How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator



Similar documents
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

IIS, FTP Server and Windows

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Setting Up SSL on IIS6 for MEGA Advisor

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

NSi Mobile Installation Guide. Version 6.2

SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE)

How To Take Advantage Of Active Directory Support In Groupwise 2014

Integrating LANGuardian with Active Directory

etoken Enterprise For: SSL SSL with etoken

Configuring Global Protect SSL VPN with a user-defined port

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

Create, Link, or Edit a GPO with Active Directory Users and Computers

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

WHITE PAPER Citrix Secure Gateway Startup Guide

Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe

ADFS Integration Guidelines

Installation Guide. SafeNet Authentication Service

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

Microsoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement

App Orchestration 2.0

PriveonLabs Research. Cisco Security Agent Protection Series:

Outlook Web Access Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

App Orchestration 2.5

Click Studios. Passwordstate. Installation Instructions

Wavecrest Certificate

Configure Single Sign on Between Domino and WPS

NovaBACKUP xsp Version 15.0 Upgrade Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Using Microsoft s CA Server with SonicWALL Devices

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date Version V1.0

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Step-by-step installation guide for monitoring untrusted servers using Operations Manager (Part 1 of 3)

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

ILTA HANDS ON Securing Windows 7

RSA Security Analytics

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

Moving a database from MS Access to MS SQL server. Introduction. Selecting the database. Creating a Data Source

SafeGuard Enterprise Installation Best Practice

Lotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

SafeGuard Enterprise Installation best practice

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Windows XP Exchange Client Installation Instructions

Avatier Identity Management Suite

SchoolBooking SSO Integration Guide

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

HP Device Manager 4.7

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Installing Active Directory

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

Click Studios. Passwordstate. Installation Instructions

F-Secure Messaging Security Gateway. Deployment Guide

Authentication Methods

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Web-Access Security Solution

ECA IIS Instructions. January 2005

Using Internet or Windows Explorer to Upload Your Site

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Windows Intune Walkthrough: Windows Phone 8 Management

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Installing Management Applications on VNX for File

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

BlackBerry Enterprise Service 10. Version: Configuration Guide

Hosted Microsoft Exchange Client Setup & Guide Book

Integrating idrac7 With Microsoft Active Directory

Integrating idrac 7 with Microsoft Active Directory

RoomWizard Synchronization Software Manual Installation Instructions

Active Directory 2008 Implementation. Version 6.410

Active Directory integration with CloudByte ElastiStor

LAB 1: Installing Active Directory Federation Services

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Cyclope Internet Filtering Proxy

Active Directory Integration

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER

Installation and Configuration Guide

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

In the Active Directory Domain Services Window, click Active Directory Domain Services.

Installation Guide for Pulse on Windows Server 2012

APNS Certificate generating and installation

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Skyward LDAP Launch Kit Table of Contents

NTP Software File Auditor for Windows Edition

Training module 2 Installing VMware View

esafe Web SSL - Certificate Rollout

Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

Transcription:

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator I. Certificate Services a. Install a Certificate Authority onto a Windows server in the domain (Control Panel/Add Remove Programs/Windows Components). The CA must be set to process new cert requests automatically. For Enterprise Root CA s, this is the only option. For Stand-alone CA s, it is set in: Admin Tools/Certification Authority/Right click the CA/Properties. Click the Policy Module and the configure button. The Default Action tab will be displayed. Set the Always issue the certificate to on. * HP strongly suggests you use an Enterprise root CA as the process for DC s to request and accept DC certificates from stand alone CA s is not trivial. II. Preparing the Directory Some liberty can be taken with the names used here, but if this is the first time you are doing this, you should follow these steps so that you understand how the process works. Once you have the hang of it, you can alter the names and locations, etc. For a normal customer install, these types of groups already exist. a. Create a Windows group called OA Admins and put a user called Admin in this group. OS level permissions are not important for this user (i.e. he does not need to be a member of Administrators in AD or anything for this to work). b. Create a group called OA Operators and put a user called Operator in this group. Again, OS level permissions are not important for this user (i.e. he does not need to be a member of Administrators in AD or anything for this to work). For the purposes of this paper, we ll call this user operator III. Preparing the OA a. Navigate to the Directory Settings screen located under Users/ Authentications for the desired enclosure.

