
Fabric OS Administrator’s Guide
109
53-1002446-01
The authentication model using RADIUS and LDAP
5
d. Add the Brocade profile.
e. In RSA Authentication Manager, edit the user records that will be authenticating using RSA
SecurID.
LDAP configuration and Microsoft Active Directory
LDAP provides user authentication and authorization using the Microsoft Active Directory service in
conjunction with LDAP on the switch. There are two modes of operation in LDAP authentication,
FIPS mode and non-FIPS mode. This section discusses LDAP authentication in non-FIPS mode. For
more information on LDAP in FIPS mode, refer to
Chapter 7, “Configuring Security Policies”
. The
following are restrictions when using LDAP in non-FIPS mode:
•
There is no password change through Active Directory.
•
There is no automatic migration of newly created users from the local switch database to
Active Directory. This is a manual process explained later.
•
Only IPv4 is supported for LDAP on Windows 2000 and LDAP on Windows Server 2003. For
LDAP on Windows Server 2008, both IPv4 and IPv6 are supported.
•
LDAP authentication is used on the local switch only and not for the entire fabric.
•
You can use the User-Principal-Name and not the Common-Name for AD LDAP authentication.
To provide backward compatibility, authentication based on the Common Name is still
supported for Active Directory LDAP 2000 and 2003. Common Name based-authentication is
not recommended for new installations.
•
A user can belong to multiple groups as long as one of the groups is the primary group. The
primary group in the AD server should not be set to the group corresponding to the switch role.
You can choose any other group.
•
A user can be part of any Organizational Unit (OU).
•
Active Directory LDAP 2000, 2003, and 2008 is supported.
Roles for Brocade-specific users can be added through the Microsoft Management Console.
Groups created in Active Directory must correspond directly to the RBAC user roles on the switch.
Role assignments can be achieved by including the user in the respective group. A user can be
assigned to multiple groups like Switch Admin and Security Admin. For LDAP servers, you can use
the ldapCfg
-–
maprole
ldap_role_name switch_role
command to map an LDAP server permissions
to one of the default roles available on a switch. For more information on RBAC roles, see
“Role-Based Access Control”
on page 82.
NOTE
All instructions involving Microsoft Active Directory can be obtained from www.microsoft.com or your
Microsoft documentation. Confer with your system or network administrator prior to configuration
for any special needs your network environment may have.
Following is the overview of the process used to set up LDAP:
1. If your Windows Active Directory server for LDAP needs to be verified by the LDAP client (that is,
the Brocade switch), then you must install a Certificate Authority (CA) certificate on the
Windows Active Directory server for LDAP.
Follow Microsoft instructions for generating and installing CA certificates on a Windows server.
2. Create a user in Microsoft Active Directory server.
Содержание Fabric OS v7.0.1
Страница 1: ...53 1002446 01 15 December 2011 Fabric OS Administrator s Guide Supporting Fabric OS v7 0 1 ...
Страница 22: ...xxii Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 26: ...xxvi Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 30: ...xxx Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 38: ...xl Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 40: ...2 Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 100: ...62 Fabric OS Administrator s Guide 53 1002446 01 Configuring FLOGI time handling of duplicate PWWN 3 ...
Страница 152: ...114 Fabric OS Administrator s Guide 53 1002446 01 The authentication model using RADIUS and LDAP 5 ...
Страница 214: ...176 Fabric OS Administrator s Guide 53 1002446 01 Management interface security 7 ...
Страница 228: ...190 Fabric OS Administrator s Guide 53 1002446 01 Brocade configuration form 8 ...
Страница 248: ...210 Fabric OS Administrator s Guide 53 1002446 01 Validating a firmware download 9 ...
Страница 334: ...296 Fabric OS Administrator s Guide 53 1002446 01 Setting up TI over FCR sample procedure 12 ...
Страница 360: ...322 Fabric OS Administrator s Guide 53 1002446 01 Encryption and compression example 14 ...
Страница 374: ...336 Fabric OS Administrator s Guide 53 1002446 01 Access Gateway N_Port failover with FA PWWN 16 ...
Страница 404: ...366 Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 430: ...392 Fabric OS Administrator s Guide 53 1002446 01 Ports on Demand 18 ...
Страница 470: ...432 Fabric OS Administrator s Guide 53 1002446 01 Disabling QoS zone based traffic prioritization 21 ...
Страница 502: ...464 Fabric OS Administrator s Guide 53 1002446 01 Buffer credit recovery 23 ...
Страница 544: ...506 Fabric OS Administrator s Guide 53 1002446 01 Displaying the range of output ports connected to xlate domains 24 ...
Страница 554: ...516 Fabric OS Administrator s Guide 53 1002446 01 Fabric configurations for interconnectivity A ...
Страница 572: ...534 Fabric OS Administrator s Guide 53 1002446 01 Hexadecimal overview D ...
Страница 584: ...546 Fabric OS Administrator s Guide 53 1002446 01 ...