EditAttachPrintable
r9 - 2020-03-17 - 12:11:10 - BharathRaoYou are here: TWiki >  Deployment Web > DeploymentAdminstering > ConfigureLDAPs

Configure Secure LDAP with Liberty and WebSphere for ELM Applications uc.png

Authors: BharathRao, ShradhaSrivastav
Build basis: 6.0.1 to 6.0.6.1

LDAP directory servers are mainly used as an authentication repository, and are often used to store sensitive information like passwords and other account details. It is mostly used by medium-to-large organizations. Since ELM/CLM supports LDAP, you can re-use the existing LDAP directory servers for authenticating and authorizing users when accessing the data in the application.
From IT security perspective, we can have a reliable and secured connectivity between the ELM applications and LDAP Server by using SSL. In this article, we will provide step by step guide on how to configure ELM with secure LDAP(LDAPS)


Liberty Server

NOTE: Ensure you have a working LDAP configuration with CLM before enabling LDAP SSL.

Configure LDAPS in Liberty

- Enable Require SSL and update the LDAP Port to secure port in the ldapUserRegistry.xml file located in \server\liberty\servers\clm\conf\

NOTE: Any changes to the group / ldap properties if made had to be corrected in the application.xml file located in \server\liberty\servers\clm\conf\

  1. Ensure to include the below features in the ldapUserRegistry.xml

    Picture15.png

  2. Edit the LDAP configuration in the Liberty server in ldapUserRegistry.xml file

    Picture16.png

  3. Proceed with the next section to add LDAP SSL certificate

Add LDAP SSL certificate

  1. To configuration LDAPS, obtain the SSL signer certificate from the LDAP server

  2. From the file explorer, navigate to \server\jre\bin and double click on ikeyman.exe

  3. To open an existing keystore file, Click on
    Picture10.png

  4. Choose the Key database type from the drop-down and click on Browse to select the key database file(kdb). Enter the password and click on Ok to open the file
    Picture11.png

  5. After the kdb is open, click on the drop-down and choose Signer Certificate
    Picture12.png

  6. Click on Add and browse the signer certificate file(.arm) obtained from the LDAP server, then click ok to add the certificate
    Picture13.png

  7. Proceed with the next section to configure secure LDAP in JTS server

Configuring LDAPS In JTS server

NOTE: Any changes to the group / ldap properties if made has to be corrected here

  1. Login to https://clmexample.com:9443/jts/setup, proceed to the User Registry section

  2. In the User Registry section, edit the LDAP host configuration to update the LDAP port to secure port
    Picture14.png

  3. Perform a test connection and ensure the LDAP configuration succeeds

  4. Restart the Liberty server


WebSphere Application Server

NOTE: Ensure you have a working LDAP configuration with CLM before enabling LDAP SSL.

Configure LDAPS in WAS

  1. Enable Require SSL

  2. Change LDAP PORT to secure port
    Picture1.png

Add LDAP SSL certificate

  1. Login to WebSphere Application Server Administration Console Navigate to Security > SSL certificate and key management
    Picture2.png

  2. Click on Key stores and certificates
    Picture3.png

  3. Click on NodeDefaultTrustStore
    Picture4.png

  4. Click on Signer certificates
    Picture5.png

  5. Click Retrieve from port to retrieve the LDAP SSL certificate from the LDAP server
    Picture6.png

  6. Enter the LDAPS server details and click on Retrieve signer information
    Picture7.png

  7. Click OK
    Picture8.png

  8. Click on Save
    Picture9.png

  9. Proceed with the next section to configure secure LDAP in JTS Server

Configuring LDAPS In JTS server

NOTE: Any changes to the group / ldap properties if made has to be corrected here

  1. Login to https://clmexample.com:9443/jts/setup, proceed to the User Registry section

  2. In the User Registry section, edit the LDAP host configuration to update the LDAP port to secure port
    Picture14.png

  3. Perform a test connection and ensure the LDAP configuration succeeds

  4. Proceed with the next section to remap group mappings in WAS

Remap Security Group Mappings in WAS

  1. Login to WAS Administration Console

  2. Remove and re-add the user/group mappings under Security role to user/group mapping for each of the CLM/ELM applications Remap war files

  3. Restart WAS

Related topics: Configure LDAP for Liberty Profile, Deployment web home

External links:

Additional contributors: TWikiUser, TWikiUser

Topic attachments
I Attachment Action Size Date Who Comment
Pngpng Picture16.png manage 110.6 K 2020-03-17 - 12:07 BharathRao  
Edit | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r17 | r11 < r10 < r9 < r8 | More topic actions...
 
This site is powered by the TWiki collaboration platformCopyright © by IBM and non-IBM contributing authors. All material on this collaboration platform is the property of the contributing authors.
Contributions are governed by our Terms of Use. Please read the following disclaimer.
Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.