IBM BS029ML Self Help Guide - Page 113

Adding application specific attributes to users and groups, LWP_Security_ext

Page 113 highlights

In the following discussion, we assume the user IDs used for the purposes above are all different. After the discussion, readers can easily extrapolate the cases if the user IDs may play multiple roles. The portal Admin user's password is not stored in any of the portal databases, unless the security is enabled using the database as the user registry, such as the default WMMUR DB. So the password of the portal admin user can be changed through the portal Edit My Profile page, if portal is configured to be able to do so, or can be changed directly in the LDAP server. After the password change, the portal admin user should work fine, but you may find exceptions during the portal startup. This is due to RunAs roles configured on some of the enterprise applications deployed on the Application Server. Check the ones listed here: LWP_CAI LWP_Security_ext LWP_TAI pznscheduler.ear The portal admin user ID and the group DN cannot be simply replaced without re-configuring security, which mainly involves disabling security, modifying LDAP information in wpconfig.properties, and re-enabling security. The WebSphere Application Server admin user can be a little trickier, since the password is stored in configuration XML files. Timing is the key. The password should be updated in the Administrative Console. Before the password is changed in LDAP, you must have the Application Server running and already logged in to the Administrative Console. After the password is changed on the LDAP server, you can then change the password in the admin console. Restart the server to make sure the change is successful. Within a cluster, the password should be changed through the Deployment Manager. The process of changing the password of LDAPBindID is similar to that of the WebSphere Application Server admin user. The password for the WMM bind user ID (LDAPAdminUId) must be encrypted by using wmm_encrypt.bat/.sh, and written into wmm.xml (adminPassword). 4.2.4 Adding application specific attributes to users and groups With an LDAP server configuration, a set of default attributes have already been defined based on a standard objectclass, such as inetOrgPerson for users. In many cases, some new attributes, not available in the standard objectclass, are required for the applications. There are a couple of ways to accomplish this task. Chapter 4. WebSphere Portal security 99

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
99
In the following discussion, we assume the user IDs used for the purposes above are all
different. After the discussion, readers can easily extrapolate the cases if the user IDs may
play multiple roles.
The portal Admin user’s password is not stored in any of the portal databases, unless the
security is enabled using the database as the user registry, such as the default WMMUR DB.
So the password of the portal admin user can be changed through the portal Edit My Profile
page, if portal is configured to be able to do so, or can be changed directly in the LDAP
server. After the password change, the portal admin user should work fine, but you may find
exceptions during the portal startup. This is due to RunAs roles configured on some of the
enterprise applications deployed on the Application Server. Check the ones listed here:
±
LWP_CAI
±
LWP_Security_ext
±
LWP_TAI
±
pznscheduler.ear
The WebSphere Application Server admin user can be a little trickier, since the password is
stored in configuration XML files. Timing is the key. The password should be updated in the
Administrative Console. Before the password is changed in LDAP, you must have the
Application Server running and already logged in to the Administrative Console. After the
password is changed on the LDAP server, you can then change the password in the admin
console. Restart the server to make sure the change is successful. Within a cluster, the
password should be changed through the Deployment Manager.
The process of changing the password of LDAPBindID is similar to that of the WebSphere
Application Server admin user.
The password for the WMM bind user ID (LDAPAdminUId) must be encrypted by using
wmm_encrypt.bat/.sh, and written into wmm.xml (adminPassword).
4.2.4
Adding application specific attributes to users and groups
With an LDAP server configuration, a set of default attributes have already been defined
based on a standard objectclass, such as inetOrgPerson for users. In many cases, some new
attributes, not available in the standard objectclass, are required for the applications. There
are a couple of ways to accomplish this task.
The portal admin user ID and the group DN cannot be simply replaced without
re-configuring security, which mainly involves disabling security, modifying LDAP
information in wpconfig.properties, and re-enabling security.