IBM DB2 and Transparent LDAP Authentication

Similar documents
Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with Active Directory and LDAP

LDAP. Lightweight Directory Access Protocol

Authenticating and Importing Users with AD and LDAP

How to install LDAP. # yum install openldap-servers openldap nss_ldap python-ldap openldap-clients -y

LDAP Quick Start Manual

Best practices. Starting and stopping IBM Platform Symphony Developer Edition on a two-host Microsoft Windows cluster. IBM Platform Symphony

TPF Users Group Fall 2008 Title: z/tpf Support for OpenLDAP

fanvil file, forbidden to steal!

Configure the ISE for Integration with an LDAP Server

First thing is to examine the valid switches for ldapmodify command, ie on my machine with the Fedora Direcotory Server Installed.

Install Kopano Core on Debian or Ubuntu with OpenLDAP

OpenLDAP Everywhere Revisited

Contents. Configuring AD SSO for Platform Symphony API Page 2 of 8

FreeIPA - Control your identity

Best practices. Linux system tuning for heavilyloaded. IBM Platform Symphony

Implementing Enhanced LDAP Security

Best practices. Reducing concurrent SIM connection requests to SSM for Windows IBM Platform Symphony

Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Directory Server Replication

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.2 Rev 1. - Accessing databases

by Adam Stokes draft 1 Purpose? This document is a rough draft intended on integrating Samba 3 with Red Hat Directory Server 7.1 (RHDS).

Continuous Availability with the IBM DB2 purescale Feature IBM Redbooks Solution Guide

Installing Watson Content Analytics 3.5 Fix Pack 1 on WebSphere Application Server Network Deployment 8.5.5

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture

Best practices. Defining your own EGO service to add High Availability capability for your existing applications. IBM Platform Symphony

IBM z/os Management Facility V2R1 Solution Guide IBM Redbooks Solution Guide

IBM WebSphere Sample Adapter for Enterprise Information System Simulator Deployment and Testing on WPS 7.0. Quick Start Scenarios

Understanding the LDAP Binding Component

IBM UrbanCode Cloud Services Security Version 3.0 Revised 12/16/2016. IBM UrbanCode Cloud Services Security

IBM Copy Services Manager Version 6 Release 1. Release Notes August 2016 IBM

IBM Platform HPC V3.2:

LDAP Configuration Guide

pumpkin Documentation

IBM License Metric Tool Version Readme File for: IBM License Metric Tool, Fix Pack TIV-LMT-FP0001

Certificate SAP INTEGRATION CERTIFICATION

Troubleshooting WebSphere Process Server: Integration with LDAP systems for authentication and authorization

How to Authenticate User Manager via OpenLDAP

CLI Failover SAP on z Systems and Db2 for z/os

Advanced Network and System Administration. Accounts and Namespaces

IBM Cloud Orchestrator. Content Pack for IBM Endpoint Manager for Software Distribution IBM

Implementing Single-Sign-On(SSO) for APM UI

Patch Management for Solaris

Integrated use of IBM WebSphere Adapter for Siebel and SAP with WPS Relationship Service. Quick Start Scenarios

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 3. - Accessing databases

openssh-ldap-pubkey Documentation

IBM Spectrum LSF Version 10 Release 1. Readme IBM

SAP NetWeaver on IBM Cloud Infrastructure Quick Reference Guide Microsoft Windows. December 2017 V2.0

IMM and IMM2 Support on IBM System x and BladeCenter Servers

Using Client Security with Policy Director

IBM Tivoli Directory Server Version 5.2 Client Readme

IBM Operational Decision Manager. Version Sample deployment for Operational Decision Manager for z/os artifact migration

E-Sourcing System Copy [System refresh from Production to existing Development]

Tivoli Access Manager for Enterprise Single Sign-On

AAI at Unil. Home Organization Integration

Ubuntu Documentation > Ubuntu 8.10 > Ubuntu Server Guide > Network Authentication > OpenLDAP Server

