Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved

Chapter 2 Machine Management and Domain Configuration : Creating a Domain that Integrates with an LDAP Directory Server

Creating a Domain that Integrates with an LDAP Directory Server
Certain configuration information such as LDAP directory server connection search parameters and synchronization parameters must be specified when using Domain Utility to create an administration domain. These can be set at installation when creating the initial domain, or later when creating or modifying an administration domain.
After creating an administration domain that is integrated with an LDAP directory server, you cannot change the same administration domain to be a non-LDAP domain. You must create a new administration domain that does not integrate with an LDAP directory server.
You can integrate an existing domain with an LDAP directory server or modify an administration domain that uses an LDAP directory server by invoking Domain Utility and selecting the Server Setting category, then selecting the LDAP Configuration task. See Changing a Domain’s Integration With an LDAP Directory Server for details.
 
Working With User and Group Filters
When defining search criteria for retrieving users, groups or both from the LDAP server, you can create multiple search filters and test the search parameters before creating the domain.
The valid LDAP users that will appear in the TIBCO Administrator GUI and that can log into any TIBCO application are determined by the user filter. The valid LDAP groups that will appear as group synchronized roles in the TIBCO Administrator GUI are determined by the group filter. Group membership is limited by the user filter. This means that if a valid LDAP group contains users in its membership that are not valid based on a user filter, those users will not display in the corresponding group-synchronized role in the TIBCO Administrator GUI.
An LDAP user is a valid user if it meets any of the user filter conditions. Similarly an LDAP group is a valid group if it meets any of the group filter conditions. There is no correlation between group filter and a user filter within a set. The filters are separate, one for groups and one for users. This allows you to omit a filter in any filter set as long as there is at least one set where a user filter is specified.
Viewing Calls Made to the LDAP Server
Information about the calls made to the LDAP server is logged in the LDAP server’s log files and can be logged in the TIBCO_TRA_DOMAIN_HOME\domain-name\logs\administrator.log file.
To log the calls in the administrator.log file, you must first edit the TIBCO_TRA_DOMAIN_HOME\domain-name\AuthorizationDomain.properties file) by setting LogDebug=true. Debug statements such as "... searchLDAP ..." will then appear in the administrator.log file.
To Create an LDAP Based Domain Using the GUI
To create an administration domain that uses LDAP users and groups:
1.
Start Domain Utility and click the Next button on the main screen.
2.
Under Category, click Domain Configuration, then click Create a new Administration Domain.
3.
Click Next and in the screen that appears, provide a name for the administration domain in Administration Domain. See Domain Details for information about the fields that display.
4.
To use TIBCO Enterprise Message Service as the transport for the domain, click Show Advanced and select TIBCO EMS. Provide values for connecting to the Enterprise Message Service server in the TIBCO EMS parameters for TIBCO Administrator panel. To use TIBCO Rendezvous as the transport, no action is necessary as Rendezvous is the default transport choice.
5.
As shown next, Select User and Group information retrieved from a corporate LDAP.
Figure 3 Administrator Configuration
6.
Click Next and, if necessary, change the values for the web server ports. In most cases, its best to accept the default settings. See Web Server Ports.
7.
Click Next and provide the administrator credentials for the administration domain. Note that these credentials are for TIBCO Administrator, not for the LDAP directory server.
8.
Click Next and in the screen that appears provide the LDAP connection information, search parameters and synchronization information. See LDAP Configuration Fields for a description of these values.
Figure 4 Corporate LDAP for Users and Groups
9.
Click Next to display a summary page where you can verify the parameters.
10.
Click Next to create the domain. After creating the domain, start the required services that are listed in the dialog.
11.
Click Finish to end the session.
To Create an LDAP Based Domain Using the Command Line Utility
1.
2.
Copy the following file to your working directory: TRA_HOME\template\domainutility\cmdline\CreateDomain.xml
3.
Open CreateDomain.xml in a text editor.
The CreateDomain.xml file contains sections for creating a domain that uses a repository, LDAP server, and database. Change only the LDAP server section and make sure that the LDAP server section is not commented out. The parameters for a domain that integrates with an LDAP server are explained in the following section. After changing the parameters, save the file and exit the text editor.
4.
   domainutilitycmd -cmdFile working-dir-path\CreateDomain.xml
LDAP Configuration Fields
 
If no value is given in the Bind Password fields, an anonymous login into the LDAP directory server is assumed.
Set the authentication type that is accepted by your LDAP directory server. The values are Simple and SSL. If using simple authentication, the Bind DN and Bind password (in clear text) is sent to the LDAP directory server. If using SSL, see Configuring LDAP Integration With SSL Connections for more information and additional configuration steps.
Note: You cannot use LDAP referral if you are using CA Directory Server as your LDAP server.
When selected, the Referral LDAP form appears. Click the Add button to configure the referral LDAP bind information with an LDAP URL, Bind DN and Bind Password. The connection to each referral LDAP directory server can be tested. One or more bind information referrals to LDAP directories can be added.
You can limit the maximum number of referral hops that TIBCO applications and services should follow by setting the number in the Maximum Referral Hops field. This helps to avoid indefinite queries when cyclic referrals are present in LDAP directories.
Where domain is the domain of the domain controller, such as acme.com or la.acme.com.
Note: If you select CA Directory Server, note that it does not support LDAP referral. Note also that TIBCO PortalBuilder™ does not support CA Directory Server.
This allows you to add, edit or remove the search criteria for retrieving users, groups or both from the LDAP server. Click Add to display the search parameters dialog where you can define search criteria for users and groups. You can select the vendor for your LDAP directory server from the drop-down list to populate the fields with common values. This will reset the search parameters and search attributes with selected vendor defaults. Note that any search parameters added earlier will disappear, and all custom search attributes specified earlier will disappear.
When you write a search filter, you must provide a Base DN value as shown next. Using the defaults for the user and group search filters, all users and groups are returned.
Base DN: dc=na,dc=tibco,dc=com
User Search Filter: objectclass=person
Group Search Filter: objectclass=groupofuniquenames
Base DN: dc=na,dc=tibco,dc=com
User Search Filter: (&(objectclass=person)(manager=ProductManager))
Group Search Filter: objectclass=groupofuniquenames
Base DN: dc=na,dc=tibco,dc=com
User Search Filter: (&(objectclass=person)(manager=ProductManager))
Group Search Filter: (&(objectclass=groupofuniquenames)(cn=TEAK*))
If you do not set this option, you can still perform synchronization manually in the TIBCO Administrator GUI or by using the CorpRoleSynchronizer command line utility. See the TIBCO Administrator User’s Guide for more information.
Note: To ensure that LDAP synchronizations happen at the same time(s) each day, specify an interval that is divisible by 24 hours.
Note: To ensure that cached corporate users expire at the same time (s) each day, specify an interval that is divisible by 24 hours.
Time of Day for Expiry Parameter
For Administration Domains integrated with Corporate LDAP, group memberships and user LDAP properties are retrieved from LDAP and cached in memory when required by a TIBCO Runtime Agent based application. This information expires at the schedule specified in the Corporate User Expiration Interval field in TIBCO Domain Utility. The schedule is reset automatically at midnight GMT and then proceeds using the interval given in the field. However, performance can be affected if a reset occurs during high traffic times.
You can now control when the schedule is reset with the use of the TimeOfDayForExpiry parameter. Instead of the schedule reset always occurring at midnight GMT, the reset can occur at the time given for the TimeOfDayForExpiry parameter.
The parameter must be specified in the AuthorizationDomain.properties file on each machine where TIBCO Runtime Agent is installed. Applications that use TIBCO Runtime Agent (including TIBCO Administrator) must be restarted after adding the parameter to the file. For example:
TimeOfDayForExpiry=2:00:00 AM EST
The time can be specified in any of these formats:
2:00:00 AM time-zone
2:00:00 AM
2:00 AM
In the case where the time zone is not specified in the parameter, it uses the default time zone of the server where the TIBCO Runtime Agent based application is running. For example:
If TimeofDayForExpiry is not set and the Corporate User Expiration Interval is 24 hours, a TIBCO Runtime Agent application cache is cleared at midnight GMT (even if the application server is in some other time zone such as EST).
If TimeofDayForExpiry is set to 2:00 AM EST and the Corporate User Expiration Interval is 24 hours, a TIBCO Runtime Agent application cache is cleared at 2:00 AM EST.
If TimeofDayForExpiry is not set and the Corporate User Expiration Interval is 4 hours, a TIBCO Runtime Agent application cache is cleared every 4 hours counting from midnight GMT.
(Again it is counted from Midnight GMT, even if the application server is in some other time zone such as EST).
If TimeofDayForExpiry is set to 2:00 AM EST and the Corporate User Expiration Interval is 4 hours, a TIBCO Runtime Agent application cache is cleared every 4 hours counting from 2:00 AM EST.
Note that:
TimeOfDayForExpiry works with the Corporate User Expiration Interval setting. Even though you can set TimeOfDayForExpiry to a certain time of the day, it can expire at another time of the day too, based on a Corporate User Expiration interval that is shorter than 24 hours as described in examples above.
TimeOfDayForExpiry does not affect the time of the synchronization process that (only) occurs in the TIBCO Administrator server and that is based on the synchronization interval that automatically creates roles for each LDAP Corporate Group.

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved