Configuring LDAP Authentication
The identity provider (IDP) user and password has governance over the platform; therefore, the user must exist in both systems, but the password is validated only in LDAP. This section details LDAP authentication steps when TLS is enabled and disabled.
To use LDAP authentication when TLS is disabled:
- Create at least one LDAP user to log in into the platform using LDAP authentication.
- Log in to the CDF server and navigate to the SSO default configuration folder at:
<arcsight_nfs_vol_path>/sso/default
where <arcsight_nfs_vol_path> is the NFS volume used for CDF installation; for example: /opt/NFS_volume/arcsight-volume.
- Open the SSO configuration file (sso-configuration.properties), and review the LDAP parameters.
- Update the SSO configuration file (sso-configuration.properties) for your LDAP log in method by uncommenting (removing the #) of these lines in the sso-configuration.properties file, and completing the information for your LDAP environment.
- For Active Directory rather than eDirectory:
- Update the SSO configuration file (sso-configuration.properties) to enable AD by uncommenting these lines in the sso-configuration.properties file, and completing the information for your LDAP environment.
com.microfocus.sso.default.ldap.dir-type = AD com.microfocus.sso.default.as.naming-attr = provide your AD attribute here com.microfocus.sso.default.as.users-container-dn = provide your LDAP Base DN here- Save the SSO configuration file (sso-configuration.properties).
##### The following LDAP confgs are not utilized at this time
# com.microfocus.sso.default.ldap.enabled = true
# com.microfocus.sso.default.login.method = np-ldap
# com.microfocus.sso.default.ldap.admin-dn = CN=bind_user,cn=Users,dc=ospad,dc=test
# com.microfocus.sso.default.ldap.admin-pwd = password
# com.microfocus.sso.default.ldap.host = xxx.xx.xx.xx
# com.microfocus.sso.default.ldap.use-tls = false
# com.microfocus.sso.default.ldap.port = 389
#---- uncomment these if the LDAP server is Active Directory rather than eDirectory
# com.microfocus.sso.default.ldap.dir-type = AD
# com.microfocus.sso.default.as.naming-attr = sAMAccountName
# com.microfocus.sso.default.as.users-container-dn = cn=Users,dc=ospad,dc=test
## uncomment these to configure URL when LDAP user forgets password
# com.microfocus.sso.default.ldap.forgotten-pwd-url =
# com.microfocus.sso.default.ldap.login.forgotten-password-target = _blank
# com.microfocus.sso.default.ldap.login.forgotten-password-text-res-id =
# com.microfocus.sso.default.ldap.login.forgotten-password-title-res-id =
com.microfocus.sso.default.ldap.enabled = true
com.microfocus.sso.default.login.method = np-ldap
com.microfocus.sso.default.ldap.admin-dn = provide your LDAP User DN here
com.microfocus.sso.default.ldap.admin-pwd = provide your LDAP Admin password here
com.microfocus.sso.default.ldap.host = provide your LDAP host here
com.microfocus.sso.default.ldap.use-tls = true (this corresponds to your LDAP TLS setting, true or false. However, a "false" value will fail to enable a TLS LDAP connection)
com.microfocus.sso.default.ldap.port = 636 (your LDAPS Environment port may differ - change accordingly)
com.microfocus.sso.default.as.naming-attr to 'mail'. Otherwise, to require users to login with their Active Directory username, set com.microfocus.sso.default.as.naming-attr to 'sAMAccountName'.- For URL configuration when an LDAP user forgets the password:
- Update the SSO configuration file (sso-configuration.properties) to enable forgot password for the LDAP user by uncommenting these lines in the sso-configuration.properties file, and completing the information for your LDAP environment.
- Save the SSO configuration file (sso-configuration.properties).
com.microfocus.sso.default.ldap.forgotten-pwd-url = provide your LDAP url for forgotten password here com.microfocus.sso.default.ldap.login.forgotten-password-target = provide the target here com.microfocus.sso.default.ldap.login.forgotten-password-text-res-id = provide the text to be shown here com.microfocus.sso.default.ldap.login.forgotten-password-title-res-id = provide the title to be shown here - Restart the fusion-single-sign-on pod.
