Top Banner
UKLUG 2012 – Cardiff, Wales September 2015 Presenter: Wannes Rams Company: Ramsit ICON UK 2015 Managing LDAP changes in Connections
39

Managing ldap changes in connections

Apr 15, 2017

Download

Internet

Wannes Rams
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales September 2015

Presenter: Wannes Rams Company: Ramsit

ICON UK 2015 Managing LDAP changes in Connections

Page 2: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

About me

www.ramsit.com/blog

twitter.com/wannesrams

linkedin.com/in/wannesrams www.ramsit.com

Socialconnections.info

Page 3: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Overview

•  Task: Migrate from 1 ldap to another •  Difficulty: DN for users changes •  Migrate as is à Issues •  Solution

Page 4: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Disclaimer

Page 5: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Migrate from 1 ldap to another

Page 6: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Difficulty: DN for users changes

•  Customer LDAP team decided to change the user DN from To

Page 7: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Issue #1

•  If using default as GUID and no special config •  à Users deactivated à New users

Page 8: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Issue #2

•  Cognos Administrative user is an LDAP user •  Does not exist on new system •  Even if you create identical user and have custom GUID, you will have to remove and re-add from application roles due to different realm

Page 9: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Issue #3

•  IBM Forms field mapping for Displayname •  Our old LDAP had another attribute name for the users displayname then the new one. •  As IBM Forms does not use the Profiles DSX services, you need to change the IBM Forms config

Page 10: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Issue #4

•  Users will lose all access to CCM files •  With the default configuration (no custom guid) Filenet will generate new users (just like the TDI Sync for profiles).

Page 11: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  Implement custom GUID

GUID LoginName

•  We already had a custom GUID (best practice) for users •  Add one for groups as well if you plan on using groups in connections !!! •  Do this before you add CCM to your deployment

Page 12: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  The Identifier for Users and Groups in Connections is the GUID •  A GUID for an object does not change

Page 13: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  If an object is deleted, and recreated in LDAP, that object is recreated with a NEW ID (GUID)

•  Need to choose something “other” than the default! (e.g. uid, employee ID etc).

•  Custom GUID must follow following guidelines: •  Must be unique and static •  Must not exceed 256 char, for better performance se

fixed length •  Must be one to one mapping with the object

http://www-01.ibm.com/support/knowledgecenter/SSYGQH_4.5.0/admin/install/t_specify_dif_guid.dita?lang=en

Page 14: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

Page 15: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  Must exist in LDAP Schema and in WebSphere Virtual Member Manager (VMM) schema

•  If not, add the attribute to the wimxmlextension.xml to make it available to WebSphere

•  Connections must be told about these attributes •  LotusConenctions-config.xml

•  Must be specified in map_dbrepos_from_source.properties

•  Must be available in each object class assigned to your user or group

Page 16: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

Page 17: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

Page 18: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  On WebSphere level, wimconfig.xml is the place to be

Page 19: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

Page 20: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  We used a non-standard VMM Attribute for groups à wimxmlextension.xml

Page 21: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: General approach

•  Corresponding LotusConnections-config.xml

•  On Connections you can override using LotusConnections-config.xml •  I prefer not to override, especially when also using IBM Forms, IBM Cognos and IBM Filenet

Page 22: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: #Issue 1

•  The TDI Solution directory provided offers a solution to migrate your users (even if no custom GUID) •  You can configure a mapping field that the sync process can use to identify the user in the old and new LDAP •  Source LDAP is stored in the Profiles DB

Page 23: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: #Issue 1

•  Before Migration

•  Change following parameter in profiles-tdi.properties •  Sync_updates_hash_field

•  And make sure you enter a unique cross LDAP value

Page 24: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: #Issue 1

•  Change all other needed parameters in the config file (LDAP, base entry, credentials, …) •  Make the necassary changes to map_dbrepos_from_source.properties •  Run the sync_all.dns script

Page 25: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #2

•  You will need to backup all users in the Cognos Admin role

Page 26: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #2

•  Update admin user and password in /apps/ibm/bin/CognosConfig/cognos-setup.properties

Page 27: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #2

•  Run the following command while Cognos is running •  Add the new account as admin in WebSphere •  Update the J2C alias •  Re-add Metrics Admins and remove Everyone

Page 28: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #2

• Remove and add users from WebSphere roles

Page 29: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #3

•  Check /apps/ibm/data/Forms/extensions/Builder_config.properties and verify that this is reflecting your new LDAP à Restart

Page 30: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  Make sure you have custom GUID setup for Users and Groups à It is that simple •  If you do not, your users will lose all access to libraries and documents •  Don’t listen to IBM, they tell you you need a Filenet services team* for this migration

Page 31: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  Check Waltz debug log to see if FileNet picks up the Custom GUID •  Download and copy log4j.xml to your server and place it in the Application server log folder •  Add the following arguments to your JVM configuration -Dlog4j.configuration=/apps/ibm/data/WebSphere/profiles/AppSrv01/logs/log4j.xml -DskipTLC=true

Page 32: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  Screenshot JVM arguments`…

Page 33: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  Restart Filenet and check waltz.sonata.trace.log

•  Custom User Id Attribute is set to UID •  Custom Group Id Attribute is set to null. This will change after migration to new LDAP

Page 34: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  Check FileNet SID’s for some users before migration as reference •  2 ways to do this

•  Database: UT_CLBUSERIDENTITYMAPPING (FNOS)

•  Command line: generateSID.sh

Page 35: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Solution: Issue #4

•  After migration, check again for the same users after uploading a document with that user. If configuration is good you should see the user only once…

Page 36: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Recap: Migration steps

•  Backup Cognos and CCM Security •  Migrate Profiles using TDI •  Migrate LDAP in WebSphere •  Migrate Cognos •  Migrate Forms •  Migrate CCM • Clearscheduler on all db’s

Page 37: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Questions?

Page 38: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales

Resources

•  Special thanks to Gabriel Nkuite, IBM France •  http://www.slideshare.net/gabturtle/connections-and-directory-integrationURL •  http://www-01.ibm.com/support/knowledgecenter/SSYGQH_4.5.0/admin/install/t_specify_dif_guid.dita?lang=en

Page 39: Managing ldap changes in connections

UKLUG 2012 – Cardiff, Wales