Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Integrate NNMi with a Directory Service through LDAP
- NNMi User Access Information and Configuration Options
- Configuring NNMi to Access a Directory Service
- Directory Service Queries
- Directory Service Configuration for Storing NNMi User Groups
- Verify the Directory Service Configuration
- LDAP Configuration File Reference
- Switching to the nms-auth-config.xml File
LDAP Configuration File Reference
nms-auth-config.xml
The nms-auth-config.xml
file contains the settings for communicating with and building LDAP queries to the directory service in the XML format. This section prov ides a reference of only the elements that are relevant for LDAP configuration.
This file is located as follows:
- Windows:
%nnmdatadir%\nmsas\NNM\conf
- Linux:
$NnmDataDir/nmsas/NNM/conf
By default, the nms-auth-config.xml
file available in this location does not contain the XML elements required for LDAP configuration.
You can manually add all the necessary XML elements to this file by following the instructions in this section.
NNMi places a sample nms-auth-config.xml
file in a different location, which can be used for reference.
The sample nms-auth-config.xml
file is available in the following location:
- Windows:
%nnminstalldir%\newconfig\HPOvNnmAS\nmsas\conf
- Linux:
$NnmInstallDir/newconfig/HPOvNnmAS/nmsas/conf
You can also copy the entire <ldapLogin>
element from the sample nms-auth-config.xml
file, and then make necessary modifications.
After editing the nms-auth-config.xml
file (in the <NnmInstallDir>/nmsas/NNM/conf
directory) , force NNMi to read the LDAP configuration again by running the following command:
- Windows:%nnminstalldir%\bin\nnmldap.ovpl -reload
- Linux:$NnmInstallDir/bin/nnmldap.ovpl -reload
<ldapLogin> |
<!-- This is the on/off switch for LDAP authentication. Set to true to use LDAP-based authentication--> <enabled>true</enabled> |
<!-- This element enables you to specify which users can assign incidents.--> <userRoleFilterList>admin guest level2 level1</userRoleFilterList> |
<!-- If <enabled> is set to true, define one or more <configuration> elements to specify LDAP parameters --> <configuration> |
<!-- The filter (optional) is matched against the user, that tries to log on, to determine if this is the right configuration to use. This is useful when multiple configurations are specified, to skip non-applicable LDAP servers to reduce log-on time. --> <filter> <usernamePattern>.*@microfocus\.com</usernamePattern> </filter> |
<!-- Time limit for performing searches against the LDAP server --> <searchTimeLimit>10000</searchTimeLimit> <connectTimeLimit>10000</connectTimeLimit> |
<!-- Define at least one server URL; multiple servers can be specified for High-Availability clusters.--> <server> <hostname>ldaps://ldap.domain1.com</hostname> <secure>true</secure> </server> <server> <hostname>ldaps://ldap.domain2.com</hostname> <secure>true</secure> </server> |
<!---Optional. Bind credential and encrypted password for connecting to LDAP servers that do not support anonymous access. Use "nnmldap.ovpl -encrypt" to create the encrypted password.---> <bindCredential> <bindDN>someUser@some.com</bindDN> <bindCredential>someEncryptedPassword</bindCredential> </bindCredential> |
<!-- This element defines the rules to search for users in this LDAP configuration --> <users> <!-- Optional. Filter that is matched against the user that attempts to log on. The intention is to skip non-applicable LDAP configurations to reduce the log-on time. Note that this is a Java regular expression.--> <filter> <usernamePattern>.*some\.com</usernamePattern> </filter> |
<!-- Optional. The display name expression to show in the NNMi console.--> <displayName>${sn},${givenName} (Microfocus)</displayName> |
<!-- Optional. Default roles that are given to all users that are authenticated against this configuration --> <defaultRoles> <role>guest</role> </defaultRoles> |
<!-- One or more search configuration for locating user accounts. The pattern "{0}" in the string will be replaced with the log-on name entered by the user in the log-on screen. --> <userSearch> <base>uid={0}</base> <baseContextDN>ou=People,o=domain.com</baseContextDN> </userSearch> </users> |
<!-- Defines the rules to search for user roles or groups in this LDAP configuration --> <roles> |
<!-- Optional. Filter that defines which users should be attempted for role lookup against this configuration. Note that this is a Java regular expression. --> <filter><usernamePattern>x</usernamePattern></filter> |
<!-- One or more search configuration for locating LDAP groups that contain the authenticated user DN. Use the string "{1}" where the user's DN would appear. --> <roleSearch> <roleBase>member={1}</roleBase> <roleContextDN>ou=Groups,o=some.com</roleContextDN> </roleSearch> <roleSearch> <roleBase>GroupMember={1}</roleBase> <roleContextDN>CN=Groups,DC=mycompany,DC=com</roleContextDN> </roleSearch> |
</roles> |
</configuration> |
</ldapLogin> |
ldap.properties
Note The ldap.properties
file is now deprecated.
The ldap.properties
file contains the settings for communicating with and building LDAP queries to the directory service. This file is located as follows:
- Windows:
%NNM_SHARED_CONF%\ldap.properties
- Linux:
$NNM_SHARED_CONF/ldap.properties
Note You cannot configure NNMi to work with multiple LDAP servers in different domains if you use the ldap.properties
file.
In the ldap.properties
file, the following conventions apply:
- To comment out a line, begin that line with a number sign character (
#
). -
The following rules apply to special characters:
- To specify a backslash character (\), comma (,), semicolon (;), plus sign (+), less than sign (<), or greater than sign (>), escape the character with a backslash character. For example: \\ or \+
- To include a space character ( ) as the first or last character in a string, escape the space character with a backslash character (\).
- To include a number sign character (#) as the first character in a string, escape the number sign character with a backslash character (\).
Characters not mentioned here do not need to be escaped or quoted.
Note After editing the ldap.properties
file, force NNMi to re-read the LDAP configuration by running the following command:
nnmldap.ovpl -reload
The following table describes the parameters in the ldap.properties
file.
Note The initial ldap.properties
file might not include all parameters that are listed in the following table. Add the parameters you need.
Parameter |
Description |
---|---|
java.naming.provider.url |
Specifies the URL for accessing the directory service. The format is the protocol (ldap), followed by the fully-qualified host name of the directory server, optionally followed by the port number. For example: java.naming.provider.url=ldap://ldap.example.com:389/ If the port number is omitted the following defaults apply:
If you specify multiple directory service URLs, NNMi uses the first directory service when possible. If that directory service is not accessible,NNMi queries the next directory service in the list, and so forth. Separate each URL with a single space character. For example: java.naming.provider.url=ldap://ldap1.example.com/ ldap:// ldap2.example.com/ Configuring this parameter enables LDAP communication between NNMi and the directory service. To disable LDAP communication, comment out this parameter, and then save the file. NNMi ignores the configuration in the |
java.naming.security.protocol |
Specifies the connection protocol specification.
For more information, see Configuring an SSL Connection to the Directory Service. |
bindDN |
For a directory service (such as Active Directory) that does not permit anonymous access, specify the user name for accessing the directory service. For example: bindDN=region1\\john.doe@example.com
|
bindCredential |
When bindCredential=PasswordForJohnDoe |
baseCtxDN |
Specifies the portion of the directory service domain that stores user records. The format is a comma-separated list of directory service attribute names and values. For example:
For more information, see User Identification. |
baseFilter |
Specifies the format of user names for signing in to NNMi. The format is the name of the directory service user name attribute and a string that relates the entered user sign-in name to the format of names in the directory service. The user name string contains the expression
For more information, see User Identification. |
defaultRole |
Optional. Specifies a default role that applies to any directory service user who signs in to NNMi through LDAP. The value of this parameter applies regardless of where user group mappings are stored (in the NNMi database or in the directory service). If a user is directly configured for a predefined NNMi user group, NNMi grants the user the superset of privileges for the default role and the assigned user group. Valid values are as follows: Note that although These names are the unique names of the predefined NNMi user group names. For example: defaultRole=guest If commented out or omitted, NNMi does not use a default role. |
rolesCtxDN |
Specifies the portion of the directory service domain that stores group records. The format is a comma-separated list of directory service attribute names and values. For example:
In other directory services (not Active Directory), for a faster search, you can identify one or more directory service groups that contain NNMi user groups. If the group names form a pattern, you can specify a wildcard. For example, if the directory service includes groups named rolesCtxDN=cn=USERS-NNMi-*,ou=Groups,o=example.com Configuring this parameter enables directory service queries for NNMi user group assignments through LDAP. To disable directory service queries for NNMi user group assignments through LDAP, comment out this parameter, and then save the file. NNMi ignores the remaining user group-related values in the For more information, see User Group Identification. |
roleFilter |
Specifies the format of group member names in the directory service group definitions. The format is the name of the directory service group attribute for user ID and a string that relates the entered user sign-in name to the format of user IDs in the directory service. The user name string contains one of the following expressions and any other characters that are needed to match the directory service formatting of group member names.
For more information, see User Group Identification. |
uidAttributeID |
Specifies the group attribute that stores the directory service user ID. For example: uidAttributeID=member For more information, see User Group Identification. |
userRoleFilterList |
Optional. Limits the NNMi user groups whose associated users can be assigned incidents in the NNMi console. The user groups in this list apply only to directory service user names authenticated through LDAP. This parameter provides functionality that is not available when NNMi user groups are assigned in the NNMi console and stored in the NNMi database. The format is a semicolon-separated list of the unique names for one or more predefined NNMi user group names. userRoleFilterList=admin;globalops;level2;level1 |
searchTimeLimit |
Optional. Specifies the timeout value in milliseconds. The default value is 10000 (10 seconds). If you are encountering timeouts during NNMi user sign in, increase this value. For example: searchTimeLimit=10000 |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to network-management-doc-feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: