IBM BS029ML Self Help Guide - Page 88

How do I prepare for WebSphere Portal Server LDAP security, LDAP security options, LookAside

Page 88 highlights

Filtering group information: The default filter information provided with your LDAP server is very generic in nature and geared toward searching and entire directory. Custom filters should be used to drill down to the subset of users in the LDAP tree to reduce the number of LDAP calls and improve overall performance of your portal. LDAP security options Enabling a WebSphere Portal Server connection to an LDAP registry with realms Realms allow you to create group users from one or more LDAP Directory Information Trees and present them as a single entity to WebSphere Portal Server. Realms were introduced in WebSphere Portals Server Version 5.1, but support was limited to one registry. WebSphere Portal Sever V6 allows for the usage of multiple registries with realm enablement. Enabling WebSphere Portal Server connection to an LDAP Registry without realms When you enable security without realm support, only one user registry can be created. If your user information is contained in one LDAP, then you have the option of enabling security without realm support. For scalability and flexibility purposes, we recommend that you enable security with realm support. Note: At the time of the writing of this Redpaper, Web Content Management does not currently support WebSphere Portal Server environments with multiple realms. So you can either configure without realms or configure one realm in the WMM configuration files. Web Content Management is supported to use multiple registries, but they all need to be configured in the default realm. Planned support for multi-realms with WCM will be made available in a future release. LookAside LookAside is a repository that resides in the WebSphere Member Manager database. The purpose of LookAside is to provide the option to add additional attributes that do not correspond to a typical LDAP database. The LookAside option is available when configuring LDAP security with realms or without. Enabling LookAside can be done by setting the parameter LookAside=true in the wpconfig.properties file. Note: If you are planning to use Web Content Management, the LookAside database is required. 3.3.2 How do I prepare for WebSphere Portal Server LDAP security The following presents the general steps you should take before you perform the enable security process. 1. LDAP installation, configuration and validation: The installation and configuration of your LDAP server should be completed by this phase. Performance tuning should be completed according to the recommendations in the LDAP server's documentation and monitoring tools. A good way to test your LDAP configuration is to perform a search using the ldapsearch utility to confirm that your LDAP is operational. - Anonymous search: ldapsearch -s base -h ldaphostname "objectClass=*" - Using a Bind ID: ldapsearch -h ldaphostname -D "cn=wpsbind,o=co" -w "wpsbind" -s base "objectClass=*" 74 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

74
IBM WebSphere Portal V6 Self Help Guide
±
Filtering group information: The default filter information provided with your LDAP server is
very generic in nature and geared toward searching and entire directory. Custom filters
should be used to drill down to the subset of users in the LDAP tree to reduce the number
of LDAP calls and improve overall performance of your portal.
LDAP security options
±
Enabling a WebSphere Portal Server connection to an LDAP registry with realms
Realms allow you to create group users from one or more LDAP Directory Information
Trees and present them as a single entity to WebSphere Portal Server. Realms were
introduced in WebSphere Portals Server Version 5.1, but support was limited to one
registry. WebSphere Portal Sever V6 allows for the usage of multiple registries with realm
enablement.
±
Enabling WebSphere Portal Server connection to an LDAP Registry without realms
When you enable security without realm support, only one user registry can be created. If
your user information is contained in one LDAP, then you have the option of enabling
security without realm support. For scalability and flexibility purposes, we recommend that
you enable security with realm support.
LookAside
LookAside is a repository that resides in the WebSphere Member Manager database. The
purpose of LookAside is to provide the option to add additional attributes that do not
correspond to a typical LDAP database. The LookAside option is available when configuring
LDAP security with realms or without. Enabling LookAside can be done by setting the
parameter
LookAside=true
in the wpconfig.properties file.
3.3.2
How do I prepare for WebSphere Portal Server LDAP security
The following presents the general steps you should take before you perform the enable
security process.
1.
LDAP installation, configuration and validation: The installation and configuration of your
LDAP server should be completed by this phase. Performance tuning should be
completed according to the recommendations in the LDAP server’s documentation and
monitoring tools. A good way to test your LDAP configuration is to perform a search using
the
ldapsearch
utility to confirm that your LDAP is operational.
Anonymous search:
ldapsearch -s base -h ldaphostname “objectClass=*”
Using a Bind ID:
ldapsearch -h ldaphostname -D “cn=wpsbind,o=co” -w “wpsbind” -s base
“objectClass=*”
Note:
At the time of the writing of this Redpaper, Web Content Management does not
currently support WebSphere Portal Server environments with multiple realms. So you can
either configure without realms or configure one realm in the WMM configuration files. Web
Content Management is supported to use multiple registries, but they all need to be
configured in the default realm. Planned support for multi-realms with WCM will be made
available in a future release.
Note:
If you are planning to use Web Content Management, the LookAside database is
required.