This tutorial guides you through the setup of IBM® ADDI
Extension with
the LDAP connections through Microsoft Active
Directory Domain Services (AD DS) for user management.
Prerequisite
In this tutorial, it is required
to have a machine with the Windows Server
2012 or above for LDAP setup.
Installing and configuring AD DS
Complete
the following steps to set up LDAP through AD DS.
- Log in as the administrator on the Windows Server machine.
- Click Start > Server Manager.
- Select Dashboard on the left menu and select 2)
Add roles and features.
- Perform the feature installation with the Add Roles and Features
Wizard.
- Click Next on the Before You
Begin tab.
- Select Role-based or feature-based installation on
the Installation Type tab and click Next.
- Click Next on the Server Selection tab
to keep the default server information.
- Select Active Directory Domain Services from
the Roles checklist on the Server Roles tab.
- Select the Include management tools (if applicable) checkbox
and click Add Features on the pop-up dialog
box.
- Click Next on the Server Roles tab.
Make sure that Active Directory Domain Services checkbox
is selected.
- Click Next on the Features tab.
- Click Next on the AD DS tab.
- Select the Restart the destination server automatically
if required checkbox and click Install on
the Confirmation tab.
- Wait until the installation is done.
- Click the Promote this server to a domain controller link
on the Results tab.
- Complete the following steps to configure AD DS.
- Click Add a new forest and enter sample.com in
the Root domain name field. Then, click Next on
the Deployment Configuration tab.
- Enter the password for directory service restore in the Password and Confirm
password fields. Then, click Next.
Note: Remember
this password in case that you might need to restore your directory
service.
- Click Next on the DNS Options tab.
- Click Next on the Additional
Options tab. The NetBIOS domain name field is automatically
completed for you at this step.
- Click Next on the Path tab
to keep the location of AD DS database, log files, and SYSVOL.
- Review the configured options and click Next to
confirm.
- Click Install on the Prerequisites
Check page when all prerequisites checks are passed.
- Wait until the installation is done and the results page is displayed.
Then, your server will be automatically restarted to finish the configuration.
After the server is restarted, you can log back into the server.
You have now successfully installed and configured AD DS. Next you
will set up active directory user groups and users for
IBM ADDI
Extension.
These users and user groups will be used to access
IBM ADDI
Extension and
show you how to setup user permissions.
Setting up active directory user groups and users
Complete
the following steps to setup active directory user groups and users.
- In the Server Manager, select Tools > Active
Directory Users and Computers from the upper right menu.
- Select the name of the user who has Administrators role and will
initialize the connection between active directory and IBM ADDI
Extension.
In this tutorial, ldapadmin user is the user for example. For
the rest of this tutorial, this user will be used as the administrator
for IBM ADDI
Extension.
- Double-click the user item to open the ldapadmin Properties window.
- Enter the email address that you want to use for initialization
in the E-mail field. It is ldapadmin@sample.com in
this example.
- Select the Account tab and enter the same
e-mail account name as the user logon name. The email account name
will be used as the username when you log in to IBM ADDI
Extension.
It is ldapadmin in this example.
- Clear all the checkboxes in the Account options list and click OK.
- Create the active directory users to access IBM ADDI
Extension.
- In the Active Directory Users and Computers window, right-click
the Users folder.
- Select New > User.
- Enter the following information in the New Object – User
dialog box.
- First name: Marco
- User logon name: marco
- Click Next.
- Enter the password to be used for this user in the Password and Confirm
Password fields. Note that you can use the user name as
password to make it easy to remember.
- Clear the User must change password at next logon checkbox.
- Click Next.
- Click Finish to confirm the user creation.
- Repeat step a through c to create Jane and Tammy as
users.
- Create user groups to manage workbook permissions in IBM ADDI
Extension.
- In the Active Directory Users and Computers window, right-click
the Users folder.
- Select New > Group.
- Specify the following information in the New Object – Group
dialog box.
- Group name: zMobile
- Group scope: Ensure that the Global is
selected.
- Click OK to create a group.
- Repeat step a through c to create Addi Administrators and HRM
App groups.
- Assign users to the zMobile group.
- Double-click the zMobile group to open
the zMobile Properties window.
- Select the Members tab.
- Click the Add button.
- Type Marco in the Enter the
object name to select field.
- Click Check Names. The object name with
the logon name is displayed.
- Click OK to finish.
- Repeat step c through f to add Jane to the zMobile group.
- Click OK to close the zMobile Properties
window.
- Assign Tammy to the HRM App group.
- Double-click HRM App group to open the
HRM App Properties window.
- Select the Members tab.
- Click the Add button.
- Type tammy in the Enter the
object name to select field.
- Click Check Names. The object name with
the logon name is displayed.
- Click OK to finish.
- Click OK to close the HRM App Properties
window.
- Assign administrator user to the Addi Administrators group.
- Double-click the Addi Administrators group
to open the Addi Administrators Properties window.
- Select the Members tab.
- Click the Add button.
- Type the name of user who you would like to be the ADDI administrator
in the Enter the object name to select field.
In this example, it is ldapadmin (the local
administrator who is also the active directory administrator).
- Click Check Names. The object name with
the logon name is displayed.
- Click OK to finish.
- Click OK to close the Addi Administrators
Properties window.
- Close the Active Directory Users and Computers window.
- Get the Distinguished Name of active directory administrator user
to use for IBM ADDI
Extension authentication
setup.
- In the Server Manager, select Tools > ADSI
Edit from the upper right menu.
- Right-click the ADSI Edit item and select Connect
to.
- Keep the default settings and click OK in
the Connection Settings window.
- The default object tree for your sample.com domain is populated.
- Select the CN=Users object. The objects
within the CN=Users are displayed in the middle pane.
- Select the active directory administrator user that you set up
in the previous steps. In this case, it is ldapadmin.
- Right-click and select Properties.
- Find the distinguishedName attribute and
double-click.
- Copy the distinguishedName and paste on a
note for future use.
- Click OK to close the String Attribute
Editor dialog box.
- Close the ADSI Edit window.
You have finished the setup of active directory users
to access IBM ADDI
Extension through
LDAP. Next step is to install and setup IBM ADDI
Extension.
Installing and setting up IBM ADDI
Extension
Before
the installation, you need to update the
hosts file
to understand the public URI that you use for the setup. For example,
complete the following steps to update the
hosts file.
- Type Notepad in the search box next to
the Start menu icon.
- In the search results, right-click Notepad,
and select Run as administrator.
- From the Notepad, open the hosts file in the C:\Windows\System32\drivers\etc directory.
- Add the following entry under the localhost section.
127.0.0.1 sample.com
- Save the hosts file.
Complete the following steps to install and set up
IBM ADDI
Extension.
- Download the ADDI installer and run the ADDI installer wizard
as an administrator.
- Follow the instructions in the wizard to install ADDI.
- On the Welcome page, click Next.
- Review the Licensing Agreements page. Then,
select I accept the terms of this license agreement and
click Next.
- On the Installation Path page, click Next to
use the default path or click Browse to select
a path to install IBM ADDI and click Next.
- Click OK in the Message dialog box to create
the target directory.
- Check the following components to install and click Next.
- IBM Application Discovery Servers and Services
- Authentication Server (DEX)
- IBM Application Discovery and Delivery Intelligence Extension
for your system. The following example shows the Select
Installation Components page that is displayed on a Windows
system.
- Click Next on the Information page.
- On the IBM Application Discovery and Delivery Intelligence
Extension Installation Path page, click Next to
use the default path or click Browse to select
a path to install IBM ADDI Extension and click Next.
- Click OK in the Message dialog box to create
the target directory.
- Clear the Opening IBM Application Discovery Configuration
Wizard checkbox.
- Click Next on the Installation page
when the installation progress is finished.
- Click Next on the Setup Shortcuts page.
- Click Done on the Installation
Finished page.
- Open the command prompt as an administrator and navigate to c:\Program
Files\IBM Application Discovery and Delivery Intelligence\IBM Application
Discovery and Delivery Intelligence Extensions\adi5109\server directory.
- Run the following command to generate the bcrypt hash
of an admin password:
adi-setup bcryptPassword -dex.password <password>
Note: In
the following example, adiadmin is a password
that you want to generate the bcrypt hash.
- Save the generated bcrypt hash password somewhere.
The password will be used when you set up the dex.yaml file.
- Configure the Authentication Server (DEX) as described in the
following steps:
- Navigate to the C:\Program Files\IBM Application Discovery
and Delivery Intelligence\Authentication Server (DEX)\sample-conf\addi directory.
- Copy all three files in the directory: dex.yaml, root.crt,
and root.key.
Note: All these files are provided for
only evaluation purposes. For the production server, you must generate
SSL keystore and security certificate for your server and configure
your own
dex.yaml file as described in the
Configuring the parameters in the dex.yaml file topic.
- Navigate to the c:\Program Files\IBM Application Discovery
and Delivery Intelligence\Authentication Server (DEX)\conf\ directory
and paste the copied files there.
- Run the text editor as the administrator and update the dex.yaml file
with the following changes:
- Update the issuer to https://sample.com:7600/dex.
- Update the web section with the following
changes:
- Change the http property to https:
sample.com:7600.
- Uncomment the TLSCert and TLSKey properties
and update their paths as shown in the following sample.
- Make sure that the connectors section is
uncommented and update the section with the following changes:
- Change the host to localhost:389.
