, and then click Configure Attribute.... 18. In the Configure VSA (RFC compliant) window, enter the following values and click OK. Vendor-assigned attribute number-Enter the value 1. Attribute format-Enter String. Attribute value-Enter the login role (Root, Admin, SwitchAdmin, User, etc.) the user group must use to log in to the switch. 19. In the Multivalued Attribute Information window, click OK. 20.In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added, "Vendor-Specific") and click OK. 21. In the Add Remote Access Policy window, click Finish. After returning to the Internet Authentication Service window, repeat step 5 through step 21 to add additional policies for all login types for which you want to use the RADIUS server. After this is done, you can configure the switch. LDAP configuration and Microsoft's Active Directory LDAP provides user authentication and authorization using Microsoft's Active Directory service in conjunction with LDAP on the switch. The following are restrictions when using LDAP: • In Fabric OS 6.x there will be no password change through Active Directory. • There is no automatic migration of newly created users from local switch database to Active Directory. This is a manual process explained later. • LDAP authentication is used on the local switch only and not for the entire fabric. Roles for users can be added through the Microsoft Management Console. Groups created in Active Directory must correspond directly to the RBAC user roles on the switch. Role assignments can be achieved by including the user in the respective group. A user can be assigned to multiple groups like Switch Admin and Security Admin. For more information on RBAC roles, see "Using Role-Based Access Control (RBAC)" on page 56. NOTE: All instructions involving Microsoft's Active Directory can be obtained from www.microsoft.com. Confer with your network administrator prior to configuration for any special needs your network environment may have. Fabric OS 6.x administrator guide 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518

Fabric OS 6.x administrator guide
75
6.
In the Add Remote Access Policy window, enter an easily identifiable
Policy friendly name
that will
enable you to see the switch login for which the policy is being created; then click
Next
.
7.
After the Add Remote Access Policy window refreshes, click
Add
.
8.
In the Select Attribute window, select
Windows Groups
and click
Add
.
9.
In the Groups window, click
Add
.
10.
In the Select Groups window, select the user-defined group for which you are creating a policy and
click
Add
. After adding all appropriate groups, click
OK
. In the Groups window, click
OK
.
11.
In the Add Remote Access Policy window, confirm that the Conditions section displays the group(s) that
you selected and click
Next
.
12.
After the Add Remote Access Policy window refreshes, select the
Grant remote access
permission
radio button and click
Next
.
13.
After the Add Remote Access Policy window refreshes again, click
Edit Profile
.
14.
In the Edit Dial-in Profile window, click the
Authentication
tab and check only the
Encrypted
Authentication (CHAP)
and
Unencrypted Authentication (PAP, SPAP)
checkboxes; then
click the
Advanced
tab and click
Add
.
15.
In the Add Attributes window, select
Vendor-Specific
and click
Add
.
16.
In the Multivalued Attribute Information window, click
Add
.
17.
In the Vendor-Specific Attribute Information window, click the
Enter Vendor Code
radio button and
enter the value
1588
. Click the
Yes. It conforms
radio button, and then click
Configure
Attribute...
.
18.
In the Configure VSA (RFC compliant) window, enter the following values and click
OK
.
Vendor-assigned attribute number
—Enter the value
1
.
Attribute format
—Enter
String
.
Attribute value
—Enter the login role (Root, Admin, SwitchAdmin, User, etc.) the user group must use
to log in to the switch.
19.
In the Multivalued Attribute Information window, click
OK
.
20.
In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added,
“Vendor-Specific”) and click
OK
.
21.
In the Add Remote Access Policy window, click
Finish
.
After returning to the Internet Authentication Service window, repeat
step 5
through
step 21
to add
additional policies for all login types for which you want to use the RADIUS server. After this is done, you
can configure the switch.
LDAP configuration and Microsoft’s Active Directory
LDAP provides user authentication and authorization using Microsoft's Active Directory service in
conjunction with LDAP on the switch. The following are restrictions when using LDAP:
In Fabric OS 6.x there will be no password change through Active Directory.
There is no automatic migration of newly created users from local switch database to Active Directory.
This is a manual process explained later.
LDAP authentication is used on the local switch only and not for the entire fabric.
Roles for users can be added through the Microsoft Management Console. Groups created in Active
Directory must correspond directly to the RBAC user roles on the switch. Role assignments can be achieved
by including the user in the respective group. A user can be assigned to multiple groups like Switch Admin
and Security Admin. For more information on RBAC roles, see ”
Using Role-Based Access Control (RBAC)
on page 56.
NOTE:
All instructions involving Microsoft’s Active Directory can be obtained from
www.microsoft.com
. Confer with your network administrator prior to configuration for any special
needs your network environment may have.