Enabling LDAP Support in JD Edwards EnterpriseOne

This chapter provides an overview of Lightweight Data Access Protocol (LDAP) support in JD Edwards EnterpriseOne and discusses how to:

Important! This chapter does not provide instructions for installing and configuring an LDAP-compliant directory service, such as Microsoft Windows Active Directory or IBM Directory Server. For more information, refer to the Prerequisites section in this chapter.

Click to jump to parent topicUnderstanding LDAP Support in JD Edwards EnterpriseOne

This section discusses:

Click to jump to top of pageClick to jump to parent topicLDAP Support Overview

LDAP is an open industry standard protocol that directory services use to manage user profiles, such as user IDs and passwords, across multiple application systems. You can enable JD Edwards EnterpriseOne to use an LDAP-compliant directory service to manage JD Edwards EnterpriseOne user profiles and user-role relationships. After enabling JD Edwards EnterpriseOne for LDAP, user profiles can be administered through an LDAP version 3 compliant directory server, otherwise referred to as the LDAP server. System administrators use a third-party LDAP-enabled application to access the LDAP server.

LDAP provides these benefits:

Note. LDAP support does not address single sign-on functionality that might exist through other JD Edwards EnterpriseOne functionality.

Click to jump to top of pageClick to jump to parent topicUser Profile Management in LDAP-Enabled JD Edwards EnterpriseOne

When JD Edwards EnterpriseOne is enabled for LDAP, the features used to manage user profiles in the User Profile Revisions application (P0092) are disabled. Instead, you must use a third-party, LDAP-enabled application to manage JD Edwards EnterpriseOne user profiles.

Note. JD Edwards EnterpriseOne does not provide an application for managing LDAP user profiles.

Additionally, JD Edwards EnterpriseOne provides a self-service version of P0092. This self-service application is used to manage only self-service user profile information for the Manufacturing Sourcing module; not JD Edwards EnterpriseOne user profiles. However, if you are enabling JD Edwards EnterpriseOne for LDAP and your company is using this self-service application, you can add parameters for it when you define the LDAP server settings. In this configuration, any self-service user profiles that are added are synchronized with the LDAP server.

Note. Even though self-service user profiles are synchronized with the LDAP server, you cannot use this self-service application to manage JD Edwards EnterpriseOne or LDAP user profiles.

See Configuring the LDAP Server Settings.

Click to jump to top of pageClick to jump to parent topicLDAP and JD Edwards EnterpriseOne Relationships

The LDAP system administrator must understand the logical and database-dependent relationships between the LDAP server and JD Edwards EnterpriseOne. The administrator directly or indirectly controls the logical flow of events and where specific data resides based on the setting of system variables in the JD Edwards EnterpriseOne enterprise server jde.ini file and settings specified in the LDAP Server Configuration Workbench program (P95928).

The security kernel on the JD Edwards EnterpriseOne enterprise server is responsible for ensuring the integrity of the security within JD Edwards EnterpriseOne. If this kernel is not running correctly or cannot locate requisite data, users cannot sign in to JD Edwards EnterpriseOne. However, when the security kernel is properly configured, the system verifies the user credentials from data within the user profiles. In this case, the following two scenarios are possible:

LDAP does not support certain user profile information. Such information remains in the domain of the JD Edwards EnterpriseOne server and must be maintained by the JD Edwards EnterpriseOne system administrator. Therefore, two distinct and separate user profiles may exist:

User Authentication Using the LDAP Server

When LDAP is enabled, all systems (including JD Edwards EnterpriseOne) are directed to perform user authentication through the LDAP server.

This diagram shows how LDAP and JD Edwards EnterpriseOne handle authentication:

LDAP and JD Edwards EnterpriseOne authentication

In this illustration, the security kernel in the JD Edwards EnterpriseOne enterprise server performs authentication against the LDAP server when LDAP is enabled in the [SECURITY] section of the jde.ini file of the JD Edwards EnterpriseOne enterprise server. Otherwise, when LDAP is disabled, the security kernel authenticates the user against the JD Edwards EnterpriseOne enterprise server database.

