EditAttachPrintable
r10 - 2018-02-14 - 10:20:07 - ShubjitNaikYou are here: TWiki >  Deployment Web > DeploymentInstallingUpgradingAndMigrating > JazzAuthorizationServer > JASUserRegistryConfig

Configure JAS with a User Registry - LDAP or File Based new.png

Authors: ShubjitNaik
Build basis: JAS and CLM version 6.0.x

Jazz Authorization Server is based on the IBM WebSphere Liberty server. Because Jazz Authorization Server authenticates users, it must be configured with a user registry. WebSphere Liberty server has capabilities similar to the full WebSphere Application Server; it can be configured to use a Lightweight Directory Access Protocol (LDAP) registry, or users can be defined in local files.

This article will focus on steps to help configure JAS with a File based User Registry and LDAP User registry.

Installation

CLM

  • To deploy JAS to an existing environment and migrate to JAS, visit this Section on our Infocenter
  • For a new deployment of CLM, Install the applications via IBM Installation Manager and Select the option "Enable Jazz Security Architecture SSO" during the installation

    Enable_JAS_SSO.jpg

JAS

  • Download Jazz Authorization Server install bit from jazz.net, under All Downloads Section for the specific version

    JAS_Download.jpg

  • Install Jazz Authorization Server application via Installation Manager, instructions available on our Infocenter

    JAS_Install.jpg

Setup and Configure JAS with a User Registry

Configuration files

  • Copy the files from JazzAuthServer_install_dir/wlp/usr/servers/jazzop/defaults folder one level up to JazzAuthServer_install_dir/wlp/usr/servers/jazzop/
  • Files we would modify are server.xml, appConfig.xml, ldapUserRegistry.xml and localUserRegistry.xml
  • appConfig.xml - Contains Jazz Group/Role mappings and UserRegistry file information
  • ldapUserRegistry.xml - Configuring Liberty with an LDAP user registry
  • localUserRegistry.xml - Configuring Liberty file based registry

Configure JAS with Liberty file based registry

  • By default the bundled Liberty profile is configure with File based user registry.
  • Open the file JazzAuthServer_install_dir/wlp/usr/servers/jazzop/localUserRegistry.xml
  • Add new Users or Groups and save the file
    <server>
    
        <!-- Sample basic user registry definition
         The passwords for the "ADMIN" and "clmadmin" users are the same as the user names.
         If those users are to be retained, the wlp/bin/securityUtility script should be used
         to encode new passwords. Otherwise, new users should defined with encoded passwords.
         -->
            <basicRegistry>
          <user name="ADMIN" password="{xor}HhsSFhE="/>
          <user name="clmadmin" password="{xor}PDMyPjsyNjE="/>
          <user name="clmuser" password="plaintext_password"/>
    
          <group id="JazzAdmins" name="JazzAdmins">
            <member name="ADMIN"/>
            <member name="clmadmin"/>
          </group>
          <group id="JazzUsers" name="JazzUsers">
            <member name="clmuser"/>
          </group>
          <group id="JazzGuests" name="JazzGuests">
          </group>
          <group id="JazzProjectAdmins" name="JazzProjectAdmins">
          </group>
        </basicRegistry>
    
            <administrator-role>
          <user>clmadmin</user>
        </administrator-role>
    
    </server> 

  • You can either enter Plain Text Passwords or encrypt the passwords using the securityUtility

Configure JAS with LDAP registry

  • By default the bundled Liberty profile is configured with file based user registry
  • To change the configuration to LDAP registry, edit JazzAuthServer_install_dir/wlp/usr/servers/jazzop/defaults/appConfig.xml file
  • Towards the end of the file change from
  •  <include location="localUserRegistry.xml" optional="true"/>
        <!--include location="ldapUserRegistry.xml" optional="true"/-->
    TO
  •  <!--include location="localUserRegistry.xml" optional="true"/-->
        <include location="ldapUserRegistry.xml" optional="true"/>

  • To Configure the LDAP User Registry, guidance from LDAP administrators / Network admins may be necessary to complete the configuration Typical information needed from your LDAP Admin
    • LDAP Server Name and Port (LDAP Server hostname and Port)
    • The Base DN (LDAP Root Tree where Users/Groups can be queried from_)
    • bindDN and bindPassword (User ID and password for the user who can query the LDAP directory)
    • Group and User filter (inetOrgPerson, groupOfNames etc)
    • User ID and Group ID mappings (sAMAccountName, cn etc)

  • Example configuration for different LDAPs information is available in our Infocenter
  • We have included a few examples from different LDAP environments (MS Active Directory, Tivoli and ApacheDS) to help guide the configuration.
  • Edit JazzAuthServer_install_dir/wlp/usr/servers/jazzop/defaults/ldapUserRegistry.xml and modify the ldapRegistry configuration for your LDAP registry

Microsoft Active Directory

  • <server>
    
    <ldapRegistry ldapType="Microsoft Active Directory" baseDN="CN=Users,DC=test,DC=com" 
            bindDN="CN=CLM Admin,CN=Users,DC=test,DC=com" bindPassword="********" 
            host="ldapserver" id="ldapserver:389" ignoreCase="true" port="389" realm="ldapserver:389"
            recursiveSearch="true" referal="follow" sslEnabled="false">  
            
            <activedFilters
                            userFilter="(&amp;(sAMAccountName=%v)(objectcategory=user))"
                            groupFilter="(&amp;(cn=%v)(objectcategory=group))"
                            userIdMap="user:sAMAccountName"
                            groupIdMap="*:cn"
                            groupMemberIdMap="memberOf:member" >
                    </activedFilters>
        </ldapRegistry>
    
    </server>

IBM Tivoli Directory Server

  •  <server>
        <ldapRegistry ldapType="IBM Tivoli Directory Server" baseDN="o=test.com" 
         bindDN="uid=clmadmin,c=in,ou=Users,o=test.com" bindPassword="********"
         host="ldapserver" id="ldapserver:389" ignoreCase="true"  port="389"
         realm="ldapserver:389" recursiveSearch="true" sslEnabled="false">
         
       <idsFilters 
             groupFilter="(&amp;(cn=%v)(|(objectclass=groupOfUniqueNames)(objectclass=posixGroup)))"
             groupIdMap="*:cn"
             groupMemberIdMap="groupOfUniqueNames:uniquemember"
             userFilter="(&amp;(uid=%v)(objectclass=person))"
             userIdMap="*:uid">
        </idsFilters>
    
        </ldapRegistry>
        </server> 

Apache DS

  • <server>
            <ldapRegistry ldapType="Custom" baseDN="dc=example,dc=com" host="localhost" 
                  id="localhostexample:10389" ignoreCase="true" port="10389" referal="follow" 
                   realm="localhostexample:10389" recursiveSearch="true" sslEnabled="false">
                  
                 <customFilters
                        groupFilter="(&amp;(cn=%v)(|(objectclass=groupOfUniqueNames)(objectclass=posixGroup)))"
                        groupIdMap="*:cn" 
                        groupMemberIdMap="groupOfUniqueNames:uniquemember"
                        userFilter="(&amp;(uid=%v)(objectclass=inetOrgPerson))"
                        userIdMap="*:uid" >
                  </customFilters>
           </ldapRegistry>
    </server> 

Encrypt Passwords

  • To encrypt passwords, run the script JazzAuthServer_install_dir/wlp/bin/securityUtility
  • After the script completes, copy the output to the password attribute associated with the user ID (or bindPassword)
  • To run the securityUtility script, use the following syntax:
  • $ securityUtility encode userPassword 
    where userPassword is the password to encode

Group to Role Mappings

  • Groups to Jazz Roles mappings are picked from JTS configuration when JAS is configured with LDAP. When running JTS/Setup select the User registry type as LDAP and configure to the same LDAP registry that is configured with JAS and enter the group mappings under the property Jazz to LDAP Group Mapping (The steps are included later in this article)

  • To Map Groups / Users who would Administrate JAS and Register applications for CLM
    <oauth-roles>
            <authenticated>
                <special-subject type="ALL_AUTHENTICATED_USERS" />
            </authenticated>
            <clientManager>
                <group name="MYJAZZADMINS" />
                <group name="JazzAdmins"/>
                <user name = "MYSCIMADMIN" />
            </clientManager>
        </oauth-roles> 

Configure Database for JAS

When you first install JAS, it comes configured to use a local Derby database for storing information. It is not recommended to use Derby database for a production environment and note that Derby database won't work in a clustered JAS environment, since that information won't be available to all the instances.

The basic steps to configure the database are:

  • Create database tables on a database server which all JAS instances can access
  • Update the JAS configuration file (appConfig.xml) to use the database server

The following links provide information for both Oracle and DB2, and sample SQL scripts are available that can create the necessary tables. But note that you will need to customize these scripts for your own environment.

Test JAS Configuration

Jazz Team Server (JTS) Setup with JAS

  • For a new deployment, CLM installation should be enabled for Jazz Security Architecture SSO
  • Accessing the JTS setup page, https://jtsserver:port/jts/setup , would not prompt for a Username / Password
  • Express setup would be disabled for a CLM instance enabled for Jazz Security Architecture SSO
    JTS_Setup.png

  • Run through the setup following the prompt until you reach "Register Applications" Page
  • Enter the Jazz Authentication Server details. The URL you enter should be accessible by all and is as important as the Jazz Public URI
    JAS_Server.png

  • DONOT register applications at this stage, delete the listed applications that was found and proceed to next step

File based registry

  • In the Next step (Step 6), "Select a type of User Registry, select Non-LDAP External Registry
    Basic_Config.png

  • Create a user with userID details from users configured in localUserRegistry.xml
  • Click on Save and Log in and Login as a User with JazzAdmin role
  • Assign a License to the User
  • Go back to Register Applications page (Step 5) and register all the applications
  • Complete the setup

LDAP Registry

  • Ensure pop-up blocker is disabled on the browser, or Pop-ups are allowed for CLM and JAS URLs
  • In the Next step (Step 6), "Select a type of User Registry, select LDAP
    LDAP_Config.png
  • Enter the LDAP Details, there are 3 sections as mentioned below
    1. - LDAP Server and Bind User details
      LDAP_Registry.png

    2. - Base USer DN and USer Properties mapping
      LDAP_User.png

    3. - Group DN, Role and Property mapping
      LDAP_Group.png

  • Assign a license and click Next
  • A Login window would be displayed, Login as a user with JazzAdmin role assigned
  • Go back to Register Applications page (Step 5) and register all the applications
  • Complete the setup

Enable an Existing CLM setup for Jazz Security Architecture

  • Complete the Jazz Authorization Server Setup, Configuration and testing as per instructions within this article
  • Enable CLM applications for Jazz Security Architecture single sign-on following the instructions on our InfoCenter


Related topics: Jazz Authorization Server, Deployment web home

External links:

Edit | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r23 | r12 < r11 < r10 < r9 | More topic actions...
 
This site is powered by the TWiki collaboration platformCopyright © by IBM and non-IBM contributing authors. All material on this collaboration platform is the property of the contributing authors.
Contributions are governed by our Terms of Use. Please read the following disclaimer.
Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.