Previous Topic: Settings That Can Appear AnywhereNext Topic: Password Content Settings


General Settings

Trace

Range: n/a

Default: off

Recommended: Yes

Complexity Level: Basic

If this keyword appears, then tracing is turned on within APS. Traces appear in the Policy Server console log. To turn tracing off, comment out or delete this keyword from the file. This affects tracing of authentication and authorization time processing only. To enable tracing for FPS and SmCPW, use the Trace keyword in the SmPortal.cfg file.

This keyword cannot be overridden per user.

Example:

Trace

Timeout

Range: 0-300

Default: 0

Recommended: No

Complexity Level: Advanced

This setting controls how long to wait for a User Directory to respond to a call. This value is for each call, not overall time. If this time limit is exceeded for a single call, a timeout error will result.

The default is zero (no limit or limit enforced by driver). In general, this setting should be used only with great care, since it may cause timeout failures.

This setting is specified in seconds. The maximum is 300 (5 minutes), but should never be used, since a browser session will time out long before the interaction with the directory server.

If an override is required, it must be a restricted override. That is, it can reference the Directory, but not the user.

This setting is supported for ODBC and LDAP directories only. It does affect LDAP Writeback connections.

Example:

Timeout=30

Poll

Range: 10-1000

Default: 100

Recommended: No

Complexity Level: Advanced

This setting controls how long to sleep between checks to see if an ODBC User Directory call has completed. Lower numbers indicate that the driver should be checked more frequently. This may improve response time for the current user, but will increase overall CPU utilization. Higher numbers will decrease user responsiveness, but will use less CPU.

This setting is specified in thousandths of a second. The minimum value is 10 milliseconds (1/100 second) and the maximum is 1000 milliseconds (1 second). Default is 100 milliseconds (1/10 second).

If an override is required, it must be a restricted override. That is, it can reference the Directory, but not the user.

This setting is supported only for ODBC directories. LDAP directories support the Timeout keyword only.

Example:

Poll=500

LDAP Write Back Information

The write back settings indicate where APS should write back information when writing to the LDAP directory. This is used primarily for when SiteMinder is reading from a replicant (consumer) and APS must write back to a master (producer). Instead of attempting the write to the (by definition: read-only) replicant, which will always fail, APS will always write to the Write Back server instead (it will still read from the replicant).

If you know that you are going to be doing referrals on writebacks (if SiteMinder reads from a replicant), use these settings.

Whenever APS needs to write information to an LDAP Directory, it looks for a writeback setting for the current user. If one exists, APS will perform the write to the writeback server instead of to the original server. When the LDAP Directory is configured as a Producer/Consumer (rather than Primary/Backup), this is much more efficient than writing back to the consumer, failing, then referring the write to the producer.

All write backsettings can be overridden. It is not necessary to use the IsLDAP() function with these overrides, since they will only ever be used for LDAP User Directories.

Be careful when using overrides with these settings, since they each override separately. Make sure that there are no "overlaps" in the overrides, where one setting is overridden separately from the others.

When SiteMinder supports referrals in all cases, these keywords will technically no longer be needed; however, they may still be desirable, since performance may be greatly enhanced (since APS will apply changes directly to the master, rather than "bouncing" all writes off of the replicant).

A list of writable servers can be provided, separated with a space. APS will treat the list as a list of LDAP servers for fail over purposes. All must be writable. In this way, APS supports multi-mastering.

It may be desirabled to load-balance APS writes across multiple masters. APS will not do this automatically, but sites may do it in either of two ways. Note that both methods provide the same level of fault tolerance.

LDAP Writeback Server

Range: n/a

Default: none

Recommended: no

Complexity Level: Advanced

This setting controls the server to which writebacks will be directed. It can be overridden. To use writebacks, both the Server and a Password must be specified (the DN is not required because it has a default).

LDAP Writeback Server=127.0.0.1
LDAP Writeback Server={IsAt("o=security.com"} 10.24.86.177
LDAP Writeback DN

Range: n/a

Default: cn=Directory Manager

Recommended: cn=Directory Manager

Complexity Level: Advanced

This is the Distinguished Name (DN) of the administrator account to use to log into the writeback server. It is not required to use writebacks, since there is a default.

LDAP Writeback DN=cn=Directory Manager
LDAP Writeback DN={IsAt("o=security.com"}uid=Admin, o= security.com
LDAP Writeback Password

Range: n/a

Default: none

Recommended: no

Complexity Level: Advanced

This is the password to use for binding to the writeback server. If both this setting and a server are supplied, it indicates that writebacks should be used, even if the Writeback DN (above) is not supplied.

The writeback Password can be supplied either in clear text or encrypted. To encrypt the password, use the APSEncrypt utility.

LDAP Writeback Password=[NDSEnc-A]68SExOCvk(MrHfSSY) cuDHfuyG2
LDAP Writeback Password={IsAt("o=security.com"}password
LDAP Writeback Use SSL

Range: n/a

Default: no

Recommended: if needed

Complexity Level: Advanced

If writebacks are used, this setting tells APS that LDAPS (LDAP over SSL) should be used for the writeback connection.

LDAP Writeback Use SSL=true

Other LDAP Settings

LDAP Disabled Groups

Range: n/a

Default: Search Base defined in SiteMinder User Directory

Recommended: no

Complexity Level: Advanced

By default, APS will search for and create (if necessary) disabled groups in the root of the user account's directory. If APS will not have rights to this location, the root is not identified by o=xxx, or your site wishes these groups to appear elsewhere in the directory tree, you can specify their exact location using this keyword. Note that this is the location, not the names of the groups themselves.

This affects only where such groups are created, not where they are searched for. APS will always search the entire search base as defined in the SiteMinder User Directory entry.

This setting can be overridden, but the IsLDAP function is not required, since the setting will only be used for LDAP User Directories.

APS does not create groups for ODBC directories, so this setting does not apply to them.

LDAP Disabled Groups=ou=Groups,o=nds.com
LDAP Blob

Range: n/a

Default: audio

Recommended: audio

Complexity Level: Advanced (upgraded sites only)

Prior to APS Version 3.0, APS maintained user information for LDAP users in an attribute called the APS Blob. This keyword allowed the site to specify the attribute in which to store this information. However, at Version 3.0, the APS blob no longer exists.

This keyword exists only for backwards compatibility. Users converting from pre-version-3.0 APS should contact CA for the proper data conversion tool.

If this site did not upgrade from a prior version of APS or it is no longer maintaining old Blob information, then this keyword is not needed and should not be specified.

Check LDAP Password Existence

Range: n/a

Default: off

Recommended: off

Complexity Level: Advanced

This keyword will cause APS to check for the existence of an LDAP password before expiring it or requiring it to be changed. It should be used at sites where some users will be accessing the system using authentication schemes that do not use passwords (and thus the user record may or may not actually have a password).

Note that this was a new feature at version 2.0 and requires that the Directory Manager credentials be entered into the SiteMinder policy GUI for each LDAP directory (it only impacts LDAP User Directories). It may also impact performance.

This functionality requires that the existing password be readable from the directory (at least the encrypted/hashed value). For iPlanet Directories, this requires that the administrator be cn=Directory Manager. Other implementations of LDAP servers may have different requirements. Some implemented, most notably Microsoft Active Directory, do not allow this information to be read in any case and thus this functionality is not supported in those environments.

Check LDAP Password Existence
LDAP Password Attribute

Range: n/a

Default: userPassword

Recommended: no

Complexity Level: Advanced (Deprecated)

This keyword causes APS to use an attribute other than userPassword as the password attribute within an LDAP directory. The standard LDAP schemas use userPassword; however, some may use a different attribute. Use this keyword to specify a different attribute.

This setting may be overridden (but that would be unusual).

At APS Version 4.0, this setting is deprecated (a warning will be output to the log, if the keyword is encountered). If something other than userPassword should be used, specify it in the new Mappings section.

LDAP Password Attribute=userPassword
Use Internal Disables

Range: n/a

Default: off

Recommended: true

Complexity Level: Advanced

If this setting is enabled, when APS disables an LDAP user account (it only applies to LDAP User Directories), it will NOT put the user account into a Disabled group. Instead, it will set the Disable Until date to FOREVER, effectively disabling the user account forever.

This feature was new at APS Version 3.0. It provides a considerable performance improvement for very large sites, in that large groups are not used for disabling user accounts. However, it is a change to existing functionality and may impact user administration tools (the tools used to reset the user).

In addition, if this setting is enabled, a user account can only be disabled for a single reason at a time. This may impact how some of the security policies at your site are to be architected.

ODBC User Directories always use internal disables (Disabled groups are honored, but APS will never create one or put a user account into one).

Use Internal Disables
Ignore

Range: n/a

Default: off

Recommended: no

Complexity Level: Advanced

APS functionality is accessed in many ways. For the two secured client mechanisms (Change Password Interface and Help Desk Interface), access is controlled by SiteMinder Policies. FPS is configured separately to allow or disallow access for particular users. The APSAPI is accessed by the applications that call it and thus access can be controlled using any of a variety of methods.

However, APS is involved with all SiteMinder authentications. SiteMinder calls APS, regardless of User Directory or the success or failure of an authentication.

The Ignore keyword can be used to tell APS when to ignore a user during the authentication process. While this is rarely used, it does have a purpose. For example, when rolling out a new User Directory, it can be desirable to ignore all of the users in that new directory until the schema is set up and the users are initialized.

The value of this setting is either true or false. However, this setting is almost always overridden, defining the user cases where the user should be ignored.

Ignore={IsODBC()} true
Disable

Range: n/a

Default: off

Recommended: no

Complexity Level: Advanced

APS has a wealth of mechanisms for enabling/disabling user accounts, but they are mostly geared for APS' own use. Sometimes (especially in legacy directories), other mechanisms are used to disable accounts.

This setting allows sites to specify other conditions under which APS is to consider that an account is disabled. The override of the setting specifies the condition; the value of the setting is used as the "Disabled Reason" passing such codes to redirects or email.

APS will never actually disable an account with this mechanism. However, if the override is true for a particular account, that user will not be allowed to log into the system.

Disable={employeeStatus="Terminated"} Term
Disable={customerStatus="IN LEGAL"} Litigation