IV. b. Click to Enable LDAP and enter in the IP address or name of one of your DC s. This DC MUST be accepting LDAP connections over SSL (636 is the default port for LDAP over SSL in MS AD and it could possibly be an alternate port if it was changed). See the Troubleshooting section (below) for more information on verifying that this works. Alternatively, you could enter the domain name of your AD domain (DOMAIN.COM) instead of a server name. Entering a domain name by itself will cause the DNS servers defined for the domain to offer DC s in a round robin fashion offering some sort of load balancing as well as allowing OA to still login in LDAP users if a certain DC is offline. For simplicity during initial setup, HP recommends you use just a single IP address. c. The Search Context is standard LDAP Format. For example, if your user accounts are in the Users OU in a domain called BLADEDEMO.HP.COM, the Search Context would look like this: CN=Users,DC=bladedemo,DC=hp,DC=com d. You may want to also add the ability to use NT style names by checking the box titled Use NT Account name Mapping. e. Click Apply Uploading the DC Certificate

Multiple DC certificates may be uploaded. For now, just upload the one that you know is allowing LDAP over SSL that was used in Step III. a. Click the Upload Certificate Tab as shown below. b. Obtain the certificate from the DC by opening a new web browser window to https://<domain_controller>:636 (substitute <domain_controller> for your DC). Note that this is an HTTPS URL and not an HTTP URL. It should prompt you for accepting a certificate as shown below. Click View Certificate c. Click the Details Tab and click the Copy to File button as shown below.

d. As shown below, select Base-64 encoded x.509 (.CER) from the list of export options (this is important). Provide a name and location for the file (c:\dccert.cer) and finish the wizard. e. Locate the exported certificate file in explorer and rename it to a.txt extension (dccert.txt). Open the file in notepad and copy the entire contents to the clipboard. It will be something similar to this:

-----BEGIN CERTIFICATE----- MIIFxDCCBKygAwIBAgIKJWUSwAAAAAAAAjANBgkqhkiG9w0BAQUFADBVMRMwEQYK CZImiZPyLGQBGRYDY29tMRIwEAYKCZImiZPyLGQBGRYCaHAxFzAVBgoJkiaJk/Is ZAEZFgdhdGxkZW1vMREwDwYDVQQDEwh3aW5kb3pDQTAeFw0wNjA4MjIyMDIzMTFa Fw0wNzA4MjIyMDIzMTFaMCAxHjAcBgNVBAMTFXdpbmRvei5hdGxkZW1vLmhwLmNv btcbnzanbgkqhkig9w0baqefaaobjqawgykcgyeay4zeh3ixyduawkvhidsxlj6b aruvt9zhkl5nqhiderjumsgc/jhserdmhuyoy/qbf7jmhj9lh9qqhug8qfeysc1y qtvgisrzehtvmrmecvsxzm27b4bj5xyn0vycrwqknh7x/tvhmwqgls7/yzyahnu1 lgb2ojocq5ejxx+ybx0caweaaaoca00wggnjmasga1uddwqeawifodbebgkqhkig 9w0BCQ8ENzA1MA4GCCqGSIb3DQMCAgIAgDAOBggqhkiG9w0DBAICAIAwBwYFKw4D output truncated -----END CERTIFICATE----- f. Return to the OA Upload Certificate screen and paste the certificate contents into the window and click Upload. V. Creating Directory Groups The way that users are authenticated and privileges are assigned is by first verifying that the username and password given to OA match the credentials in the Directory. Once verified, OA queries the Directory to find what Active Directory groups the user is a member of. It then matches those Group names against the Directory Group names that exist in OA. We will create these OA Directory Groups in this step. The group name is used to determine LDAP users' group membership and must match one of the following five properties of a directory group: the name, distinguished name, common name, Display Name, or SAM Account Name. a. In OA, navigate to the Users/Authentications/Directory Groups link. b. Click New to add a new directory group. c. First, create a group called OA Admins which matches the name we created in Active Directory. i. Give this group full administrative privileges over all server bays and interconnect bay an click Add as shown below.

