Ldap Authentication And Authorization - IBM RackSwitch G8000 Application Manual

A top-of-rack (tor) switch
Hide thumbs Also See for RackSwitch G8000:
Table of Contents

Advertisement

LDAP Authentication and Authorization

© Copyright IBM Corp. 2011
2. Configure the TACACS+ secret and second secret.
RS G8000(config)# tacacs-server primary-host 10.10.1.1 key
<1-32 character secret>
RS G8000(config)# tacacs-server secondary-host 10.10.1.2 key
<1-32 character secret>
3. If desired, you may change the default TCP port number used to listen to
TACACS+.
The well-known port for TACACS+ is 49.
RS G8000(config)# tacacs-server port <TCP port number>
4. Configure the number of retry attempts, and the timeout period.
RS G8000(config)# tacacs-server retransmit 3
RS G8000(config)# tacacs-server timeout 5
N/OS supports the LDAP (Lightweight Directory Access Protocol) method to
authenticate and authorize remote administrators to manage the switch. LDAP is
based on a client/server model. The switch acts as a client to the LDAP server. A
remote user (the remote administrator) interacts only with the switch, not the
back-end server and database.
LDAP authentication consists of the following components:
A protocol with a frame format that utilizes TCP over IP
A centralized server that stores all the user authorization information
A client: in this case, the switch
Each entry in the LDAP server is referenced by its Distinguished Name (DN). The
DN consists of the user-account name concatenated with the LDAP domain name.
If the user-account name is John, the following is an example DN:
uid=John,ou=people,dc=domain,dc=com
Configuring the LDAP Server
G8000 user groups and user accounts must reside within the same domain. On the
LDAP server, configure the domain to include G8000 user groups and user
accounts, as follows:
User Accounts:
Use the uid attribute to define each individual user account.
User Groups:
Use the members attribute in the groupOfNames object class to create the user
groups. The first word of the common name for each user group must be equal
to the user group names defined in the G8000, as follows:
– admin
– oper
– user
Chapter 5. Authentication & Authorization Protocols
69

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents