Previous Topic: Change the Value of the EnableWebAgent ParameterNext Topic: Copy the Powershell Script to the SharePoint Central Administration Server


Change the States of the Services on your Agent for SharePoint

You can change the states of the related services on your Agent for SharePoint.

Note: To start or stop your Agent for SharePoint, change the value of the EnableWebAgent parameter first.

Follow these steps:

  1. To change the states of the related services, select one of the following procedures:
  2. For Windows operating environments, do the following steps:
    1. From the Windows Start menu navigate to Administrative Tools, Services.

      The Services dialog appears.

    2. Scroll down the list of services and select SiteMinder Agent for SharePoint.
    3. From the Action menu, select All Tasks and select the command that you want.
    4. Repeat Step b for SiteMinder Agent for SharePoint Proxy Engine.

      The states of the services and Agent for SharePoint are changed.

  3. To start the Agent for SharePoint on UNIX operating environments, do the following steps.
    1. Log in as a root user.
    2. Navigate to the following directory:
      Agent-for-SharePoint_home/proxy-engine
      
    3. Run the following command:
      ./sps-ctl start
      

      The service and the Agent for SharePoint start. The Agent for SharePoint stops or starts according to the value you set in the EnableWebAgent parameter.

  4. To stop the Agent for SharePoint on a system running UNIX, do the following steps:
    1. Navigate to the following directory:
      Agent-for-SharePoint_home/proxy-engine
      
    2. Run the following command:
      ./sps-ctl stop
      

      The service and the Agent for SharePoint stop.

How to Configure Multiple User Directories

If the users who access your protected SharePoint web applications are stored in more than one user directory, configure multiple user directories.

Important! Multiple directory connections are supported with Policy Server version 12.5 and above only.

This flowchart describes how to configure multiple user directories

Follow these steps:

  1. Open the Administrative UI to change Policy Server objects.
  2. Define virtual attribute mappings.
  3. Add directory connections.
  4. Run the SharePoint connection wizard.
  5. If you changed the value of an existing Claim Name (attribute), do the following steps:
    1. Remove the web applications from the trusted identity provider.
    2. Remove the trusted identity provider.
    3. Copy the PowerShell script to the SharePoint central administration server.
    4. Determine the PowerShell script modifications (pick one of the following procedures):
    5. Add certificate authority certificates.
    6. Run the PowerShell script.
    7. Verify the trusted identity provider registration.
    8. (Optional) Disable client loopback.
    9. Add users to your web applications.

Open the Administrative UI to Change Policy Server Objects

Change the objects on your Policy Server by opening the Administrative UI.

Follow these steps:

  1. Open the following URL in a browser.
    https://host_name:8443/iam/siteminder/adminui
    
    host_name

    Specifies the fully qualified Administrative UI host system name.

  2. Enter your CA SiteMinder superuser name in the User Name field.
  3. Enter the CA SiteMinder superuser account password in the Password field.

    Note: If your superuser account password contains one or more dollar‑sign ($) characters, replace each instance of the dollar-sign character with $DOLLAR$ in the Password field. For example, if the CA SiteMinder superuser account password is $password, enter $DOLLAR$password in the Password field.

  4. Verify that the proper server name or IP address appears in the Server drop-down list.
  5. Select Log In.

Define Virtual Attribute Mappings

The next step in configuring multiple user directories is defining the virtual attribute mappings in each user directory. For example, suppose that some users exist in an Active Directory server while others exist in an LDAP directory server. Defining virtual attribute mappings, or aliases for each directory allows CA SiteMinder access to both directories.

The following table provides examples of typical attribute mappings for an Active Directory server, an LDAP directory server, and an ODBC database:

User Attribute Field (in Administrative UI)

Active Directory Attribute Name

LDAP Directory Attribute Name

ODBC Attribute Name

UID

sAMAccountname

cn

Name

AliasID

sAMAccountname

cn

Name

mail

userPrincipalName

Mail

EmailAddress

smusergroups

Manager

Name

Name

Follow these steps:

  1. Click Infrastructure, Directories, User Directories.
  2. Click the Edit icon of a user directory that you want.
  3. Create an attribute mapping with the following steps:
    1. Scroll to the Attribute Mapping list, and then click Create.

      The Create Attribute Mapping pane opens.

    2. Verify that Create a new object is selected, and click OK.

      The Create Attribute Mapping: Name pane opens.

    3. Type a name and an optional description for the attribute mapping. For example, to create an attribute mapping for the UID, type UID.
    4. Select the Alias option button.
    5. In the Definition field, type the attribute name that you want to add, as shown in the following examples:
      • (Active Directory) sAMAccountname
      • (LDAP directory server) cn
      • (OBDC database) Name
    6. Click OK.
  4. Repeat Steps 3a through 3f until all of the attributes have been added to the user directory.
  5. Click Submit.

    The attribute mappings are added to your directory.

  6. Repeat Steps 2 through 6 to add attributes to another user directory.

    The attribute mappings are defined.

Add Directory Connections

The next step in configuring multiple user directories is adding the user directory connections that contain the attribute mappings to the following items:

Follow these steps:

  1. Pick the appropriate procedure for your type of policy from the following list:
  2. Add directory connections to your policy domain with the following steps:
    1. Click Policies, Domain, Domains.
    2. Click the edit icon of the domain that protects your SharePoint web applications.

      The Modify Domain: screen appears with the General tab selected.

    3. If the user directories to which you defined the attribute mappings do not appear in the list, go to Step 2d . Otherwise, click Cancel and go to Step 3.
    4. Click Add/Remove.
    5. Click the directory connection that you want from the Available Members list, and then click the right arrow.
    6. Repeat Step 2f to add other directories.
    7. Click OK.
    8. Click Submit.
  3. Repeat Steps 2a through 2h for any other policy domains on which you want to add directory connections.
  4. Add directory connections your application policy (EPM) with the following steps:
    1. Click Policies, Application, Applications.
    2. Click the edit icon of the application that protects your SharePoint web applications.

      The Modify Application: screen appears with the General tab selected.

    3. If the user directories to which you defined the attribute mappings do not appear in the list, go to Step 4d. Otherwise, click Cancel and go to Step 5.
    4. Click Add/Remove.
    5. Click the directory connection that you want from the Available Members list, and then click the right arrow.
    6. Repeat Step 4f to add other directories.
    7. Click OK.
    8. Click Submit.
  5. Repeat Steps 4a through 4h for any other application policies (EPM) on which you want to add directory connections.

    The directory connections are added. Have your agent owner continue with the next step of running the SharePoint connection wizard.

Run the SharePoint Connection Wizard

As an agent owner who is responsible for running the server hosting the Agent for SharePoint, run the SharePoint connection wizard to finish configuring multiple user directories.

Follow these steps:

  1. Log in to the server that runs your Agent for SharePoint.
  2. Navigate to the following directory:
    Agent-for-SharePoint_home/sharepoint_connection_wizard
    
  3. Do the appropriate step for your operating environment:

    The SharePoint Connection wizard starts.

  4. Click Next.

    The Login Details screen appears.

  5. Enter the following login for the Policy Server.
    Policy Server Name

    Specifies the Policy Server name or IP address.

    Username

    Specifies the Policy Server administrator username.

    Password

    Specifies the Policy Server administrator password.

    Agent Name

    Specifies the Agent-4x. The connection with the Policy Server is established using the details given in the Agent Name.

    Shared Secret Key

    Specifies the shared secret key that is associated with the Agent.

  6. Click Next

    The Select Action screen appears.

  7. Select Edit a SharePoint Connection option.
  8. Click Next.

    The SharePoint Connection Properties screen appears.

  9. Click through the wizard until you reach the Define Additional Claims screen.
  10. Verify that Name Value Pair appears in the Attribute drop-down list.
  11. Verify that User Attribute appears in the Claim Type drop-down list.
  12. Click the Claim Name field. Type the name of the user attribute that is defined in one of your directory connections in the Administrative UI. For example, if your policy administrator defined UID as a user attribute in the Administrative UI, then type UID as the Claim Name.
  13. Type the alias name of the attribute from your directory that your policy administrator defined in the Administrative UI. For example, if the alias name for the user attribute is userid then type userid as the directory attribute.
  14. Click Add.
  15. Repeat Steps 10 through 14 to add the attributes for your other directories.
  16. Click through the wizard until the Commit Details screen appears.
  17. Click Install.

    The Save Complete screen appears.

  18. Click Done.

    The SharePoint connection wizard closes.

Remove the Web Applications from the Trusted Identity Provider

A trusted identity provider cannot be removed from SharePoint while any web applications are using it. Before you remove the trusted identity provider itself, remove the association between the CA SiteMinder trusted identity provider and any of your web agents using it.

Follow these steps:

  1. Log in to your SharePoint central administration server.
  2. Click Start, Microsoft SharePoint 2010 Products, SharePoint 2010 Central Administration.

    The Central Administration home page opens.

  3. Under Application Management, click Manage web applications.

    The web application management page opens.

  4. Click the line corresponding to the name of a web application using the CA SiteMinder trusted identity provider.

    The web application is selected.

  5. On the ribbon, click Authentication Providers.

    The Authentication Providers dialog appears.

  6. In the Authentication Providers dialog, click the link that corresponds to the zone of your web application. For example, if the web application using the CA SiteMinder trusted identity provider is in the Intranet zone, click the Intranet link.

    The Edit Authentication page appears.

  7. Under Claims Authentication types, clear all Trusted Identity provider check boxes.
  8. Click Save.

    The CA SiteMinder trusted identity provider is removed from the web application in the zone.

  9. Repeat Steps 3 through 8 for all web applications and the zones using the CA SiteMinder trusted identity provider.

    The trusted identity provider is removed from all web applications and their respective zones.

Remove the Trusted Identity Provider

You can perform the following procedure to remove the trusted identity provider for SharePoint using Windows PowerShell.

Follow these steps:

  1. Log in to your SharePoint central administration server.
  2. Select Start, All Programs, Microsoft SharePoint 2010 Products, SharePoint 2010 Management Shell.

    The Microsoft PowerShell command prompt appears.

  3. Enter the following command:
    Remove-SPTrustedIdentityTokenIssuer -Identity
    
    -Identity

    Specifies the name of the identity provider to remove.

    Example: Remove-SPTrustedIdentityTokenIssuer TestSTS

    The trusted identity provider for SharePoint is removed.