JD Edwards EnterpriseOne User Data

The security kernel in JD Edwards EnterpriseOne requires specific attributes to be defined for all users. These attributes generally include:

 

User Data Managed by LDAP

When you configure JD Edwards EnterpriseOne to use LDAP, the JD Edwards EnterpriseOne security kernel uses the following data stored in the LDAP server:

Data Managed by LDAP and JD Edwards EnterpriseOne

This table explains how user data is managed by LDAP and JD Edwards EnterpriseOne, as well as how the security kernel uses this information:

Data Category

LDAP

JD Edwards EnterpriseOne

Comment

EnterpriseOne User ID

Yes

Yes

F0092

If you enable LDAP support in JD Edwards EnterpriseOne, the security kernel validates the user from the LDAP database. The security kernel synchronizes this data from LDAP to JD Edwards EnterpriseOne only when this data is in the LDAP server and not in JD Edwards EnterpriseOne.

EnterpriseOne User Password

Yes

Yes

F98OWSEC

If LDAP is enabled, the user password is always stored in LDAP.

If LDAP is not enabled, the user password is stored in the F98OWSEC table in JD Edwards EnterpriseOne.

User-Role Relationship

Yes

Yes

F95921

If the user-role relationship is defined to execute through LDAP, the user-role relationship is synchronized from the LDAP server to JD Edwards EnterpriseOne.

If the user-role relationship is defined to execute through JD Edwards EnterpriseOne, the data is stored in the JD Edwards EnterpriseOne database in the F95921 table.

EnterpriseOne System User

No

Yes

F98OWSEC

Not managed in the LDAP server.

JD Edwards EnterpriseOne requires each user to have a system user specified for access to the JD Edwards EnterpriseOne database. The database user is set by the JD Edwards EnterpriseOne system administrator in the JD Edwards EnterpriseOne security table, F98OWSEC.

If there are no valid system user settings, the JD Edwards EnterpriseOne security kernel will not validate the user.

Definition of Role

Yes

Yes

F0092

The user-role relationship is synchronized from the LDAP server to the JD Edwards EnterpriseOne database for roles defined in the JD Edwards EnterpriseOne database. However, the system does not synchronize role definitions from the LDAP server to the JD Edwards EnterpriseOne database. Therefore, role definitions must exist in both systems.

EnterpriseOne User Profile Attributes

No

Yes

F00921 and F0092

Not managed in LDAP.

JD Edwards EnterpriseOne requires additional user profile attributes that are not generally defined through equivalent attributes in LDAP. Therefore, you can manually set these attributes. You can also specify these values in the default user profile settings for LDAP so that these settings are included for each user that is synchronized from LDAP to JD Edwards EnterpriseOne.

See Modifying the LDAP Default User Profile Settings.

Some of these attributes include:

  • Address Book Number

  • Decimal Separator

  • Time Zone

  • Currency

  • Date Format

 

User Data Synchronization in LDAP-Enabled JD Edwards EnterpriseOne

This diagram shows the synchronization of user data from the LDAP server to JD Edwards EnterpriseOne:

User data synchronization

In this configuration, a third-party LDAP-enabled application is being used to add, modify, and delete LDAP user information. In addition, the system uses the following methods to synchronize user data from LDAP to the JD Edwards EnterpriseOne database:

Click to jump to top of pageClick to jump to parent topicApplication Changes in LDAP-Enabled JD Edwards EnterpriseOne

When LDAP support is enabled in JD Edwards EnterpriseOne, some of the user profile tasks that you typically perform in JD Edwards EnterpriseOne, such as adding and deleting users, are disabled. You must use LDAP to modify these records, not JD Edwards EnterpriseOne. This section summarizes the following changes in JD Edwards EnterpriseOne menus and applications that result from using LDAP to manage user profile information:

User Password Changes

In JD Edwards EnterpriseOne, users can change their passwords using the User Default Revisions application. However, when LDAP is enabled, users must contact a system administrator for password changes. If a user attempts to select the Change Password option in the User Default Revisions form, the system displays this error:

Error: LDAP authentication is enabled. Solution: Users must contact a security administrator to have their passwords changed.

User Profile Revisions Application (P0092) Changes

The following functions for managing user information in P0092 are disabled:

This ensures that users can only be managed through LDAP.

EnterpriseOne Security Application (P98OWSEC) Changes

When LDAP is enabled, P98OWSEC only allows you to add or change specific security settings for specified users. This section discusses the features that you can use in this application when LDAP is enabled.

When an existing single user is selected for security revisions, the User ID field contains the selected user ID.

On the Security Detail Revisions form, you can enable the User Status and Allowed Password Attempts fields by selecting these corresponding options:

When you are updating security for all users, you click the Revise All button from the Form menu in the Work With User/Role Profiles form. The Security Detail Revisions form appears.

On the Security Detail Revisions form, you can enable the User Status and Allowed Password Attempts fields for all users by selecting these corresponding options:

Role Relationships Application (P95921) Changes

When LDAP is enabled, P95921 has been modified to enable or disable certain functionality, depending on whether roles are managed in LDAP. When roles are managed in LDAP, you cannot use JD Edwards EnterpriseOne to add or delete a role for an individual user. However, you can add roles to the default user for LDAP, which is _LDAPDEFLT. Additionally, you can modify the role expiration date.

If you attempt to add a role to an individual user in JD Edwards EnterpriseOne, the system displays this error:

Error: Role Relationship is managed by LDAP.

Similarly, if you attempt to delegate, remove, or add a role for an individual user, the system will display the same error.

Note. When LDAP is enabled and roles are managed in LDAP, you can use a third-party LDAP-enabled application to add, delete, or modify role relationships for any user.

Schedule Jobs Application Changes

The Schedule Jobs application (P91300) displays a password column which is written to the F91300 table. The password stored in this column provides the password that P91300 uses to connect to the JD Edwards EnterpriseOne database. The column is only stored for program use and the actual database record contains an encrypted blob that cannot be viewed or decrypted by the system administrator. However, you can enter the password in the Scheduler Password field of the Scheduling Advance Options form.

The Scheduler kernel validates the user ID and password stored in F91300. The job cannot be launched if the validation fails. Therefore, if the user changes their password after the job is scheduled, the job cannot be launched. In such cases, the user must use P91300 to revise the job.

Click to jump to top of pageClick to jump to parent topicLDAP Server-Side Administration

This section assumes that JD Edwards EnterpriseOne is using the LDAP server for user profile administration. Using a third-party LDAP-enabled application to access the LDAP server, you can add, modify, or delete attributes of user profiles. This table lists the items that you can manage and actions that you can perform from the LDAP server:

User Profile Attribute

Action

Description

User ID and Password Values

Add

Modify

Delete

The user ID and password values must be alphanumeric and cannot exceed 10 characters in length. Unicode is supported.

At sign-in, logic on the JD Edwards EnterpriseOne server automatically performs one-way, real-time synchronization of user IDs from the LDAP server to the JD Edwards EnterpriseOne database.

You can run a separate batch program on the JD Edwards EnterpriseOne enterprise server to initially migrate user IDs from LDAP to the JD Edwards EnterpriseOne database.

User-Role Relationship

Add

Modify

Delete

At sign-in, logic on the JD Edwards EnterpriseOne server will automatically perform one-way real-time synchronization of this data from the LDAP server to the JD Edwards EnterpriseOne database.

You can run a separate batch program on the JD Edwards EnterpriseOne server to initially migrate this data from LDAP to the JD Edwards EnterpriseOne database.

Only valid JD Edwards EnterpriseOne user-role relationships will be synchronized from LDAP to the JD Edwards EnterpriseOne database.

Role Definitions

Add

Modify

Delete

You must manually set up role definitions in LDAP and JD Edwards EnterpriseOne because there is no automated method to synchronize this data.

Click to jump to top of pageClick to jump to parent topicJD Edwards EnterpriseOne Server-Side Administration

When JD Edwards EnterpriseOne is enabled for LDAP, there are still some user profile administrative tasks that you manage on the JD Edwards EnterpriseOne enterprise server, such as:

You can modify the following items on the JD Edwards EnterpriseOne enterprise server:

JD Edwards EnterpriseOne Attributes

Action

Description

System User ID and Password

Add

Modify

Delete

Required to set system values not supported by LDAP.

System information is used to connect to the database. It includes database system user name, system user password, and data source name (system key).

User-Role Relationship

Add

Modify

Delete

Required if user-role relationships are managed in JD Edwards EnterpriseOne.

User-Role Relationship Attributes

Add

Modify

Delete

Required to set attributes not supported by LDAP, such as *ALL and Expiration Dates, when you manage user-role relationships in LDAP.

User Status

Modify

Allowed statuses include:

  • Enabled

  • Disabled

There is no automatic or batch synchronization between LDAP and JD Edwards EnterpriseOne for this function.

Allow Password Attempts for EnterpriseOne User

Modify

The number of invalid sign-on attempts a user can make before that user profile is disabled.

Role Definitions

Modify

You must always define the role definition in JD Edwards EnterpriseOne, regardless of any LDAP considerations.

Click to jump to parent topicConfiguring LDAP Support in JD Edwards EnterpriseOne

This section provides an overview of the steps to enable LDAP support in JD Edwards EnterpriseOne, how JD Edwards EnterpriseOne uses LDAP server settings, lists prerequisites, and discusses how to:

Note. If you are creating an LDAP configuration for Oracle Internet Directory, the specific settings for this configuration are listed in an appendix in this guide.

See Creating a JD Edwards EnterpriseOne LDAP Configuration for OID.

Click to jump to top of pageClick to jump to parent topicOverview of Steps to Enable LDAP Support in JD Edwards EnterpriseOne

You must follow these high-level steps in the specified order to properly configure the JD Edwards EnterpriseOne enterprise server to support LDAP:

  1. Disable LDAP authentication by ensuring that the [Security] section of the JD Edwards EnterpriseOne enterprise server jde.ini file contains this setting:

    LDAPAuthentication=false

  2. Use the LDAP Server Configuration Workbench application (P95928) to create an LDAP configuration, configure the LDAP server settings, and configure the LDAP to JD Edwards EnterpriseOne enterprise server mappings. The P95928 application is available on the Microsoft Windows client and the web client.

    Note. JD Edwards EnterpriseOne provides two versions of this application. You can use ZJDE0001 to create a template for creating an LDAP configuration. Create the template by adding specific attributes to the LDAP configuration that can be defined later. This section uses ZJDE0002 of the application to show all possible attributes that can be mapped in the LDAP configuration.

  3. Use the Configure LDAP Defaults form to enter the required LDAP default user profile settings.

    See Modifying the LDAP Default User Profile Settings.

  4. Change the LDAP configuration status.

  5. Enable LDAP authentication by changing the setting in the [Security] section of the JD Edwards EnterpriseOne enterprise server jde.ini file:

    LDAPAuthentication=true

  6. Restart the JD Edwards EnterpriseOne enterprise server.

Click to jump to top of pageClick to jump to parent topicHow JD Edwards EnterpriseOne Uses LDAP Server Settings

Part of creating an LDAP configuration for JD Edwards EnterpriseOne involves configuring LDAP server settings. The LDAP server settings are in compliance with the standard syntax specified by the LDAP Data Interchange Format (LDIF). These settings, or attributes, when configured correctly, determine how JD Edwards EnterpriseOne searches for user profile data in the LDAP server. The attributes that you configure differ depending on whether you are:

This diagram shows how JD Edwards EnterpriseOne uses the LDAP server settings to search for user profiles in the LDAP server:

User data search hierarchy in the LDAP server

In this diagram, the JD Edwards EnterpriseOne application requests a search of the Directory Information Tree for a JD Edwards EnterpriseOne user in the United States with an ab12345 user ID. The user can only be found if these attributes contain valid values:

Attribute

Value

USRSRCHBAS (User Search Base)

o=enterpriseone, c=us

USRSRCHSCP (User Search Scope)

subtree

USRSRCHFLT (User Search Filter)

objectclass=inetOrgperson

USRSRCHATR (User Search Attribute)

uid

E1USRIDATR (EnterpriseOne User ID Attribute)

uid

  1. JD Edwards EnterpriseOne starts the search using the criteria specified in the User Search Base attribute.

  2. JD Edwards EnterpriseOne uses the value in the User Search Scope attribute to determine the scope of the search.

  3. JD Edwards EnterpriseOne uses the following Search Filter parameter to search for the user in LDAP:

    (&((User Search Filter value), ((User Search Attribute value)= “ab12345”)))

  4. JD Edwards EnterpriseOne retrieves the user ID from the EnterpriseOne User ID Attribute.

Click to jump to top of pageClick to jump to parent topicPrerequisites

To configure LDAP support in JD Edwards EnterpriseOne, you must have a system administrator who understands LDAP and understands how to use an LDAP-compliant directory service to manage user profile information.

For more information on LDAP, refer to these resources on the web:

For more information about a specific LDAP-compliant directory service, refer to that particular directory service's documentation.

If you are configuring the directory service with SSL, refer to the directory service documentation for instructions.

Click to jump to top of pageClick to jump to parent topicForms Used to Configure LDAP Support in JD Edwards EnterpriseOne

Form Name

FormID

Navigation

Usage

Available LDAP Configurations

W95928F

Enter P983051 in the Fast Path. On the Work With Interactive Versions form, enter P95928 in the Interactive Version field and click Find. Select ZJDE0002 and then select Run from the Row menu.

The P95928 application is available on the Microsoft Windows client and the web client.

Add an LDAP configuration record.

LDAP Server Information

W95928A

On the Available LDAP Configurations form, click Add.

Complete the fields that are required for the LDAP configuration record.

LDAP Server Attribute Values

W95928E

On the Available LDAP Configurations form, select a configuration record and then select Values from the Row menu.

Enter LDAP server attribute values.

LDAP Server Mappings

W95928B

On the Available LDAP Configurations form, select Mappings from the Row menu.

Configure LDAP to JD Edwards EnterpriseOne enterprise server mappings.

Click to jump to top of pageClick to jump to parent topicCreating an LDAP Configuration

Access the Available LDAP Configurations form.

  1. Click Add to add a new configuration record.

  2. On the LDAP Server Information form, complete these fields and then click OK:

Field

Description

Server Configuration Name

Enter a unique name for the server configuration, and then tab to the next field and enter a description.

Enterprise Server Location

Enter the location of the enterprise server.

Enterprise Server Port

Enter the port used to connect to the enterprise server.

LDAP Server Location

Enter the location (machine name or IP address) of the LDAP server on the network.

LDAP Server Port

Enter the port used to connect to the LDAP server.

LDAP Server Type

Click the search button to select the type of LDAP server: Microsoft, IBM, or Domino.

Note. If you are configuring LDAP for Oracle Internet Directory, you must add OID to the list of options and select it here.

See Creating a JD Edwards EnterpriseOne LDAP Configuration for OID.

LDAP Admin ID

Enter the administrator's ID for the LDAP server.

LDAP Admin Password

Enter the administrator's password for the LDAP server.

SSL Enabled LDAP Server

Select this option if you want to set up Secure Socket Layer (SSL) communication between JD Edwards EnterpriseOne security kernel and the LDAP server.

Note. This requires the LDAP server to be configured for SSL.

See Using LDAP Over SSL.

Role Enabled in LDAP

Select this option if you are managing user-role relationships in LDAP.

Click to jump to top of pageClick to jump to parent topicConfiguring the LDAP Server Settings

Access the LDAP Server Attribute Values form. To do so, on the Available LDAP Configurations form, select a configuration record and then select Values from the Row menu.

  1. Click the search button in the Enterprise Server Attribute Name column to select the attributes to include in the LDAP server settings.

    After selecting the attributes, you must enter the appropriate LDAP value for the attribute in the LDAP Server Attribute Value column.

  2. To configure the standard JD Edwards EnterpriseOne settings for LDAP server, enter values for these attributes:

    Attribute

    Description

    USRSRCHBAS

    User search base. Specifies that the system searches for user information at the root of the directory information tree. This value specifies the “container” in which to begin the search. For example, USRSRCHBAS=o=jdedwards,c=us

    USRSRCHFLT

    User search filter. Specifies that a search is performed at the base level for the user ID in the LDAP server using the specified criteria. For example, USRSRCHFLT=objectclass=inetOrgPerson

    If you do not specify this value, no search filtering occurs.

    USRSRCHSCP

    User search scope. Specifies the level, or scope, at which the system searches for user information. Valid values are:

    • base

      The query searches only the value you specified in the USRSRCHBAS setting.

    • subtree

      This is the default value. The query searches the value in the Search Base field and all entries beneath it.

    • onelevel

      The query searches only the entries one level down from the value in the Search Base field.

    ROLSRCHBAS

    Role search base (use only if roles are enabled in LDAP). Specifies that a search is performed at the base level for the UserIDAttri in the LDAP database. For example, ROLSRCHBAS=o=jdedwards,c=us

    ROLSRCHFLT

    Role search filter (use only if roles are enabled in LDAP). This specifies that a search is performed at the base level for the role in the LDAP database using the specified criteria. For example, ROLSRCHFLT=objectclass=groupOfNames

    If you do not specify this value, no search filtering occurs.

    ROLSRCHSCP

    Role search scope (use only if roles are enabled in LDAP). This specifies the level, or scope, at which the system searches for role information. Valid values are:

    • base

      The query searches only the value you specified in the ROLSRCHBAS setting.

    • subtree

      This is the default value. The query searches the value in the Search Base field and all entries beneath it.

    • onelevel

      The query searches only the entries one level down from the value in the Search Base field.

  3. When using Secure Socket Layer (SSL) with LDAP server, enter values for these attributes:

    Attribute

    Description

    SSLPORT

    SSL Port for the LDAP server. Specifies the SSL port on the LDAP server.

    CERTDBPATH

    Dir path for cert7.db (SSL)

    For Windows and UNIX: This specifies the directory path to the cert7.db file (SSL). This file should generally be located in the system\bin32 directory on the JD Edwards EnterpriseOne enterprise server.

    For iSeries: This specifies the directory path and file name for the cert.kdb file on the iSeries-based JD Edwards EnterpriseOne enterprise server machine, for example /QIBM/USERDATA/ICSS/CERT/SERVER/CERT.KDB. You should use the Digital Certificate Manager (DCM) to verify the location of the certificate for your installation.

    CERTDBCLBL

    Do not use this attribute. This is for future use only.

    CERTDBPSWD

    For iSeries only.

    This is the password to the key database. Specifies the password to the key database (files with a “kdb” extension). The key database is used to store a uniquely identified name, or label, associated with the client private key/certificate pair.

    SSLTIMEOUT

    For iSeries only.

    This specifies the time-out value for the SSL connection.

  4. If you are using the self-service version of the user profile application for the Manufacturing Sourcing module, enter values for these attributes:

    Note. You cannot use this application to manage LDAP user profiles.

    Attribute

    Description

    USRACNTCTL

    User Account Control. Specifies the authority attached when creating a user in Active Directory, for example USRACNTCTL=512 creates an enabled user in Active Directory only.

    USRADDLOC

    User Add Location. Specifies the location in LDAP where users will be added, for example USRADDLOC=O=jdedwards.

    USRCLSHRCY

    User Class Hierarchy. Specifies the class hierarchy needed to create a user in LDAP, for example USRCLSHRCY=top, person, organizationalPerson, inetOrgPerson.

    ROLADDLOC

    Role Add Location (use only if roles are enabled in LDAP). Specifies the location in LDAP that contains the user-role relationship, for example ROLADDLOC=O=jdedwards.

    ROLCLSHRCY

    Do not use this attribute. This is for future use only.

Click to jump to top of pageClick to jump to parent topicConfiguring LDAP to JD Edwards EnterpriseOne Enterprise Server Mappings

You can map attributes for users or for user-role relationships, depending upon your configuration. If you are entering mappings for user-role relationships, you must also ensure that the LDAP configuration record is enabled for roles.

Access the LDAP Server Mappings form. To do so, on the Available LDAP Configurations form, select Mappings from the Row menu.

  1. Click the search button in the Enterprise Server Attribute Name column to select the attributes to include in the mappings.

    After selecting the attributes, you must enter the appropriate LDAP value for the attribute in the LDAP Server Actual Attribute column.

  2. To configure the LDAP to JD Edwards EnterpriseOne enterprise server mappings for a standard setup, enter values for these attributes:

    Attribute

    Description

    E1USRIDATR

    EnterpriseOne User ID Attribute. Specifies the user ID attribute in LDAP that is used for JD Edwards EnterpriseOne users. The system uses this attribute when creating users in LDAP during JD Edwards EnterpriseOne sign-in, for example E1USRIDATR=cn.

    USRSRCHATR

    User ID Search Attribute. Specifies the search criteria for the sign-on user ID. This is the value that maps the sign-on user ID in LDAP to the sign-in user ID in JD Edwards EnterpriseOne, for example USRSRCHATR=cn.

    The USRSRCHATR and E1USRIDATR attributes should be mapped to the same value.

    EUSRIDATR

    Enterprise User ID Attribute. Specifies the User ID attribute in LDAP that is used for Enterprise users. The system uses this attribute to search for Enterprise users for single sign-on between PeopleSoft Enterprise Portal and JD Edwards EnterpriseOne, for example EUSRIDATR = cn.

    ROLNAMEATR

    Role Name Attribute (use only if roles are enabled in LDAP). This value maps the role in LDAP to the role in JD Edwards EnterpriseOne, for example ROLENAMEATR=cn

    ROLSRCHATR

    Role Search Attribute (use only if roles are enabled in LDAP). Specifies the search attribute for the role in the LDAP server. The system uses this attribute to search LDAP for a list of roles for a user, for example ROLSRCHATR=member.

    LANGUAGATR

    Language Attribute. Specifies the language attribute used within LDAP, for example LANGUAGATR=preferredLanguage

  3. If you are using the self-service version of the user profile application for the Manufacturing Sourcing module, enter values for these attributes:

    Note. You cannot use this application to manage LDAP user profiles.

    Attribute

    Description

    CMNNAME

    Common Name. Specifies the Common Name for a user in LDAP. The system uses this attribute when creating users in LDAP, for example CMNNAME=cn

    GIVENNAME

    Specifies the Given Name for a user in LDAP. It is used when creating users in LDAP, especially in Active Directory, for example GIVENNAME=givenName.

    SURNAME

    Specifies the SUR Name for a user in LDAP. This attribute is used when creating users in LDAP, for example SURNAME=sn.

    PASSWORD

    Specifies the password associated with the account that you specify with the ConnectDN (distinguished name) of the LDAP server.

    OBJCLASS

    Object Class. Specifies the Object Class attribute for a user in LDAP it is used when creating users in LDAP, for example OBJCLASS=objectCLASS.