CONFIGURING SSO FOR FILENET P8 DOCUMENTS

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

Managing IBM Db2 Analytics Accelerator by using IBM Data Server Manager 1

Cisco Expressway Authenticating Accounts Using LDAP

IBM Operational Decision Manager Version 8 Release 5. Configuring Operational Decision Manager on Java SE

Platform LSF Version 9 Release 1.1. Migrating on Windows SC

Tivoli Access Manager for Enterprise Single Sign-On

Red Hat Directory Server Red Hat Directory Server 9 Updates Available in Red Hat Enterprise Linux 6.4

Lotus. Mobile Connect Version Getting started

Job Aid: LDAP or VMM Synch

IBM DB Getting started with Data Studio Hands-On Lab. Information Management Cloud Computing Center of Competence.

Enable the following two lines in /etc/ldap/ldap.conf, creating the file if necessary:

Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide

Integrated Management Module (IMM) Support on IBM System x and BladeCenter Servers

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Host Access Management and Security Server Administrative Console Users Guide. August 2016

Build integration overview: Rational Team Concert and IBM UrbanCode Deploy

Release Notes. IBM Tivoli Identity Manager Rational ClearQuest Adapter for TDI 7.0. Version First Edition (January 15, 2011)

Netcool/Impact Version Release Notes GI

Application Guide. Connection Broker. Advanced Connection and Capacity Management For Hybrid Clouds

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM

RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server

Rocket LDAP Bridge. Jared Hunter June 20, Rocket Software Inc. All Rights Reserved.

The Evolution of an Integrated User Directory

Tivoli Access Manager for Enterprise Single Sign-On

IBM. Combining DB2 HADR with Q Replication. IBM DB2 for Linux, UNIX, and Windows. Rich Briddell Replication Center of Competency.

IBM Rational Synergy DCM-GUI

IBM Cognos Dynamic Query Analyzer Version Installation and Configuration Guide IBM

Integrating IBM Rational Build Forge with IBM Rational ClearCase and IBM Rational ClearQuest

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM

Tivoli Access Manager for Enterprise Single Sign-On

Using the IBM DS8870 in an OpenStack Cloud Environment IBM Redbooks Solution Guide

Novell Identity Manager

Installing and Configuring Tivoli Monitoring for Maximo

Configuring Ambari Authentication with LDAP/AD

IBM. Release Notes November IBM Copy Services Manager. Version 6 Release 1

Readme File for Fix Pack 1

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 4. - Joining data sources

IBM Storage Driver for OpenStack Version Release Notes

Environment 7.1 SR5 on AIX: Oracle

Best practices. IBMr. Managing resources in an IMSplex with OM, type-2 commands, and SPOC IBM IMS. Janna Mansker IMS Development

Release Notes. IBM Tivoli Identity Manager Oracle PeopleTools Adapter. Version First Edition (May 29, 2009)

Implementing IBM Easy Tier with IBM Real-time Compression IBM Redbooks Solution Guide

Platform LSF Version 9 Release 1.3. Migrating on Windows SC

Transcription:

IBM DB2 and Transparent LDAP Authentication IBM Deutschland Research & Development GmbH SAP DB2 Development Team 08/2009 Author: Co-Author: Hinnerk Gildhoff - hinnerk@de.ibm.com Marcel Csonka marcel.csonka@de.ibm.com 1

1. Abstract This document describes how to use transparent LDAP with DB2. This is a new feature of DB2 9.7 and has been supported since DB2 9.5 FP4. Older database versions had a different and more complicated approach in using the benefits of LDAP together with DB2 which is described in more detail in the whitepaper IBM DB2 authentication with OpenLDAP in system landscapes like SAP [2]. The old approach works with security plug-ins which users needs to install and configure before they can combine the benefits of DB2 and LDAP in their system environments. The communication between DB2 and LDAP is managed by these plug-ins as a broker. With the new transparent LDAP feature of DB2, we do not need to configure any plug-ins anymore. DB2 can now access and support underlying operating systems that are configured to use LDAP as authentication mechanism for users and their groups. So, DB2 asks the operating system which can get the needed information from the LDAP server and returns it to the database. The database operates not differently from local system authentication. The LDAP authentication works now as a transparent feature in DB2. In this whitepaper, you learn how to set up LDAP users and groups for DB2 on Linux and how you can use OpenLDAP and DB2 without having to configure security plug-ins. You understand the benefits of transparent LDAP support in DB2 and how you can use this in you own system environment to improve your user management. 2

