Previous Topic: Create the OTK/OIDC Database (PostgreSQL)Next Topic: Create a JDBC Connection to the OTK/OIDC Database (Oracle)


Create an Identity Provider for CA Directory

Create an Identity Provider for CA Directory, which acts as the OpenID UserInfo Endpoint. This allows CloudMinder to act as an external Identity Provider for applications you want to authenticate via OAuth.

Note: Perform this procedure for each tenant for which you configure CA CloudMinder as an external IdP using OAuth. You only need to do this once per tenant, not once per OAuth client for that tenant.

Follow these steps:

  1. Navigate to the Layer 7 Policy Manager web interface at the following URL:

    https://<GATEWAY_ONE_HOSTNAME>:8443/ssg/webadmin

  2. Log in using the credentials that were created during installation for the Gateway admin user.
  3. In the upper-left pane, click the Identity Providers tab.
  4. In main window area, click Create LDAP Identity Provider.

    The Create LDAP Identity Provider Wizard opens.

  5. Under Provider Type, select GenericLDAP.
  6. In the Provider Name field, enter a meaningful name for the CA Directory Identity Provider.

    For example, enter CA Directory.

  7. In the LDAP Host URL field, enter the following:
    ldap://<LOAD BALANCER VIP>:20498
    

    The DxRouter instances to which the Layer 7 Gateway connects run on the same machine as the SiteMinder Policy Server. For <LOAD BALANCER VIP>, enter the VIP of the SiteMinder Policy Server used on the application tier load balancer.

    20498 is the is the LDAP port on which the Gateway is listening. Use this port number unless you have changed the LDAP port.

  8. In the Search Base field, enter your LDAP search root.

    For example, ou=xxx,ou=xxx,o=xxx

    To locate this information, log in to the CSP console, click Infrastructure, then Directory, then User Directories. Click to view the User Directory for your tenant. Under LDAP Search, the values labeled Root are your LDAP search root. Copy and Paste these values into the Search Base field.

  9. In the Bind DN field, enter your bind DN.

    For example, cn=xxx,ou=xxx,ou=xxx,o=xxx

    To locate this information, log in to the CSP console, click Infrastructure, then Directory, then User Directories. Click to view the User Directory for your tenant. Under Administrator Credentials, the values labeled Username are your Bind DN. Copy and Paste these values into the Bind DN field.

  10. In the Bind Password field, enter your bind password.

    This is the LDAP database connection password, specified during creation of the LDAP server. If you do not know this password, see your LDAP administrator.

  11. Click Test to verify the connection.
  12. Click Ok.
  13. Click Finish.