Pairing agent to the Network Module
Configure the rules to mapped LDAP users to profile:
1.
Enter LDAP group name.
2.
Select the profile to assigned.
You can define up to 5 mapping rules.
All LDAP users belonging to the configured LDAP group will have permissions granted by the associated profile.
If a user belongs to multiple LDAP groups mapped to different profiles, the behavior is undefined.
4.1.1.4 Testing profile mapping
Refer to the section Information>>>CLI>>>ldap-test to get help on the CLI command.
To test LDAP users profile mapping:
1.
Connect to the CLI.
Launch ldap-test --checkmappedgroups command.
2.
3.
This command will verify each mapped group exists in the LDAP base and will display the associated local profile.
In case of error, use the verbose option of the command to investigate the reason.
4.
4.1.1.5 Define LDAP user's preferences
This step configures the user's preferences to apply to all LDAP users.
4.1.2 Testing LDAP authentication
Refer to the section Information>>>CLI>>>ldap-test to get help on the CLI command.
1.
Connect to the CLI.
2.
Launch ldap-test --checkauth command.
3.
This command will verify an LDAP user can authenticate using his username and password and will display its local profile.
In case of error, use the verbose option of the command to investigate the reason
4.
4.1.3 Limitations
•
If the same username exists in both local and LDAP databases, the behavior is undefined.
•
If a user belongs to multiple LDAP groups mapped to different profiles, the behavior is undefined.
•
No client certificate provided. It is not possible for the server to verify the client authenticity.
•
It is not possible to configure LDAP to work with 2 different search bases.
•
LDAP user's preferences are common to all LDAP users.
•
LDAP users cannot change their password through the Network Module.
•
The remote groupname entered in profile mapping settings must be composed only of alphanumerics, underscore and
hyphen characters (but this last one can't be at the beginning).
4.2 Pairing agent to the Network Module
Authentication and encryption of connections between the UPS network module and shutdown agents is based on matching
certificates.
4.2.1 Pairing with credentials on the agent
STEP 1: Action on the agent (IPP/IPM).
1. Connect to the web interface of the agent.
2. Detect the UPS Network Module with an Address(es) scan, select Override global authentication settings and type the UPS
Network Module credentials.
Servicing the Network Management Module – 160
Need help?
Do you have a question about the Network-M2 and is the answer not in the manual?