Monday, August 3, 2009
Few Useful Tips on Sun LDAP Multi-Master Replication
(1) The typical steps of configuring multi-master (say M1 and M2 fro reference) is to define replication agreement on each of the LDAP which push changes to other. But initially both the LDAPs has to be in sync. While defining the agreement from console, it usually displays a message that "remote replica of the selected agreement has not been initialized from this replica". The same message will be seen on other LDAP's console's agreement definition screen. This gives an impression as if both the LDAP has to be initialized with each other to be in perfect synchronization to start with. But NEVER do initialize both way.
For example, After defining replication agreement on each of the LDAP, only do a full initialization from M1 to M2. Never do the same from M2, even if agreement in M2 console displays the above said message of "remote replica of the selected agreement has not been initialized from this replica".
(2) While doing full initialization from M1 to M2, the schema MAY NOT not get loaded to M2. So copy ".../slapd-M2/config/schema" directory from M1 to M2 followed by restarting M2. Do the initialization after the schema at both M1 and M2 are same.
(3) Index information does not get loaded to when an initialization is done from one master to other. So export the index from source master and import it to other master followed by a re-indexing.
(4) For some reason, if you have to delete the existing agreement and create the same again, make sure you are assigning a new replica-id. This will avoid possible data corruption.
(5) When exporting data from any of the LDAPs participating in multi-master replication, you will see replication info(e.g. obEnabled;vucsn-49de55e5000000010000;deleted: disabled) in exported data. what if you wanted clean data only? There are many ways, here is one of them.
ldapsearch.exe -h yourHost -p yourPort -D myUser -w myPassword -b obname=o=Finance,dc=company,dc=com -s sub (objectclass=Top) > exported.ldif
Monday, July 27, 2009
OAM Server Issue After Pointing to a New Ldap Instance
For CoreId Server :- Check all xml files like AccessDB.xml, AppDB. xml etc in ..\NetPoint\identity\oblix\config\ldap directory.
For Access Server:- Check all lst files like AppDB.lst, ConfigDB.lst etc in ..\NetPoint\access\oblix\config\ldap directory.
Correct the Ldap host and ip address and restart the server. Good luck!
Monday, June 8, 2009
SSO between webgates
Now it is testing time. I authenticated to http://host1/myPage.jsp and typed http://host2/myPage.jsp on the browser's address bar expecting I am authenticated to http://host2 as well. Nope, I saw that login screen again. I banged my head for whole day till I found my mistake next morning.
The solution was very simple. Start typing http://host1.abc.com/myPage.jsp instead of http://host1/myPage.jsp . After authentication to host1 type http://host2.abc.com/myPage.jsp . This will work as I am mentioning domain name in the URL which is set as "Primary Http Cookie Domain".
Since the set up was inside the network, I do not have mention the domain name(...abc.com) to access my web content. IPlanet was serving me the page even if I typed the URI as http://host1/myPage.jsp .
Thursday, April 9, 2009
Helpful Tips for COREid to Ldap Load Balancing Setup
The node 'dbagents' has all the existing DB profile data. If you mess up the DB profile while experimenting LB setup, this backup will always come to your rescue. Other wise the respective OAM server will not start.
Wednesday, April 8, 2009
Reconfiguring your COREid server to a new LDAP
-> Shut down the COREid Server
-> Open setup.xml file in .../install Directory/identity/oblix/config directory.
-> change
{..NameValPair ParamName="status" Value="done"...}
to
{
-> Restart the COREid server.
-> Now access url http://.../identity/oblix and set it up again with new LDAP parameter
Saturday, January 17, 2009
OAM (Oracle Access Manager) and SharePoint Integration using custom HTTPModule
Overview of the Integration
(1) User access the SharePoint URL.
My assumption is reader is familiar with OAM set up and knows how to set up a Webgate for IIS server that hosts SharePoint. LDAP set up. My other blog already detailed out on how to set up SharePoint with LDAP as user base. I will focus more on the point 4 mentioned in the overview section which require writing an HttpModule for SharePoint.
Step c: Change the trust level in webconfig so the HttpModule can be executed
Technorati : SharePoint HttpModule
Del.icio.us : SharePoint HttpModule
Zooomr : SharePoint HttpModule
Flickr : SharePoint HttpModule
Tuesday, November 25, 2008
SharePoint with Sun LDAP as Membership
Why someone will attempt to set up a SharePoint site with a Sun's LDAP as its user database? There could be number of possibilities in the real world requirements. Our recent requirement was to set up a SharePoint server for external users (non - employee) who are not in our Active Directory. All our externals users are already available in Sun LDAP. So we decided to have LDAP as SharePoint user's database. Now, how to make SharePoint happy with Sun LDAP as its user provider. Here are some quick steps from my learning.
Step 1 : Provide the LDAP connection detail in web.config file of IIS server that hosts your SharePoint.
Step 2 : Change SharePoint authentication to Form and provide the LDAPMembership name.
Step 3 : Change the IIS 'Directory Security' authentication set up to Window authentication.
Step 4 : Finally select LDAP user(s) as site owner or other SharePoint defined roles.
Step 1 : Changes in Web.Config file
:
:
<membership defaultProvider="LdapMembership">
<providers>
<add connectionUsername="cn=oblix" connectionPassword="password" name="LdapMembership" type="Microsoft.Office.Server.Security.LDAPMembershipProvider, Microsoft.Office.Server, Version=12.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" server="192.168.1.78" port="389" useSSL="false" userDNAttribute="entryDN" userNameAttribute="uid" userContainer="dc=educ,dc=mde" userObject"Inetorgperson" userFilter="(Object)" scope="Subtree" otherRequiredUserAttributes="sn,givenname,cn" />
</providers>
</membership>
</system.web>
:
:
Make sure of no line breakage for the entire <add …/> entry. Do an iisreset from the command prompt.
Step 2 : Change SharePoint authentication from Windows to Forms.
Now change the authentication from Windows to FORM. Again you are changing this for your SharePoint site that you just provided the LDAP Membership; NOT for SharePoint admin website. Go to Central Administration > Application Management > Authentication Providers > Edit Authentication.
è Change the "Authentication Type" from 'Windows' to 'Forms'.
è Check the "Enable Anonymous Access".
è Enter membership provider name as "LdapMembership". This is the tag we just configured in web.config
è Keep the RoleManager name as blank.
è Select NO for client integration.
Do a iisreset from the command prompt.
Step 3: Some setting in IIS Properties
Select your IIS properties and navigate to 'Directory Security'. Check the option 'Integrated Window Authentication'. LDAP authentication will not work without this change.
Do a iisreset from the command prompt.
Step 4: Select users from LDAP and assign them site ownership and other roles
Now your SharePoint site is connected to LDAP. So the site owner(s) required to be selected from LDAP.
From the Sharepoint Application Administrator screen select the website and Navigate to 'Application Management' > 'Site Collection Administrators' >
The LDAP user list can be pulled up directly. Of course LDAP connection set up is done correctly as mentioned in the previous steps.
If you have already defined roles inside the SharePoint, you can pull users from LDAP and assign them to SharePoint roles.
Step 5: Finally login to your SharePoint site with your LDAP userId and password.
Now login to your website using the ldap userId and password. If the user is already having assigned role in the previous steps, he gets in to SharePoint site based on his role. Otherwise user sees "Authorization Failed" message and asked to request an Role/ access.
Technorati : LDAP, SharePoint
Del.icio.us : LDAP, SharePoint
Zooomr : LDAP, SharePoint
Flickr : LDAP, SharePoint