Configure a connection to an external administrator store.
Before you configure an external administrator store connection, consider the following items:
Important! Discontinuing the use of the policy store as the source of administrator identities is permanent. Configuring an external administrator store only affects the Administrative UI that is configured to use the external store. Any other Administrative UI not yet configured to use the external store continues to use the policy store to identify administrators.
Important! External administrator authentication does not let a single Legacy Administrator account retain rights to the Administrative UI, the Policy Management API, and Trusted Host privileges simultaneously. If a Legacy Administrator must continue functioning in these roles, leave the Legacy Administrator unchanged. Be sure that the user is present in the external store and separately configure a new Administrator using the external user identity.
Delegate permissions to new Administrators with external super user.
Example: If you configured the first connection with 172.16.0.0, create subsequent connections with 172.16.0.0. If you configured the first connection with comp001@example.com, create subsequent connections with comp001@example.com.
If you are configuring the external administrator store connection over SSL, consider the following items:
Note: For more information about configuring the directory server for SSL, see your vendor–specific documentation.
Note: For more information about implementing a certificate database, see your vendor–specific documentation.
If you are configuring a connection to a directory server, gather the following information:
If you are configuring a connection to a database, gather the following information:
Important! If you are configuring a connection to Oracle, be sure to set the default schema for this user. The default schema must be the schema that is associated with the table that contains the administrative users. If you do not set the default schema for this user, the Administrative Authentication wizard cannot locate users in the database.
If you are configuring a connection to a relational database, the Administrative UI requires a JDBC data source to communicate with the administrator store. A utility is required to create the data source. If you installed the Administrative UI using the stand-alone option, the smjdbcsetup utility is provided for you.
Note: If you installed the Administrative UI to an existing application server, see your vendor-specific documentation for information about deploying a JDBC data source. If you are deploying a data source to WebSphere, verify that the JNDI name (under the datasource properties) begins with the following characters:
jdbc/
Example: If the datasource name is abc, then the JNDI name is jdbc/abc.
Follow these steps:
Specifies the Administrative UI installation path.
smjdbcsetup.bat
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
smjdbcsetup.sh
The utility prompts you for a unique identifier. The utility appends the identifier to the data source.
The utility prompts you for a database driver type. The driver types are prefixed with a number.
The utility prompts you for the name of the database host system.
The utility prompts you for the port on which the database is listening.
The utility prompts you for the database user account name.
Note: This user account must have read/write permissions to the database.
The utility prompts you for the password of the database user.
The connection details appear.
The utility deploys the data source to admin_ui_home\CA\SiteMinder\adminui\server\default\deploy and prompts you to restart the CA SiteMinder® Administrative UI service.
admin_ui_home
Specifies the Administrative UI installation path.
Note: Restarting the CA SiteMinder® Administrative UI service is required before you can use the data source to create the connection.
The data source is configured and the utility exits.
Change the source of administrator identities from the policy store to the external store by configuring a connection.
Follow these steps:
Be sure to select an agent that is configured with CA SiteMinder® SPS or an agent that is configured to function with a reverse proxy server.
The wizard prompts you for connection details.
Important! If multiple Administrative UI instances are to use the same administrator authentication store, take note of the network identifier you enter. Mixing network identifiers for multiple Administrative UI connections to the same external administrator authentication store is not supported.
Example: If you configure the first connection with 172.16.0.0, create subsequent connections with 172.16.0.0. If you configure the first connection with comp001@example.com, create subsequent connections with comp001@example.com.
Important! If you are configuring the connection over SSL, enter an SSL–enabled port. If you do not, the Administrative Authentication wizard becomes unresponsive.
Note: The directory server must communicate over SSL. For more information about configuring the directory server for SSL, see your vendor–specific documentation.
Note: This user must have read/write permissions to the directory server.
The wizard prompts you to search for a user.
Important! Do not point to any attribute that is used or written to by the LDAP or any other applications. If this situation happens, you are redirected to the /logout.jsp page and unable to log in to the Administrative UI.
Note: You can only select one user. This user becomes the superuser when the connection is configured.
Important! Restart the application server manually before you log in with the new credentials of administrator.
Change the source of administrator identities from the policy store to the external store by configuring the connection.
Follow these steps:
Pick an agent that is configured to function with a reverse proxy server.
Note: If data sources do not appear, click Cancel and deploy a JDBC data source to the application server. You cannot create the connection without a deployed data source.
Note: Leave the question mark (?) at the end of the query.
Example: select SmUser.FirstName + ' ' + SmUser.LastName from SmUser where SmUser.UserID = ?
Note: This user becomes the super user.
Important! After you configure an external administrator store, restart the application server manually before you log in with the new credentials of administrator.
If a Legacy Administrator must continue using the Administrative UI or Policy Server tools after configuring a connection to an external administrator store, migrate the permissions.
Important! External administrator authentication does not let a single Legacy Administrator account retain rights to the following items simultaneously:
If a Legacy Administrator must continue functioning in one or more of these roles, leave the Legacy Administrator unchanged. Verify that the user is present in the external store and separately configure a new Administrator using the external user identity.
Follow these steps:
Note: Verify that the administrator is present in the external store. Log in to the Administrative UI using the external super user.
The Administrative UI authenticates the administrator using the external store. The administrator has the same level of access to the Administrative UI when the policy store was being used to store administrator identities.
When the credentials that the Administrative UI uses to connect to the external administrator store change, submit the new credentials to the Administrative UI. Otherwise the administrators lose access.
If you installed the Administrative UI using the stand–alone option, the following utilities are available:
Note: To update the directory server host system name or port information, use the Administrative UI to re–create the connection to the external administrator store. The smjndisetup utility cannot update host or port information.
Note: To update the database host system name or port information, use the smjdbcsetup utility to re–deploy the JNDI data source.
If you installed the Administrative UI to an existing application server infrastructure, reveiw the following items:
Important! After you use the wizard to update the credentials, update the credentials on the directory server as soon as possible. Administrators cannot log in to the Administrative UI until the directory server credentials are updated to match the credentials you supplied using the wizard.
Update directory manager credentials with the smjndisetup utility.
Note: The smjndisetup utility can only update connection details that were configured using the Administrative UI. You cannot use the smjndisetup utility to create the connection credentials.
Follow these steps:
Specifies the Administrative UI installation path.
smjndisetup.bat --reset-password
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
smjndisetup.sh --reset-password
Use the smjdbcsetup utility to update database user credentials in the JNDI data source.
To update database credentials
Specifies the Administrative UI installation path.
smjdbcsetup.bat --reset-password
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
smjdbcsetup.sh --reset-password
The utility prompts you to enter a unique identifier.
Note: If you do not know the data source name, you can locate all deployed data sources in administrative_ui_home\SiteMinder\adminui\server\default\deploy.
Specifies the Administrative UI installation path.
The utility prompts you for the database user name.
The utility prompts you for the user password.
The utility prompts you to verify the new data source credentials and verify that they can be updated.
The utility updates the data source.
Note: For more information about starting the CA SiteMinder® Administrative UI service, see the Policy Server Installation Guide.
Run the Administrative Authentication wizard again to change the external store to which the Administrative UI connects for administrator authentication.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|