03-D65 Users and Groups
03-D65 Users and Groups
To modify a user:
1. In the navigation tree,
expand Administration
User Management.
2. Click Users.
3. Search for the user to
modify (or select Show All
Users.)
4. Right-click the user to
modify and select
Properties.
5. Revise the user information
as needed.
6. Click OK.
Full
Fullset
setof
ofnodes
nodesunder
under
Administration
Administration
• In Content Server 6.5 and later, by default, system
administrators see an unexpandable Administration node in DA
In order for system administrators to see any nodes
underneath Administration, it is necessary
• To add them to an administrator access set OR
• Disable administrator access sets
Superusers always see all nodes underneath
Administration
No
Nonodes
nodesunder
under
Users and Groups Administration
Administration 3-11
© 2009 EMC Corporation. All rights reserved.
Example
• Create a role called security admins and populate it with users whose client
capability is system administrator
• Create an administrator access set called manage security
Configure this administrator access set to have access to only the Formats, Alias
Sets, Types and Security nodes in DA
Assign the security admins role to it
• When users of the role security admins log into the repository using DA,
under the Administration node, they only see the Formats, Alias Sets, Types
and Security nodes
Enter
EnteraaName
Name
Select
Selectthe
theNodes
Nodesthat that
roles assigned to the
roles assigned to the
set
setwill
willbe
beable
abletoto
access
access
Click
Clickhere
heretotoselect
selectthe
the
roles
roles that will be includedinin
that will be included
this
thisset
set
Content
Server
user_name dm_check_password.exe
*******
Content Server versions >= 5.3: the user’s name in the underlying
operating system is stored in the user’s user_login_name attribute
Content Server versions < 5.3: the user’s name in the underlying
operating system is stored in the user’s user_os_name attribute
• Users are not required to enter a domain name when they connect to
the repository
• If the user’s user_os_domain attribute is blank
The Content Server authenticates the user using the user’s login (in the
operating system) and the domain specified in the connection request
If no domain is included in the connection request, the Content Server uses the
domain defined in the user_auth_target key in the server.ini file
• If the user’s user_os_domain attribute contains a domain name
Content Server authenticates against the domain identified in the
user_os_domain attribute
• This is the default operating mode
Users and Groups 3-19
© 2009 EMC Corporation. All rights reserved.
Authentication: Domain Required
Content
LDAP Directory Server
Server
Users, groups,
attributes
• After configuring the initial LDAP configuration object and enabling it, notice that the
server config object (dm_server_config) already includes a reference to it (pictured,
below)
• When additional LDAP configuration objects are created and enabled, they are
automatically associated with the dm_server_config object (pictured, below)
Important! Before the directory object can be used, it is necessary to click the Re-Initialize
checkbox at the bottom of the server config object properties page
• By default, the dm_LDAPSynchronization job uses all LDAP configuration objects that
have been added to the server config object
The
ThePort
Portisisthe theport
portnumber
number
on which the LDAP directory
on which the LDAP directory
server
serverisislistening
listening
The
TheBinding
BindingName
Nameisisthe
the
account
accountthat
thatthe
theContent
Content
Server
Server uses to connecttotothe
uses to connect the
LDAP directory server
LDAP directory server
InInthe
theSync
SyncType
Typefield,
field,indicate
indicate
whether
whether to do incrementalor
to do incremental orfull
full
synchronizations
synchronizations
Configure
Configurehow
howtoto
handle
handleLDAP
LDAPusers
users
that
that are deletedor
are deleted InInthe
or theUser
UserType
Typefield,
field,indicate
indicate
updated
updated that LDAP users are to be
that LDAP users are to be
imported
importedas
asdm_user
dm_userobjects
objectsoror
aacustom
customuser
usertype
type
InInthe
theBind
Bindto
toUser
UserDN
DNfield,
field,indicate
indicateone
oneofof
the
thefollowing:
following:
•• The
Theuser’s
user’slogin
loginname
nameininthe
therepository
repositoryisisused
usedtoto
search
searchfor
forthe
theuser’s
user’sentry
entryininthe
thedirectory
directoryserver
server
•• The
TheDNDN(distinguished
(distinguishedname)
name)stored
storedininthe
the
repository
repository in the user_ldap_dn propertyisisused
in the user_ldap_dn property used
totoaccess the user’s entry in the directory server
access the user’s entry in the directory server
IfIfan
anexternal
externalpassword
passwordprogram
program
isisbeing
being used, check theExternal
used, check the External
Password Check box.
Password Check box.
Users and Groups 3-30
© 2009 EMC Corporation. All rights reserved.
Creating an LDAP Configuration Object
Mapping Tab (1 of 3)
These
Thesesettings
settingsdetermine
determine
how
howmuch
muchofofthe
theLDAP
LDAPtree
tree
totoimport
import
Example:
Example: all
allusers
usersunder
under
ou=People,dc=emc,dc=com
ou=People,dc=emc,dc=com
are
areimported
importedbut
butnot
notusers
users
under ou=Others,dc=emc,
under ou=Others,dc=emc,
dc=com;
dc=com;oror
ou=Droids,dc=emc,dc=com
ou=Droids,dc=emc,dc=com
The
Thevalues
valuesininthis
thischoice
choicebox
boxare
are
populated based on the
populated based on the UserUser
Object
ObjectClass;
Class;select
selectone
onetotoadd
addtoto
the
thefilter
filter
Select
Selectan
ancomparison
comparisonoperator
operator
and enter a value
and enter a value
Click
ClickAdd
AddCriteria
Criteriatotoadd
add
additional
additional criteria to thefilter
criteria to the filter
These
Theseare
arethe
thedefault
defaultrepository
repository
property to LDAP attribute
property to LDAP attribute
mappings;
mappings;use,
use,change,
change,or or
delete as needed.
delete as needed.
In this example:
• If roomNumber is J22 and
telephoneNumber is 867-5309,
then the expression yields Room
J22, Telephone 867-5309
• If telephoneNumber is 867
(less than 8 characters), then the
value of the expression depends
upon the Reject User/Group
setting; see next slide
Click
ClickTest
TestExpression
Expressiontoto
validate
validatethe
theexpression
expression This
Thisvalues
valuesininthis
thisbox
boxare
arepopulated
populated
based
based on the value of user orgroup
on the value of user or groupobject
object
class specified on the Mapping tab
class specified on the Mapping tab
Configure
Configurewhen
whenand
andhow
howoften
often
totoattempt to reconnect to the
attempt to reconnect to the
primary
primarydirectory
directoryserver.
server.
Click
ClickAdd
Addtotoaddaddaafailover
failoverLDAP
LDAP
directory server and configure
directory server and configure
the
theentries
entriesininthe
theorder
orderininwhich
which
they
theyshould
shouldbe beselected.
selected.
• After adding one or more failover directory server, note that the
Move Up, Move Down, and Delete buttons appear
• Use these buttons to arrange the directory servers in the order they
are to be tried in case the primary directory server fails (or to delete
entries)
Select
Selectaafailover
failoverserver
server
and
and use the buttonstoto
use the buttons
delete
deleteititor
ormove
moveititupuporor
down in the priority list
down in the priority list
IfIfdesired,
desired,set
setthe
theTrace
TraceLevel
Level
toto10 (verbose logging)
10 (verbose logging)
Make
Makethe
thejob
jobActive
Active
IfIfdesired,
desired,check
checkRunRunAfter
AfterUpdate
Updatetoto
immediately
immediatelystartstartthe
thesynchronization
synchronization
job
job after clicking the OKbutton.
after clicking the OK button.
• Goals
Create and manage user accounts
Create and use an administrator access set
• Tasks
Create new users
Reassign a user
Observe the effect of reassigning users
Create new operating system accounts for the users and then try to log
into the repository
Create new role called security admins and assign users klinger and
winchester to it
Create a new administrator access set called manage security and assign
the role security admins to it
Test the manage security administrator access set to see if it works