Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| tutorial:adm:manage_ldap [2019/08/08 15:18] – [Provisioning] poulm | tutorial:adm:manage_ldap [2025/10/03 10:22] (current) – fiserp | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Systems - LDAP: Manage users ====== | ====== Systems - LDAP: Manage users ====== | ||
| - | |||
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | This tutorial will show you how to connect | + | This tutorial will guide you through connecting |
| ===== Basic configuration ===== | ===== Basic configuration ===== | ||
| - | Go to **Systems** from main menu, then above list of current systems | + | Navigate |
| ===== Connector configuration ===== | ===== Connector configuration ===== | ||
| + | In the next step, switch to the **Configuration** menu of your new system. First, select the connector, which in this case is the **LDAP connector**. This will open the specific configuration for this connector. | ||
| + | Thereafter, fill in the important fields. | ||
| - | In next step switch to menu **Configuration** of your new system. At first you need to choose connector, which in this case is **LDAP connector**. It will open specific configuration for that choice. | + | //Example configuration for our local LDAP:// TODO |
| - | + | ||
| - | Thereafter fill important fields. | + | |
| - | + | ||
| - | **Example configuration for our local LDAP:** TODO | + | |
| <note important> | <note important> | ||
| - | Switch on **Use VLV Controls** and set **VLV Sort Attribute** to the same value as **Uid Attribute**. Otherwise, | + | Enable |
| </ | </ | ||
| + | |||
| + | ==== Base Contexts ==== | ||
| + | The **Base Contexts** property contains one or more starting points in the LDAP directory tree used for searches. | ||
| + | When running synchronization in reconciliation mode, the connector initiates a search for every value in the Base Context separately. The search uses paging, meaning entries are processed in blocks of (by default) 100 records according to the configured (VLV) sort. Be cautious if you have multiple values in the Base Contexts and you **modify distinguished names** of entries **during reconciliation**. If entries are moved to a different base, other entries may be omitted due to paging and fall into the **Missing account** state. Try to avoid this use case at all. | ||
| ===== Scheme ===== | ===== Scheme ===== | ||
| - | For next step, go to menu **Scheme** on your system. | + | Proceed |
| - | + | You can let CzechIdM generate | |
| - | You can let CzechIdM generate scheme for you by click on **Generate scheme** button. | + | < |
| - | But if you want to set everything by yourself: | + | Generating a scheme typically marks most attributes as **multivalued** (even for e.g. givenName, sn, cn). This may be acceptable, but could complicate things |
| - | + | Make sure to verify what was generated. | |
| - | * Use button | + | </ |
| - | * Add all file columns | + | If you prefer to configure everything manually: |
| - | * Set all attributes as **Able to read** | + | * Use the **Add** |
| - | + | | |
| - | //Example scheme:// TODO | + | |
| - | + | //Example scheme:// TODO | |
| <note tip> | <note tip> | ||
| - | The attribute | + | The **uid** |
| - | + | On the other hand, the **Able to edit** | |
| - | On the other hand, the checkbox | + | |
| </ | </ | ||
| ===== Mapping ===== | ===== Mapping ===== | ||
| + | Navigate to the **Mapping** menu. Here, you must define how data from LDAP will be promoted to CzechIdM. | ||
| + | First, set: | ||
| + | * **Operation type:** Provisioning | ||
| + | * **Object name:** '' | ||
| + | * **Entity type:** Identity | ||
| + | * Set the **Mapping name** to whatever you prefer, e.g., " | ||
| + | Then map all columns as entity attributes as shown in the example below. Ensure that '' | ||
| - | Now go to menu **Mapping**. There you must set how data from LDAP will be promoted to CzechIdM. | + | //Example attribute mapping:// |
| - | + | ||
| - | At first set: | + | |
| - | * **Operation type:** Provisioning | + | |
| - | * **Object name:** \_\_ACCOUNT\_\_ | + | |
| - | * **Entity type:** Identity | + | |
| - | * As **Mapping name** set whatever you want to, for example Provisioning of users. | + | |
| - | + | ||
| - | Then map all columns as entity attributes as you can see it on picture below. Just **\_\_NAME\_\_** set as identifier. | + | |
| - | + | ||
| - | //Example attribute mapping:// | + | |
| <note tip> | <note tip> | ||
| - | The distinguished name should be mapped in the attribute | + | The distinguished name should be mapped in the '' |
| </ | </ | ||
| - | |||
| ===== Provisioning ===== | ===== Provisioning ===== | ||
| - | + | Finally, go to the **Provisioning** | |
| - | Finally go to menu **Provisioning** and add new one set its **Name** and these fields: | + | * **Allowed: |
| - | + | * **Set of mapped attributes: | |
| - | * **Allowed: | + | * **Correlation attribute: |
| - | * **Set of mapped attributes: | + | You can leave the rest of the configuration at default values. |
| - | * **Correlation attribute: | + | |
| - | + | ||
| - | You can leave the rest of configuration at the default values. | + | |
| //Example provisioning results:// TODO | //Example provisioning results:// TODO | ||
| ===== Create LDAP role in IdM ===== | ===== Create LDAP role in IdM ===== | ||
| - | To provision an account to LDAP, one must create a role for the system with LDAP provisioning mapping. | + | To provision an account to LDAP, you must create a role for the system with LDAP provisioning mapping. |
| - | * Create a role e.g. "LDAP - user" and save it | + | * Create a role, e.g., "LDAP - user", and save it. |
| - | * Go to System tab on role detail and add a system | + | * Go to the **System** tab on the role detail |
| - | + | To provision a user to LDAP, assign them the role "LDAP - user". The provisioning will occur immediately upon role assignment. You can check the provisioning status | |
| - | To provision a user to LDAP, assign them a role "LDAP - user". The provisioning will be provided as soon as the role is assigned to the user. The state of the provisioning you can check at the user profile detail | + | |