Applies To:
Oracle Internet Directory - Version 11.1.1.1.0 to 11.1.1.7.0 [Release 11g]
Goal:
The examples show plugin configuration for AD. Similar steps should work for other directories like
iPlanet/SunOne or ODSEE, ADAM, eDirectory, OpenLDAP, Tivoli.
The configuration shown here is for the case when a plugin communicates with third party directory services (AD) over LDAP.
In this document:
I. Configuring plugins in GUI.
Steps to be done:
1. Open ODSM: http://<host>:<port>/odsm
Login as cn=orcladmin user
click Advanced
In Plug-in list click oidexplg_"bind"_ad for configuring java-based bind external authentication plug-in for AD
Click "Optional Properties" tab
In "Flex Fields" define host/host2 and port/port2 with values for AD (test.local.com 389)
No other parameters apart from those are necessary in "Flex Fields"
For this case (OID communicate with AD over ldap), means the rest of the parameters from here should remain as default.
Login as cn=orcladmin user
click Advanced
In Plug-in list click oidexplg_"bind"_ad for configuring java-based bind external authentication plug-in for AD
Click "Optional Properties" tab
In "Flex Fields" define host/host2 and port/port2 with values for AD (test.local.com 389)
No other parameters apart from those are necessary in "Flex Fields"
For this case (OID communicate with AD over ldap), means the rest of the parameters from here should remain as default.
2.For "Plug-in Subscriber DN List"
set container dn where AD synchronized users are. In current example cn=adten,cn=users,dc=ro,dc=oracle,dc=com
Keep "Plug-in Request Group " as empty
We need to observe that "Plug-in Entry Properties" is (!(&(objectclass=orcladobject)(objectclass=orcluserv2)))keep this value, this means that plugin will NOT be invoked for users that are NOT synchronized from AD
3. Click "Mandatory Properties"
- Keep parameters from "Mandatory Properties" as below (those are default values usual)But check that "Plug-in Enable" checkbox to be checked
Click Apply button on the upper, left side
4. click oidexplg_compare_ad for configuring
java-based "compare" external authentication plug-in for AD Make similar settings like in previous oidexplg_bind_ad
Below are screenshoots with configuration.
Testing:
Now test the user created in AD using the following two commands.
1. ldapcompare -h <OID host> -p <OID port> -D "cn=orclacmin" -w <orcladmin password> -b <AD-USER-DN in OID> -a userPassword -v <AD-USER-PASSWORD>
2. ldapbind -h <OID host> -p <OID port> -D "<AD-USER-DN in OID>" -w <AD-USER-PASSWORD>






Comments
Post a Comment