13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 12-3 Edit an LDAP ACL windowa. Select the Owners tab, and follow the next steps.b. Select the access-id radio button.c. In the Distinguished Name ( DN ) field enter the DN for wasadmin:cn=wasadmin,o=itso.d. Click Add.e. Click OK.The DMT main panel will now be redisplayed. By assigning the wasadmin IDowner authority, we have provided all access rights to the suffix o=itso in ourdirectory server. If you have multiple suffixes within your directory that contain<strong>WebSphere</strong> users, then you will need to repeat the above steps for each suffixyou have defined in your directory.Configuring <strong>WebSphere</strong> access to <strong>IBM</strong> Directory ServerThe next step is to configure <strong>WebSphere</strong> to use the <strong>IBM</strong> Directory Server as itsuser registry.Follow the steps from Section 10.4.2, “LDAP” on page 245 from Chapter 10,“Administering <strong>WebSphere</strong> security” on page 233. You can use the samesettings that are introduced in that section.As an additional step, the search filter for the LDAP search has to be changedaccording to the Tivoli Access Manager settings.Chapter 12. Tivoli Access Manager 383

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!