- Get the fusion-single-sign-on pod information:
- Restart the fusion-single-sign-on by deleting the currently running pod:
kubectl get pods --all-namespaces | grep single-signkubectl delete pod fusion-single-sign-on-xxxxxxxxxx-xxxxx -n arcsight-installer-xxxxx - Log in using your LDAP credentials.
To use LDAP authentication when TLS is Enabled:
- Create at least one LDAP user to log in into the platform using LDAP authentication.
- Log in to the CDF server and navigate to the SSO default configuration folder at:
- Open the SSO configuration file (sso-configuration.properties), and review the LDAP parameters.
- Update the SSO configuration file (sso-configuration.properties) for your LDAP log in method by uncommenting (remove the #) these lines in the sso-configuration.properties file, and completing the information for your LDAP environment.
-
Create and copy the PEM formatted CA LDAP server certificate into the Fusion single-sign-on pod:
kubectl cp /opt/ldapCA.cer arcsight-installer-xxxx/fusion-single-sign-on-xxxxxxx-xxxx:/tmp -c fusion-single-sign-on
<arcsight_nfs_vol_path>/sso/default
where <arcsight_nfs_vol_path> is the NFS volume used for CDF installation; for example: /opt/NFS_volume/arcsight-volume.
##### The following LDAP confgs are not utilized at this time
# com.microfocus.sso.default.ldap.enabled = true
# com.microfocus.sso.default.login.method = np-ldap
# com.microfocus.sso.default.ldap.admin-dn = CN=bind_user,cn=Users,dc=ospad,dc=test
# com.microfocus.sso.default.ldap.admin-pwd = password
# com.microfocus.sso.default.ldap.host = xxx.xx.xx.xx
# com.microfocus.sso.default.ldap.use-tls = true
# com.microfocus.sso.default.ldap.port = 636
#---- uncomment these if the LDAP server is Active Directory rather than eDirectory
# com.microfocus.sso.default.ldap.dir-type = AD
# com.microfocus.sso.default.as.naming-attr = mail
# com.microfocus.sso.default.as.users-container-dn = cn=Users,dc=ospad,dc=test
## uncomment these to configure URL when LDAP user forgets password
com.microfocus.sso.default.ldap.enabled = true
com.microfocus.sso.default.login.method = np-ldap
com.microfocus.sso.default.ldap.admin-dn = provide your LDAP User DN here
com.microfocus.sso.default.ldap.admin-pwd = provide your LDAP Admin password here
com.microfocus.sso.default.ldap.host = provide your LDAP host here
com.microfocus.sso.default.ldap.use-tls = true provide your LDAP TLS setting here (true/false)
com.microfocus.sso.default.ldap.port = 636 provide your LDAP port here
-
Log in to the into the Fusion-single-sign-on pod:
kubectl exec -it fusion-single-sign-on-xxxxxxx-xxxx -n arcsight-installer-xxxx -c fusion-single-sign-on -- sh
-
Navigate to the Fusion truststore directory:
cd /usr/local/tomcat/conf/default/
-
Install the PEM formatted CA LDAP server certificate into the Fusion single-sign-on truststore:
keytool -importcert -storepass $KEYSTORE_PASSWORD -destkeystore sso.bcfks -alias ldapCA -file /tmp/okta.cert -storetype BCFKS -providerclass org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -providerpath /usr/local/openjdk-8/jre/lib/ext/bc-fips-1.0.2.1.jar
-
Verify the list of certificates in the fusion-single-sign-on trustore:
keytool -list -v -alias ldapCA -keystore sso.bcfks -storepass $KEYSTORE_PASSWORD
-
Close the Terminal session to the pod:
exit
-
Restart the Fusion single-sign-on pod:
kubectl delete pod -n arcsight-installer-xxxx fusion-single-sign-on-xxxxxxx-xxxx