d. Create a Second Directory Group called OA Operators to match the operator group we created in Active Directory. This time, give the group Operator privilege level instead of Administrator and do not give the group access to Server Bays but do allow access to Interconnect bays and click Add as shown below:

VI. Testing the Directory Login solution You have now completed everything needed to make the solution work. To test the solution, logoff the current session of OA and close all browser windows. Browse to the OA, and attempt to login using one of these formats: Admin Admin@domain.com DOMAIN\Admin And enter the corresponding password you used for this user account. The login should succeed and you should have full Administrative privileges. If the long does not succeed, see the troubleshooting section later in this paper. Now, logoff or sign out of OA and attempt to login is as Operator using one of the following formats: Operator Operator@Domain.com DOMAIN\Operator And the corresponding password you used for this account. This should succeed and you should have no access to any Server Blades, but full access to Interconnect Bays.

Troubleshooting: If you are having trouble authenticating, the following steps might help: I. Testing SSL A simple test to see that SSL is working on the DC s in your domain is to open a browser and navigating to https://<domain_controller>:636 (substitute your DC for <domain_controller>). You can substitute <domain> in place of <domain controller> which will go to DNS in a round robin fashion to see which DC is currently handling requests for the domain. It might be helpful to test multiple DC s to see that all of them have been issued a certificate. If SSL is operating properly on a DC (i.e. a Certificate has been issued to it), you will be prompted by the Security dialog asking if you want to proceed with accessing the site, or view the server s certificate. Note that clicking Yes will not yield a web page - this is normal. The test is simply to get prompted to accept the Security Dialog. A server not listening on 636 will simply go right to a page cannot be displayed message. If this test fails, it means that your DC is not accepting SSL connections because it probably has not been issued a certificate. This process is supposed to be automatic, but requires a reboot in some cases. To avoid the reboot, you can force this to happen by following these steps: 1. Open the MMC and add the Certificates snap-in. When prompted, choose Computer Account for the type of certificates you want to view. Click OK to return to the Certificates snap in. 2. Navigate to Personal->Certificates folder. Right click the folder and choose Request New Certificate. They type should already be Domain Controller and click Next until it issues the certificate. A second method for testing this is to go to the DC itself and run the following command: C:\netstat -an find /i "636" If the server is listening for requests on port 636, you should see this response: TCP 0.0.0.0:636 0.0.0.0:0 LISTENING A third method of testing SSL is to use the Microsoft tool called LDP. More information on LDP can be found at www.microsoft.com II. Removing old Certificates. In some cases, an old certificate may be present on the DC that points to a previously trusted CA with the same name. This usually doesn t happen unless Certificate Services is added and removed and then added again. To resolve this, use the method in Step 1 above and refer to the HP Customer Advisory EM030604_CW01 listed here:

http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=psd_em 030604_CW01 A third problem could be that the domain controllers have not autoenrolled. The DC s take up to 8 hours to autoenroll and get their certificates issued because MS uses GPO to make the DC s aware of the newly installed CA. You can force this by running DSSTORE pulse from the DC s (tool is in the w2k reskit). It is triggered by winlogon, so for autoenrollment to work, you may need to log off and logon. You are supposed to be able to see the certs show up automatically in the CA s Issues Certs list if this process worked (make sure the CA is not listing them in Pending Certs if it is, you may want to change the CA to auto issue certs when a request comes in). If the autoenrollment feature STILL doesn t work, you may need to request the cert yourself like this: On the DC, open MMC and add in Certificate Snap-in (Computer Account) Navigate to Personal and right click the folder. Click Request New Cert and click next, next, etc. Enter a friendly name for the cert. If you receive and RPC error, check that the CA is listed in DNS (even if you can ping the CA) and that the CA is running. If you receive an error saying that the wizard could not be started try this to force the server to see the CA and allow the wizard to run: To speed up the GPO process and make the DC s acknowledge the CA, do the following: For 2k3 Gpupdate /force For 2k Secedit /refreshpolicy machine_policy /enforce Check that the OA has all of the proper network settings (like DNS) and that the time and date are correct (Certificates are date sensitive). Make sure OA can reach the DNS server (ping it from the OA command line interface).