IBM BS029ML Self Help Guide - Page 145

TAM configuration failed, Check wpconfig.properties, Connection to TAM Policy Server

Page 145 highlights

the search base to verify whether the user is in every one of them. When configuring WebSphere Application Server security, you can take advantage of this feature if the underlying LDAP has such an attribute. For example, in the case of IBM Tivoli Directory Server, you can specify "ibm-allGroups:uniqueMember;ibm-allGroups:member". In the case of Microsoft Active Directory, you can specify "mmeberOf:member". In WebSphere Application Server V6.0.2.13 or later, a different baseDN can be specified for group search. You can add a custom property under the LDAP Advanced settings: com.ibm.websphere.security.ldap.groupBaseDn This should give you narrower search space in order to locate the groups faster. When the security is enabled with realm support, then the search of users and groups is entirely controlled by WMM configurations. So you can set similar configurations in wmm.xml. The configuration fields are: groupMemberAttributeMap: This is similar to the first case in "group member id map". A example is "groupOfUniqueMembers:uniqueMember". groupMembershipAttributeMap: This is similar to the second case for the group membership attribute defined in user record. Examples are "ibm-allGroups:uniqueMember" for IBM Tivoli Directory Server and "memberOf:member" for Microsoft Active Directory. groupDynamicMemberAttributeMap: WMM added this parameter for dynamic group support. An example is "groupOfURLs:memberURL". Another common cause of the search problem is SizeLimitExceededException. In wmm.xml, a default maxSearchResults is defined to be 200. You can manually change the value by directly editing the file, if you anticipate that the returned results will be larger. However, if the sizelimit has to be set very large to accommodate the search result, you may want to consider refining the search or redesigning the LDAP structure. To debug the problems in searching users or groups, it is always a good idea to generate the LDIF of the branch of the LDAP tree to verify the users and groups and compare the configurations in WMM. TAM configuration failed Most of problems of the integration of WebSphere Portal and TAM occur in the configuration phase. As we stated earlier in this chapter, the configuration tasks are intended to run in fairly general scenarios. If your configuration deviates from those presented in the WebSphere Portal Information Center, you may encounter problems. Usually, manual configurations through the TAM admin utility pdadmin are likely required. Check wpconfig.properties Make sure the entries in the file are entered correctly. The TAM administrator user ID and password must be validated before trying the configuration tasks. Connection to TAM Policy Server The task validate-pdamin-connection was designed to verify the connection. This is to make sure the portal server can correctly communicate with the TAM Policy Server. If the TAM runtime was set up on the portal correctly, this task should be successful. Chapter 4. WebSphere Portal security 131

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
131
the search base to verify whether the user is in every one of them. When configuring
WebSphere Application Server security, you can take advantage of this feature if the
underlying LDAP has such an attribute. For example, in the case of IBM Tivoli Directory
Server, you can specify “ibm-allGroups:uniqueMember;ibm-allGroups:member”. In the
case of Microsoft Active Directory, you can specify “mmeberOf:member”.
In WebSphere Application Server V6.0.2.13 or later, a different baseDN can be specified for
group search. You can add a custom property under the LDAP Advanced settings:
com.ibm.websphere.security.ldap.groupBaseDn
This should give you narrower search space in order to locate the groups faster.
When the security is enabled with realm support, then the search of users and groups is
entirely controlled by WMM configurations. So you can set similar configurations in wmm.xml.
The configuration fields are:
±
groupMemberAttributeMap: This is similar to the first case in "group member id map". A
example is “groupOfUniqueMembers:uniqueMember”.
±
groupMembershipAttributeMap: This is similar to the second case for the group
membership attribute defined in user record. Examples are
“ibm-allGroups:uniqueMember” for IBM Tivoli Directory Server and “memberOf:member”
for Microsoft Active Directory.
±
groupDynamicMemberAttributeMap: WMM added this parameter for dynamic group
support. An example is “groupOfURLs:memberURL”.
Another common cause of the search problem is SizeLimitExceededException. In wmm.xml,
a default maxSearchResults is defined to be 200. You can manually change the value by
directly editing the file, if you anticipate that the returned results will be larger. However, if the
sizelimit has to be set very large to accommodate the search result, you may want to consider
refining the search or redesigning the LDAP structure.
To debug the problems in searching users or groups, it is always a good idea to generate the
LDIF of the branch of the LDAP tree to verify the users and groups and compare the
configurations in WMM.
TAM configuration failed
Most of problems of the integration of WebSphere Portal and TAM occur in the configuration
phase. As we stated earlier in this chapter, the configuration tasks are intended to run in fairly
general scenarios. If your configuration deviates from those presented in the WebSphere
Portal Information Center, you may encounter problems. Usually, manual configurations
through the TAM admin utility
pdadmin
are likely required.
Check wpconfig.properties
Make sure the entries in the file are entered correctly. The TAM administrator user ID and
password must be validated before trying the configuration tasks.
Connection to TAM Policy Server
The task validate-pdamin-connection was designed to verify the connection. This is to make
sure the portal server can correctly communicate with the TAM Policy Server. If the TAM
runtime was set up on the portal correctly, this task should be successful.