Connecting to Customer-Deployed LDAP Service

To use customer-deployed LDAP service for Fabric Manager authentication:

  1. Using vi or any other text editor as “sudo”, edit the /usr/local/ffm/config/shiro.ini file.

  2. Change the attributes as directed in the following lines and save the file:

    1. In the following line, replace <localhost:port no> with the IP address of the system where the customer’s LDAP service is running, followed by the port number.

      ldapRealm.contextFactory.url = ldap://<localhost:port no>
    2. In the following line, replace <cn=root,dc=unisys,dc=com> with the user name.

      ldapRealm.contextFactory.systemUsername = <cn=root,dc=unisys,dc=com>
    3. In the following line, type the password:

      ldapRealm.contextFactory.systemPassword = <LDAPAdmin@1>

Note: Restart Fabric Manager services for the changes to take effect.

You can now authenticate using the customer-deployed directory service. Ensure that the systemUsername has read-only permission to the LDAP directory. To know about user authentication with the customer-deployed LDAP service, see the documentation provided by the vendor.

Note: Directory structure of the customer-deployed directory service should match the directory structure defined for FFM OpenLDAP. The following figure depicts the high level schema used by OpenLDAP in the Fabric Manager:

Modify the /usr/local/ffm/config/shiro.ini file and replace the following with appropriate values applicable to the customer-deployed LDAP service:

To know how to map the groups to roles, see Mapping Groups to Roles.