Creating an LDAPBind Login Scheme (Multiple Domains)
Use this procedure if your system has multiple Windows domains and your users are set up on one or another of those domains. This setup is a variation on setting up and LDAPBind login scheme for multiple containers.
- Set up the LDAP tree to group your domains. The LDAP tree must have a structure similar to the following. That is, all domains (and their users) are underneath an "ou=domains" node.
- In the Infor Rich Client, access the Security System Management application and then Login Scheme. On the Login Scheme List, select Actions > Create LDAP Bind Login Scheme and then edit the fields described below.
- or -
At a Landmark command prompt, type
secadm loginscheme add SSOPV2_LDAP_BIND --schemetype WebUPLogin --loginprocedure LDAPBind --provider ldap_provider --rdn ldap_rdn --namingattr ldap_namingattr --multiplecontainers yes --searchfilter ldapSearchFilter --searchstructclass ldapSearchStruct --searchbinddn ldapSearchBinddn --searchbindpassword ldapSearchBindPassword --referral ldapReferralHandling --derefalias ldapDerefAliaswhere
Option LRC Field Names Description login-scheme-nameLogin Scheme Specify the login scheme name. --description descriptionDescription Optional. Add a description of the login scheme name. --schemetype scheme-typeScheme Type Specify WebUPLogin. --loginprocedure login-procedureLogin Procedure Specify LDAPBIND in order to authenticate web access based on LDAP entries stored in a customer-specified location instead of in the Lawson default location. --provider ldap_providerProvider The LDAP server host name and LDAP port formatted as a URL. For example,
ldap://hostname:portnumber--rdn ldap_rdnRDN The Relative Distinguished Name (rdn) container for all users in the LDAP directory.
For the multiple domain scenario, this is the following:
ou=%DOMAIN%,ou=domains,o=rootnodewhere rootnode is the top node of your LDAP.
For example,
ou=%DOMAIN%,ou=domains,o=lawson--namingattr ldap_namingattrNaming Attr The naming attribute for users in the LDAP user container, for instance, cnoruid.--multiplecontainersMultiple Container Whether the users are in a single container or multiple containers. To set up a login scheme for multiple domains, use yes.--searchfilterSearch Filter The filter used to search the LDAP structure, for example, (&(<NAMING_ATTR>=<NAMING_ATTR_VALUE>)(objectclass=<STRUCTURAL_OBJCLASS_VALUE>))--searchstructclassSearch Struct Class The LDAP structure to search for to locate users. This can be anything that objectclass can be in an LDAP entry. --searchbinddnSearch Priv Identity The distinguished name of a user with search privileges on the LDAP tree. --searchbindpasswordSearch Priv Password The password of the user with search privileges on the LDAP tree. --referralReferral Property How the search should handle referrals. Valid values are ignore,follow, andthrow. The latter throws a ReferralException for each referral. Also, if the LDAP service provider receives a referral despite--referralbeing set to "ignore", it will throw a PartialResultException to indicate that more results might be forthcoming if the referral is followed.--derefaliasDeref Alias Property How the search should handle aliases. Valid values are:
-
always, which means always dereference aliases. -
never, which means never dereference aliases -
finding, which means dereference aliases only during name resolution. -
searching, which means dereference aliases only after name resolution.
-
- Assign the login scheme to the primary SSO service. At a Landmark command prompt, type
secadm service update SSOPV2 --loginscheme SSOPV2_LDAP_BIND