HP A7533A HP StorageWorks Fabric OS 6.1.1 administrator guide (5697-0235, Dece - Page 70

aaaConfig

Page 70 highlights

To enable LDAP service, you will need to install a certificate on the Microsoft Active Directory server. The configuration applies to all switches and on a Director the configuration replicates itself on a standby CP blade if one is present. It is saved in a configuration upload and applied in a configuration download. You should configure at least two RADIUS servers so that if one fails, the other will assume service. You can set the configuration with both RADIUS or LDAP service and local authentication enabled so that if the RADIUS or LDAP servers do not respond due to power failure or network problems, the switch uses local authentication. Consider the following effects of the use of RADIUS or LDAP service on other Fabric OS features: • When RADIUS or LDAP service is enabled, all account passwords must be managed on the RADIUS or LDAP server. The Fabric OS mechanisms for changing switch passwords remain functional; however, such changes affect only the involved switches locally. They do not propagate to the RADIUS or LDAP server, nor do they affect any account on the RADIUS or LDAP server. When RADIUS or LDAP is set up for a fabric that contains a mix of switches with and without RADIUS or LDAP support, the way a switch authenticates users depends on whether a RADIUS or LDAP server is set up for that switch. For a switch with RADIUS or LDAP support and configuration, authentication bypasses the local password database. For a switch without RADIUS or LDAP support or configuration, authentication uses the switch's local account names and passwords. • The following behaviors apply to Web Tools: • Web Tools client and server keep a session open after a user is authenticated. A password change on a switch invalidates an open session and requires the user to log in again. When integrated with RADIUS or LDAP, a switch password change on the RADIUS or LDAP server does not invalidate an existing open session, although a password change on the local switch does. • If you cannot log in because of a RADIUS or LDAP server connection problem, Web Tools displays a message indicating server outage. Table 12 outlines the aaaConfig command options used to set up the authentication model. Table 12 Authentication configuration options aaaConfig options --authspec "local" --authspec "radius" --authspec "radius;local" Description Equivalent setting in Fabric OS 5.1.0 and earlier --radius --switchdb1 Replaces --localonly. Off On Default setting. Authenticates management connections against the local database only. If the password does not match or the user is not defined, the login fails. Replaces --radiusonly On Off Authenticates management connections against the RADIUS database(s) only. If the RADIUS service is not available or the credentials do not match, the login fails. Replaces --radiuslocal. Authenticates management connections against any RADIUS databases first. If RADIUS fails for any reason, authenticates against the local user database. not supported not supported 70 Managing user accounts

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496

70
Managing user accounts
To enable LDAP service, you will need to install a certificate on the Microsoft Active Directory server.
The configuration applies to all switches and on a Director the configuration replicates itself on a standby
CP blade if one is present. It is saved in a configuration upload and applied in a configuration download.
You should configure at least two RADIUS servers so that if one fails, the other will assume service.
You can set the configuration with both RADIUS or LDAP service and local authentication enabled so that if
the RADIUS or LDAP servers do not respond due to power failure or network problems, the switch uses
local authentication.
Consider the following effects of the use of RADIUS or LDAP service on other Fabric OS features:
When RADIUS or LDAP service is enabled, all account passwords must be managed on the RADIUS or
LDAP server. The Fabric OS mechanisms for changing switch passwords remain functional; however,
such changes affect only the involved switches locally. They do not propagate to the RADIUS or LDAP
server, nor do they affect any account on the RADIUS or LDAP server.
When RADIUS or LDAP is set up for a fabric that contains a mix of switches with and without RADIUS
or LDAP support, the way a switch authenticates users depends on whether a RADIUS or LDAP server is
set up for that switch. For a switch with RADIUS or LDAP support and configuration, authentication
bypasses the local password database. For a switch without RADIUS or LDAP support or configuration,
authentication uses the switch’s local account names and passwords.
The following behaviors apply to Web Tools:
Web Tools client and server keep a session open after a user is authenticated. A password change
on a switch invalidates an open session and requires the user to log in again. When integrated with
RADIUS or LDAP, a switch password change on the RADIUS or LDAP server does not invalidate an
existing open session, although a password change on the local switch does.
If you cannot log in because of a RADIUS or LDAP server connection problem, Web Tools displays
a message indicating server outage.
Table 12
outlines the
aaaConfig
command options used to set up the authentication model.
Table 12
Authentication configuration options
aaaConfig
options
Description
Equivalent setting in Fabric
OS 5.1.0 and earlier
--
radius
--
switchdb
1
--authspec “local”
Replaces
--localonly
.
Default setting. Authenticates
management connections against the
local database only.
If the password does not match or the
user is not defined, the login fails.
Off
On
--authspec “radius”
Replaces
--radiusonly
Authenticates management connections
against the RADIUS database(s) only.
If the RADIUS service is not available or
the credentials do not match, the login
fails.
On
Off
--authspec “radius;local”
Replaces
--radiuslocal
.
Authenticates management connections
against any RADIUS databases first.
If RADIUS fails
for any reason
,
authenticates against the local user
database.
not
supported
not supported