What you will need:
- You must know FQND or IP of your Domino server
- LDAP port 389 as standard
- If your LDAP need to authenticate to reed content, you mast know some account DN and password - this will be used as bind user to bind in to LDAP
- You should have installed WAS (see previous posts)
- Show status of dmgr server
- [root@ic bin]# cd /opt/IBM/WebSphere/AppServer/bin/
- [root@ic bin]# ./serverStatus.sh -all -user wasadmin -password Pass4conn
- If it is not started already, run:
- [root@ic bin]# cd /opt/IBM/WebSphere/AppServer/bin/startManager.sh
- Backup your wimconfig.xml file before doing any changes in the federated repository configuration
- [root@ic bin]# cd /opt/IBM/WebSphere/AppServer/profiles/Dmgr01/config/cells/icCell01/wim/config/
- [root@ic config]# cp wimconfig.xml wimconfig.xml.bak
- Open web browser and go to http://<hostname>:9060/admin
- Login with administrator account wasadmin and your password
- go to Security > Global security and in User account repository click Configure... button
- In Repositories in the realm table click Add Base entry to Realm...
- Click Add Repository and fill
- Repository identifier (enter MyLDAP)
- Select Directory type: IBM Lotus Domino
- Enter Primary host name of your domino server
- If you need bind enter bind and password
- In Login properties you can add more options to login, I added email so there is uid;mail in the field
- Click OK and enter in to field with label: Specifies the Lightweight Directory Access Protocol (LDAP) distinguished name (DN) that uniquely identifies this set of entries in the realm root of your Domino LDAP ... I have o=ys,c=cz
- Click OK and SAVE
- Restart dmgr server:
- [root@ic bin]# /opt/IBM/WebSphere/AppServer/bin/stopManager.sh -user wasadmin -password Pass4conn
- [root@ic bin]# /opt/IBM/WebSphere/AppServer/bin/startManager.sh -user wasadmin -password Pass4conn
- Login again in to web Integrated Solutions Console
- Navigate in to Users and Groups > Manage Users
- Click on Search button. If the expected set of users is returned then LDAP is configured correctly! Make the same for groups and be sure that members of groups are correct.
- Setup SSO
- Go to Security > Global security in Authentication expand Web and SIP security and click Single sign-on (SSO)
- enter .ys.cz ... so .<domain>.com It must start with a dot and continue with domain
- Check Interoperability Mode
- OK and SAVE
- Go to Security > Global security and click on Enable application security
- OK and SAVE
- Sync nodes
- [root@ic bin]# cd /opt/IBM/WebSphere/AppServer/profiles/AppSrv01/bin
- [root@ic bin]# ./syncNode.sh ic.ys.cz 8879 -username wasadmin -password <your password>
No comments:
Post a Comment