2. Table of Contents 1. ABSTRACT... 2 2. TABLE OF CONTENTS... 3 3. DISCLAIMER & TRADEMARKS... 4 4. TRANSPARENT LDAP... 5 4.1 CONFIGURE TRANSPARENT LDAP FOR DB2... 5 5. LIST OF ABBREVIATIONS... 10 6. TABLE OF FIGURES... 11 7. LIST OF LITERATURE... 12 3

3. Disclaimer & Trademarks The information in this document may concern new products that IBM may or may not announce. Any discussion of OEM products is based upon information which has been publicly available and is subject to change. The specification of some of the features described in this presentation may change before the General Availability date of these products. REFERENCES IN THIS PUBLICATION TO IBM PRODUCTS, PROGRAMS, OR SERVICES DO NOT IMPLY THAT IBM INTENDS TO MAKE THESE AVAILABLE IN ALL COUNTRIES IN WHICH IBM OPERATES. IBM MAY HAVE PATENTS OR PENDING PATENT APPLICATIONS COVERING SUBJECT MATTER IN THIS DOCUMENT. THE FURNISHING OF THIS DOCUMENT DOES NOT IMPLY GIVING LICENSE TO THESE PATENTS. TRADEMARKS IBM, the IBM logo, ibm.com, and DB2, are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml" SAP and related names like SAP NetWeaver are registered trademarks of SAP AG in Germany and in several other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. 4

4. Transparent LDAP LDAP is a Lightweight Directory Access Protocol that describes the communication between LDAP clients and a directory server. It is based on a client/server model, which is generally used together with directory services. The directory server contains object-related information which can be read by different LDAP clients using LDAP queries that fulfill the standard LDAP implementation. One of the important reasons for using LDAP is the centralized management of logon credentials, which can be queried by any applications supporting the open LDAP standard. Additionally, it is easy to use and to integrate in your existing environment and the LDAP protocol provides great flexibility. With LDAP, it is possible to create a single point of administration across a heterogeneous environment. In order to get detailed information about LDAP, refer to [1] or other documentations. Intended audience for this paper, are experienced administrators with at least knowledge about how to configure LDAP servers and clients (Otherwise see [2]). We focus on the DB2 SAP users and groups that are needed to leverage LDAP with your SAP system, based on IBM DB2. 4.1 Configure Transparent LDAP for DB2 The first thing to do, create a LDIF file containing all user and group objects in an LDAP like manner. Our base DN is simply an example. If you have an existing LDAP tree in your directory, change the root node appropriately and include the following as an sub tree into your structure. Figure 1 - DB2 LDIF Tree 5

It is possible to use a remote or a local LDAP server. Ensure that your LDAP server is up and running and that it is working correctly. The following LDIF file represents the structure described in Figure 1 with the SAP example identifier HM1. Use this file with your own SID to add the new objects to your LDAP server: base dn: example.com dn: dc=example,dc=com dc: example o: example organization dcobject pc box db dn: dc=db697,dc=example,dc=com dc: db697 o: db697 organization dcobject Group: db<sid>adm dn: cn=dbhm1adm,dc=db697,dc=example,dc=com cn: dbhm1adm top posixgroup gidnumber: 400 groupofnames member: uid=db2hm1,cn=dbhm1adm,dc=db697,dc=example,dc=com memberuid: db2hm1 User: db2<sid> dn: uid=db2hm1,cn=dbhm1adm,dc=db697,dc=example,dc=com cn: db2hm1 sn: db2hm1 uid: db2hm1 top inetorgperson posixaccount uidnumber: 400 gidnumber: 400 loginshell: /bin/csh homedirectory: /db2/db2hm1 Group: db<sid>ctl dn: cn=dbhm1ctl,dc=db697,dc=example,dc=com cn: dbhm1ctl top posixgroup gidnumber: 404 groupofnames member: uid=hm1adm,cn=dbhm1adm,dc=db697,dc=example,dc=com 6

