You can configure an LDAP server for user
validation and to fetch user groups.
LDAP supports three modes for fetching the
roles assigned to a user.
- The role is available as an
attribute in the user Distinguished Name (DN) entry. Group attribute definition
is not needed.
- The user has a "memberOf"
attribute or any appropriate group DN attribute to identify the groups assigned
to the user. Assign the corresponding LDAP group to a role in XCO.
- LDAP groups have user entries in
their group definitions. Assign the LDAP groups to roles in XCO.
Note
If you configure LDAP server over SSL, and use IP to connect to the server, ensure that the certificate includes the IP as part of the subject alternative names (SANs) for a successful connection.
For more information about
commands and supported parameters, see
ExtremeCloud Orchestrator Command Reference,
3.2.0
.
-
To configure an external LDAP
server, run the following command:
# efa auth ldapconfig add --name ldapconfig –- host 10.x.x.x --bind-user-
name cn=admin,dc=extrnet,dc=com --bind-user-password password --user-search-
base ou=people,dc=extrnet,dc=com
The previous example
configures the bind user name and password and the DN of the node from which
searches start.
-
To configure an LDAP server in a
TPVM (Ubuntu OS), run the tpvm config ldap
command from the SLX-OS command line.