IBM E02HRLL-G Administration Guide - Page 82

User names and groups, Stopping the use of LDAP authentication, Notes for UNIX users, Console System

Page 82 highlights

User names and groups Groups provide superuser permissions to all users who are members of the Hubadmin group. By using groups, more than one user can have Hub Administrative responsibilities while maintaining password security. Because unique user names are required on an LDAP server, user names must be unique on WebSphere Partner Gateway as well. If you are creating a new user and the user name already exists in the same or a different partner, you will see an error message stating, A User with this name already exists. In this situation, input another user name into the console and continue. If you are migrating to a new version of WebSphere Partner Gateway wherein there is no restriction on user names, then a double asterisk ** is displayed next to any duplicate user name indicating that it already exists in the same or another partner. Change one of the user names so that they are unique from one another. Note: New users and groups, which are added to the LDAP server and WAS Admin console, must also be added in the WebSphere Partner Gateway console in order to be active. Stopping the use of LDAP authentication You might have to stop LDAP authentication under the following circumstances: v The LDAP server stops or permanently goes down. v Container based authentication was chosen when installing WebSphere Partner Gateway but the LDAP server is not ready. Notes for UNIX users: 1. UNIX users who use DB2 must log in as the db2instance user and use the db2instance username and password to run the script. 2. UNIX users who use Oracle must log in as the oracle user and use the username and password given at the time of installation to run the script. To stop WebSphere Partner Gateway from using LDAP for accessing passwords and instead use the WebSphere Partner Gateway database to store passwords, run the following script: v bcgResetAuthentication.bat for Windows v bcgResetAuthentication.sh for UNIX This script requires the following input parameters: - database schema owner user ID - database schema owner password The script requires these parameters to connect to the WebSphere Partner Gateway database. Note: If you are using a DB2 database, start the script from a DB2 command line. This script is located in the {dbloader install location}/scripts/{database type} directory. This script: v Sets the attribute bcg.ldap.containerauth located in the Console System Administration > Console Properties > Common Attributes to False. 76 IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

User names and groups
Groups provide superuser permissions to all users who are members of the
Hubadmin group. By using groups, more than one user can have Hub
Administrative responsibilities while maintaining password security.
Because unique user names are required on an LDAP server, user names must be
unique on WebSphere Partner Gateway as well. If you are creating a new user and
the user name already exists in the same or a different partner, you will see an
error message stating,
A User with this name already exists
. In this situation,
input another user name into the console and continue. If you are migrating to a
new version of WebSphere Partner Gateway wherein there is no restriction on user
names, then a double asterisk ** is displayed next to any duplicate user name
indicating that it already exists in the same or another partner. Change one of the
user names so that they are unique from one another.
Note:
New users and groups, which are added to the LDAP server and WAS
Admin console, must also be added in the WebSphere Partner Gateway console in
order to be active.
Stopping the use of LDAP authentication
You might have to stop LDAP authentication under the following circumstances:
v
The LDAP server stops or permanently goes down.
v
Container based authentication was chosen when installing WebSphere Partner
Gateway but the LDAP server is not ready.
Notes for UNIX users:
1.
UNIX users who use DB2 must log in as the db2instance user and use the
db2instance username and password to run the script.
2.
UNIX users who use Oracle must log in as the oracle user and use the
username and password given at the time of installation to run the script.
To stop WebSphere Partner Gateway from using LDAP for accessing passwords
and instead use the WebSphere Partner Gateway database to store passwords, run
the following script:
v
bcgResetAuthentication.bat
for Windows
v
bcgResetAuthentication.sh
for UNIX
This script requires the following input parameters:
- database schema owner user ID
- database schema owner password
The script requires these parameters to connect to the WebSphere Partner Gateway
database.
Note:
If you are using a DB2 database, start the script from a DB2 command line.
This script is located in the
{
dbloader install location
}/scripts/{
database
type
}
directory.
This script:
v
Sets the attribute
bcg.ldap.containerauth
located in the
Console System
Administration
>
Console Properties
>
Common Attributes
to False.
76
IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide