-
Determine whether or not you need
to alter the LDAP and global security options:
-
If you are enabling security for
the first time in an environment that is currently open (non-secure),
proceed to step 2.
-
If you are installing the SIMULIA Execution Engine
for the first time, proceed to step 2.
-
If you are updating a previous installation
of the SIMULIA Execution Engine
on an application server instance that already has client authentication
enabled, proceed to Assigning Users to Roles.
All other settings described in Specifying Your LDAP Server Settings and Enabling Global Security in WebSphere should be unchanged and do not need to be altered.
-
Verify that the WebSphere Application
Server is running and that you are logged in to the console.
For more information, see Starting WebSphere and Determining Server Port Numbers.
-
On the left side of the console,
click Security.
-
Click Global security.
The Global security
screen appears.
-
From the Available realm
definitions list, select Standalone LDAP registry.
-
Click Set as current.
-
Click Configure.
-
In the Primary administrative
user name text box, type the user name (for example,
seeadmin ).
-
Verify that Automatically
generated server identity is selected.
-
From the Type of LDAP
server list, select the type of server to be used.
This setting determines the type
of LDAP server to be used (for example, Active Directory).
-
In the Host
text box, type the name of the LDAP server host machine.
The fully qualified host name is not required,
unless the WebSphere host machine needs a fully qualified name to reach
the LDAP server. The short host name is adequate if that's all that is
needed to ping the LDAP server.
-
In the Port
text box, type the port number of the LDAP server host (for example, 389).
-
In the Base distinguished
name (DN) text box, specify the necessary information.
This information represents the starting
point in the LDAP tree from which searches should be made for users.
Contact your local system administrator for the proper settings.
-
In the Bind distinguished
name (DN) text box, specify the necessary information.
This setting identifies a specific user
in the LDAP directory that is to be used by the WebSphere server when
binding with the LDAP server. This setting may be the same user as used
to start the WebSphere server or some other user defined in LDAP. It
does not need to be the same as the Primary administrative
user name. It is specified as a distinguished LDAP name.
Contact your local system administrator for the proper settings.
-
In the Bind password
text box, type the password for the Bind distinguished name
LDAP user specified in the previous step.
The remainder of the settings can use their
default values.
-
Click Apply
to save the LDAP settings.
You may have to scroll down to see this
button.
-
Click Test connection
at the top of the right side of the console.
A message appears if the test was
successful. If WebSphere is unable to validate the LDAP settings, carefully
check the spelling and case of all entries.
-
Click OK.
You are returned to the Global
security screen.
|