IBM® Connections requires
a federated repositories configuration, but you can enable IBM Connections applications to
perform Single sign-on for a standalone LDAP directory.
Before you begin
This procedure is required if you want to enable Single
sign-on (SSO) between IBM Connections
and an application hosted by a version of WebSphere® Application Server that is earlier
than 6.1, which is the version in which federated repositories were
introduced.
Before you perform this procedure, you must configure
federated repositories on IBM Connections.
About this task
By default, applications deployed on servers within the
same WebSphere Application
Server cell are enabled for single-sign-on. To support this, the servers
share the same set of LTPA keys and the same LDAP directory configuration.
Use this configuration if you want to set up SSO between applications
that use different LDAP directory configurations.
To enable SSO
between IBM Connections and
a WebSphere Application
Server configured for standalone LDAP, complete the following steps:
Procedure
- Log in to the WebSphere Application
Server Integrated Solutions Console by going to the following web
address in a browser:
http://<web.server.host.name>:9060/ibm/console
- Log in to the Welcome page.
- Click .
- Select Federated Repositories from
the Available realm definitions field, and then click Configure.
- On the Federated repositories page, add the
<host_name>:<port>
of
the standalone LDAP server to the Realm name field.
For example:
ldap.example.com:389
- Click Apply and then click Save to
save this setting.
- After changing the realm name, you must update the administrative
user roles because the previous realm name is still appended to the
administrative users. Until you remove and re-add the administrative
users, the users are unable to access the Integrated Solutions Console.
- Navigate to .
- Select all user roles and click Remove.
- Click Add.
- In the Roles field, click Administrator.
- In the User field, enter the
user name to which you want to grant administrative privileges.
- In the Search string field, enter
a user name that you want to set as an administrator and then click Search.
Select the user name in the Available list
and click to move it to the Mapped to role field.
- To map other users, repeat the previous step.
- Click OK and then click Save.
Note: If there is only one user, you might not be allowed to
remove the user. In that case, add the new user first and then remove
the original user.
- Synchronize the nodes and then restart the servers:
- Log into the Integrated Solutions Console for the Deployment
Manager.
- Expand . Select the name of the
node that you updated and click Full Resynchronize.
- Select . Select the check box
for the cluster you want to restart and click Stop.
- Select . Select the check
boxes for the nodes that you want to restart and click Restart.
- Stop and restart the Deployment Manager.
- Log into the Integrated Solutions Console again.
- Select . Select the check box
the cluster you want to restart and click Start.