Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Configure LDAP authentication
With the default single sign-on authentication strategy for the Operations Bridge Suite, users are authenticated to all installed capabilities with the same credentials. User names and passwords are stored and verified by a central server so that a user needs only one account to access all capabilities.
A suite-specific Identity Management (IDM) server is used for the authentication. The IDM server is monitored by a single center policy server, and consists of a user repository, a policy store, and a web server agent installed over each of the capability's web servers communicating with the policy server. The IDM server controls users' access to various organizational resources, protecting confidential personal and business information from unauthorized users.
For optimal security, HPE recommends to either configure a TLS connection between the suite and the IDM server, or have the suite server and the IDM servers on the same secure internal network segment. Authentication is performed by the IDM server, and authorization is handled by the capabilities.
Additionally, you can configure LDAP authentication for BVD. Automatic user creation from LDAP servers simplifies the user management process for administrators as authentication is performed through the LDAP server.
You can use an external LDAP server to store user information (user names and passwords) for authentication purposes, instead of using the internal IDM service. You can manually create BVD users and LDAP users, and use LDAP servers to automatically create LDAP users in BVD.
Note LDAP should be configured after the installation of the Operations Bridge Suite.
-
Launch the ITOM Platform from a supported web browser:
https://
<external_access_host>
:5443<external_access_host>
is the fully qualified domain name of the host which you specified asEXTERNAL_ACCESS_HOST
in theinstall.properties
file during the ITOM Platform installation. Usually, this is the master node's FQDN. - Log in as the admin user.
- Go to ADMINISTRATION> LDAP. In the Organization List, click Provider.
- Click ADD CONFIGURATION to enter a valid LDAP configuration. For details on what to enter for each LDAP setting, see LDAP settings.
- Click SAVE.
-
Log on to your capabilities via LDAP:
OMi:
https://<external_access_host>/omi
BVD:
https://<external_access_host>/bvd
<external_access_host>
is the fully qualified domain name of the host which you specified asEXTERNAL_ACCESS_HOST
in theinstall.properties
file during the ITOM Platform installation. Usually, this is the master node's FQDN.
The LDAP settings contain parameters for the LDAP server configuration, LDAP attributes, and user login information.
Setting | Description |
---|---|
LDAP Server Information | |
Name | Name of the LDAP configuration. This name cannot be changed when you reconfigure the settings. |
Hostname |
Fully-qualified domain name or IP address of the LDAP server. Example: |
Port | Port of the LDAP server. LDAP servers typically use port 389 or secure port 636. |
Connection Security |
Select Connection Security: SSL if an LDAPS URL is specified. |
Base DN |
The Distinguished Name (DN) of the LDAP entity from which you want to start your user search. Example: |
User ID (Full DN) |
The Distinguished Name (DN) of a user with search privileges on the LDAP directory server. Example: |
Password | Password of the specified user ID. |
User Authentication | |
User Search Base |
Parameters to indicate which attributes are to be included in the user search. Example: |
User Name |
The name of the field that contains the user name. Example: |
User Search Filter |
LDAP pattern to use when searching for a user account. Example: The user search filter must include the pattern |
Follow Referral |
Select to follow LDAP referrals to another server that offers the requested information. |
Search Subtree |
Select to search the subtree below the base DN (including the base DN level). |
User Attributes | |
Common Name |
Common name to be included in the user search. Example: |
User Email |
Property that contains the user's email address (specific to the selected LDAP vendor, for example MS Active Directory). Example: |
Manager Identifier |
Any attribute (for example DN or CN) of the user who is the user's manager. Example: |
Manager Identifier Value | The value of the identifier. For example, if you specified the DN in the Manager Identifier field, enter dn . |
User Avatar |
Attribute for the user avatar image. You must specify an LDAP record property name that exists on the LDAP server. Example: |
User Group | |
Group Membership |
List of comma-separated LDAP attributes to find groups in a user profile. Example: |
Group Name |
LDAP name used to identify objects of the type group. Example: |
Group Search Filter |
LDAP pattern to use when searching for a group account. Example: |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to ovdoc-asm@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: