Basic users are users in the registry that
are not imported in to Security Access Manager.
Edit the ldap.conf file so that basic users can
authenticate in Security Access Manager.
Before you begin
The following limitations apply to basic users:
- Basic users work in minimal registry mode only.
- Basic users cannot use global sign-on.
- You cannot set access control lists for individual basic users.
However, basic users can be members of a Security Access Manager group
with access control lists.
- Registry direct Java API does not support basic users.
- Account and password valid settings are set to
yes
.
You cannot modify them for basic users.
Warning: Basic users are not subject to any Security
Access Manager account and password policies. They always have their account-valid
and password-valid
values
set to yes
. Basic users do not record the last login
or last password change even if [ldap] enable-last-login
is
set. You must use the underlying registry equivalents for these capabilities.
About this task
Configure the run time so that basic users can authenticate
to Security Access Manager. Basic users have limitations.
When basic-user-support
is enabled, basic
and full users are located by using the basic-user-principal-attribute
suffix
in the LDAP native user entry. If the located native user entry has
full Security Access Manager user
metadata then it is treated as a full user. The value of the basic-user-principal-attribute
is
used for the user ID even if the Security Access Manager full
user metadata has a different principalName
.
Basic
users are managed in the corporate user registry by using LDAP management
tools. These users are not managed through Security Access Manager,
except when you change and reset passwords for basic users.
When searching for basic or full users,
Security Access Manager:
- Uses the configured
basic-user-principal-attribute
and
the user-search-filter
values to locate users in
the registry.
- Searches all suffixes that are defined by
basic-user-search-suffix
entries
and in the order that they are defined, unless basic-user-suffix-optimizer
is
enabled. If no basic-user-search-suffix
entries are
specified, all suffixes are searched in an unspecified order.
- If
basic-user-suffix-optimizer
is enabled, a
hit count is kept for each suffix that is used to search for users.
The suffix search order is based on a dynamic most-used suffix order.
This dynamic search order is not used if basic-user-no-duplicates
is
enabled since in that situation, all suffixes must be searched to
ensure that there are no duplicates, thus the order is irrelevant.
Procedure
- Log in the local management interface.
- From the top menu, select .
- Click .
- Select ldap.conf.
- Add the following lines under the
[ldap]
stanza.
basic-user-support = yes
- Set this option to yes to support basic users.
basic-user-principal-attribute = <uid>
- This attribute is the
principalName
of the basic
and full users.
basic-user-search-suffix = <DN>
- Set this option for each suffix to search for full and basic users.
This must include suffixes to search on the primary LDAP server and
all federated registries.
- If
basic-user-support
is enabled and one or more basic-user-search-suffix
values
are configured, the ignore-suffix
entries are disregarded.
The basic-user-search-suffix
configuration entries
determine the suffixes that are searched. Note: When there are no basic-user-search-suffix
entries,
the system searches all available suffixes, except for those specified
by the ignore-suffix
entries. If you do not specify
any basic-user-search-suffix
values, you can use ignore-suffix
entries
to specify one or more suffixes to exclude from the search.
- If
basic-user-search-suffix
is not set, then
all suffixes are chosen in an unspecified order.
- If you choose to specify one or more
basic-user-search-suffix
entries, ensure
that you include an entry for every suffix that must be searched. Ensure that you include
the primary suffix for Security Access Manager
accounts. For example, secAuthority=Default
. If you specify one or more
basic-user-search-suffix
entries, but you do not include this suffix, the
search does not return the full Security Access Manager accounts. In this case, you are not
able to authenticate to pdadmin
with the sec_master
account or any other Security Access Manager
accounts.
basic-user-no-duplicates = {yes | no}
- If set to yes, the search for basic users covers
all suffixes to ensure that no users with the same name are found.
If set to no, the search for basic users stops
immediately and ignores possible duplicates.
- Avoid configuring your environment to include suffixes that contain
duplicates. Ensure that the
basic-user-principal-attribute
is
unique for all accounts across the specified suffixes. If there are
no duplicates in the environment, you can set basic-user-no-duplicates
to no
to
improve search efficiency. However, if duplicates exist in your environment,
set basic-user-no-duplicates
to yes
so
that the system can return an error if it encounters more than one
account with the same principal attribute value.
basic-user-suffix-optimizer = {yes | no}
- If set to yes and
basic-user-no-duplicates
is
set to no, the search order of suffixes is sorted,
with the most hit of the basic user suffix at the head of the search
suffix list. If set to no, the search order is
provided by the basic-user-search-suffix
order.Note: If basic-user-no-duplicates
is
set to yes
, the basic-user-suffix-optimizer
entry
is disregarded. In this case, all suffixes are searched to check for
duplicates.
- Add the following line under the
[server:<fedreg>]
stanza.
basic-user-principal-attribute = <uid>
- Click Save.