- Change the insecureNoSSL value to true.
- Change the bindDN to the distinguished name
of Active Directory administrator that you have copied to the note
in the previous steps.
- Change the bindPW to the password of Active
Directory administrator.
- Update the baseDN in the userSearch section
to CN=Users,DC=sample,DC=COM.
- Update the baseDN in the groupSearch section
to CN=Users,DC=sample,DC=COM.
- Update the staticClients section with the following
changes while removing the <<>> brackets.
- Update the id property to addi-liberty.
Remove the extra leading space characters on this line.
- Replace the localhost within the redirectURIs property
with sample.com.
- Update the name property to ‘ADDI
Liberty Server’.
- Update the secret to f1a75f8abc2ffcbd46e2c1b5f7b12c7b.
- Comment out lines from 77 through 81 by using # symbol
in front of each of those lines.
- Update the StaticPasswords section with the
following changes while removing the <<>> brackets.
- Uncomment the email property and update it to “adiadmin@sample.com”.
Remove the extra leading space characters on this line.
- Uncomment the hash property and update it as
the hash password that you saved in step 5 with double quotes.
- Uncomment the username property and update it
to “adiadmin”.
Note: The hash value comes from the value that you saved on
step 5.
- Save the dex.yaml file.
- Press Ctrl + Alt + Del and choose Task Manager to open
the Task Manager window.
- Select the Services tab and click Open
Services on the bottom of the Task Manager window.
- Right-click the Authentication Service (DEX) and
select Start to start the service.
- Browse to localhost:9080/ad-audit on Firefox
browser.
- Complete the IBM ADDI Extension Install Configuration as described
in the following steps:
- Select .
- Specify the Base URL on the Web and Application Server tab
as shown in the following example.
https://sample.com:9753
- Leave the default value on the Databases tab.
- Specify the following information on the Authentication
Service tab.
- Host: sample.com
- Port: 7600
- HTTP protocol: Select HTTP Secure (https).
- Specify the following information on the User Groups tab.
- Admin Group List: ADDI Administrators
- User Group List: zMobile, HRM App
- Click SAVE to create the ADI configuration.
A message is displayed to indicate the configuration was successfully
created.
- On your Command Prompt window, navigate to c:\Program
Files\IBM Application Discovery and Delivery Intelligence\IBM Application
Discovery and Delivery Intelligence Extensions\adi5109\server directory.
Note: If
you have closed the Command Prompt previously, you need to run the
Command Prompt again as an administrator.
- Run the command adi-setup addiConfigurationServer.
- Run the server.startup.bat command and wait
until the server is started successfully.
- Browse to https://sample.com:9753/addi/web/workbook to
test your access to IBM ADDI
Extension.
- Select Log in with OpenLDAP to login with
active directory users.
- Log in to IBM ADDI
Extension by
using a user that is a member of the Addi Administrators group.
- The IBM ADDI
Extension home
page appears.
Now, you have finished the installation and configuration
of ADDI to enable the login through Active Directory. Next, follow
the steps in the
Generating sample data to
generate the demonstration data and create a workbook accordingly
for data analysis.
Note: You will log in by using the OpenLDAP method
instead of the static user. Use ADDI administrators user that
you have set up in the previous steps to perform the tutorial instead
of the adiadmin user.
Setting up user permissions
After you complete
the tutorial for
Generating sample data,
you need to complete the following steps to set up user permissions
to allow only zMobile users to have access to this workbook.
- On the IBM ADDI
Extension home
page, click the overflow menu (vertical ellipsis) icon on the zMibile
Health Care workbook card.
- Select Edit to edit the workbook information.
- Click the Add Permissions link in the Permissions section.
- Select the zMobile checkbox in the Add
User Groups window and click Save to save the
updates of user groups.
- Scroll down and click Save to update the
workbook.
- Click the profile icon on the upper right corner of the window
and select Logout.
- Select Log in with OpenLDAP to log back
in.
- Log in as Marco with the email address marco@sample.com and
the password that you set for Marco.
You can now see that Marco has access to this workbook. Since
Marco is not an ADDI administrator, no Create Workbook button
is displayed on the upper right corner of the window.
- Click the profile icon on the upper right corner of the window
and select Logout.
- Select Log in with OpenLDAP to log back
in.
- Log in as Jane with the email address jane@sample.com and
the password that you set for Jane.
- Click the profile icon on the upper right corner of the window
and select Logout.
- Select Log in with OpenLDAP to log back
in.
- Log in as Tammy with the email address tammy@sample.com and
the password that you set for Tammy.
This time, you cannot see the zMobile Health Care workbook since
Tammy is not a member of zMobile group.
You have now explored how IBM ADDI
Extension manages
user authentication and permissions through LDAP. You can now be able
to set up your production environment by using your organization active
directory.