memberuid: hm1adm User: <sid>adm dn: uid=hm1adm,cn=dbhm1ctl,dc=db697,dc=example,dc=com cn: hm1adm sn: hm1adm uid: hm1adm top inetorgperson posixaccount uidnumber: 404 gidnumber: 404 loginshell: /bin/csh homedirectory: /home/hm1adm Save this in a text file, for example, /data/ldap/db2_97.ldif and execute the following command to add these entries to your LDAP server: ldapadd r- -D "cn=manager,dc=example,dc=com" -W -f /data/ldap/db2_97.ldif After successful registration of the DB2 users and the respective groups at the LDAP server, logon to the server where you want to install the database. As mentioned before, this could be your local LDAP server host or a different server. You only need to configure your LDAP client accordingly. Next, ensure that all home directories for the new users exist with the right permissions, especially for the database administrator user. In our case, this is db2hm1. The SAP installation tool does not create these directories because we use an existing user in the db2 setup process. So, ensure that these directories exist with at least two files needed for user environment specifications (.profile and.login). If this is not the case, create the directories and the files as specified below. DB2 saves data in these directories and adds a few lines to the profile files enabling the database administrator, for example, to access the db2 library. rwxr-xr-x hm1adm:hm1adm /home/hm1adm -rw-r--r-- hm1adm:hm1adm /home/hm1adm/.profile -rw-r--r-- hm1adm:hm1adm /home/hm1adm/.login rwxr-xr-x db2hm1:db2hm1 /db2/db2hm1 -rw-r--r-- db2hm1:db2hm1 /db2/db2hm1/.profile -rw-r--r-- db2hm1:db2hm1 /db2/db2hm1/.login Before you continue with the SAP/DB2 installation, validate the current system environment. You need to check whether the LDAP server is accessible, users and groups are registered at the directory server and, if the usage of LDAP is enabled. In order to test if the LDAP server is accessible and whether all required users are included, it is recommended that you use the ldapsearch command. If open LDAP tools are installed (see [2]) and the LDAP server is up and running, the following command returns all users listed in the LDAP directory: ldapsearch x 7

Now check if your operating system is using LDAP as authentication mechanism. These commands should return your local and your new configure LDAP user and groups: getent passwd getent group After validation was successful, start the SAP installation tool (SAPinst). SAPinst will determine existing users automatically without further interaction, as seen in Figure 2. You just have to enter the current password of the LDAP users. That is all. The SAP and DB2 installation supports now your LDAP user and groups. Figure 2 - Use existing LDAP user as <sapsid>adm 8

After your installation finished successfully, change to your new database administrator db2hm1 and check if you have the required authorities to perform your daily administrative tasks. As you will see, everything will work as before with local user authentication. As a conclusion we see, that the usage of LDAP with DB2 V9.5 FP4 and DB2 9.7 is much more easy than before. The installation process of DB2 for SAP did not change and no special DB2 configuration is needed anymore. The only requirement is a base knowledge with LDAP for setting up the LDAP environment and adding the DB users and groups as described above. All the other underlying communication is fully transparent to the user. 9

5. List of Abbreviations LDAP LDIF DN DBA SID Lightweight Directory Access Protocol LDAP Data Interchange Format Distinguished Name Database Administrator SAP System Identifier 10

6. Table of Figures Figure 1 - DB2 LDIF Tree... 5 Figure 2 - Use existing LDAP user as <sapsid>adm... 8 11

7. List Of Literature [1] Understanding LDAP Design and Implementation, June 2004, http://www.redbooks.ibm.com/abstracts/sg244986.html [2] IBM DB2 authentication with OpenLDAP in system landscapes like SAP https://www.sdn.sap.com/irj/scn/index?rid=/library/uuid/e098bb76-f50a-2c10-bf8e-ae421e82e9f9 12