    ACNTCTLATR

    Account Control Attribute. Specifies the attribute used in Active Directory for user authority in Active Directory, for example ACNTCTLATR=userAccountControl. If the attribute USRACNTCTL=512 is used in conjunction with ACNTCTLATR, the JD Edwards EnterpriseOne API will create an enabled user in Active Directory only.

    ACTNAMEATR

    Account Name Attribute. Specifies the attribute used only in Active Directory for creating a signon user account, for example ACNTCTLATR=sAMAccountName.

Click to jump to top of pageClick to jump to parent topicChanging the LDAP Configuration Status

After you add an LDAP configuration, by default the configuration is disabled or non-active. You must change the status to active to enable the configuration.

Note. You can have only one active LDAP configuration per port.

Access the Available LDAP Configurations form.

Select a configuration record and then select Change Status from the Row menu.

The system changes the status in the Status column to AV (active) or NA (not active).

Click to jump to top of pageClick to jump to parent topicEnabling LDAP Authentication Mode

Access the jde.ini file on the JD Edwards EnterpriseOne enterprise server.

In the [SECURITY] section, enter true for the LDAPAuthentication setting to enable security authentication. The default value for this setting is false, which disables the LDAP authentication mode.

Click to jump to parent topicModifying the LDAP Default User Profile Settings

This section provides an overview of the LDAP default user profile settings and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding LDAP Default User Profile Settings

You must configure and review the default LDAP user profile settings that are in the JD Edwards EnterpriseOne database. The system requires the default settings for user profile synchronization. These values are synchronized from LDAP to JD Edwards EnterpriseOne by the LDAP synchronization mechanisms (security kernel and batch report). The default user profile settings are written to the F0092 table.

Note. You must add the default LDAP user profile settings before enabling LDAP authentication in the jde.ini file of the JD Edwards EnterpriseOne security server.

The Configuring LDAP Defaults form shows whether the following items exist for the default user:

Click to jump to top of pageClick to jump to parent topicForms Used to Modify the LDAP Default User Profile Settings

Form Name

FormID

Navigation

Usage

Configure LDAP Defaults

W0092M

In Solution Explorer, from the System Administration Tools menu (GH9011), select Security Maintenance, Security Maintenance Advanced and Technical Operations, Configure LDAP Defaults.

Review the current LDAP default settings.

User Profile Revisions

W0092A

On the Configure LDAP Defaults form, click the User Profile link.

Modify the default user profile settings for LDAP.

Work with Role Relationships

W95921C

On the Configure LDAP Defaults form, click the Role Relationships link.

Add roles to the default user.

Work With User Security

W98OWSECE

On the Configure LDAP Defaults form, click the Data Source/System User link.

Add or modify the data source or system user settings.

Data Source Revisions

W98OWSECH

On the Work With User Security form, select a security record and then click Select.

Assign a different system user to the data source.

Security Revisions

W98OWSECB

On the Work With User Security form, click Add.

Add an additional data source.

Click to jump to top of pageClick to jump to parent topicReviewing the Current LDAP Default Settings

Access the Configure LDAP Defaults form.

Note. All user values are assigned per user ID the first time, and the first time only, that a user signs in. During this initial sign-in, the values are synchronized from LDAP to the JD Edwards EnterpriseOne database. The default role relationship is synchronized only if roles are managed by JD Edwards EnterpriseOne.

LDAP Authentication

Indicates whether LDAP authentication is enabled or disabled.

Role Management

Indicates whether roles are managed by LDAP. You can enable JD Edwards EnterpriseOne to manage roles in LDAP through the P95928 application.

See Creating an LDAP Configuration.

User Profile

Indicates whether a default user profile exists within the JD Edwards EnterpriseOne database. Click this link to modify the default user profile settings.

See Modifying the LDAP Default User Profile Settings.

Role Relationships

Indicates whether a default role relationship exists. If LDAP authentication is enabled, and if user-role relationships are set to be managed by LDAP, then this option is disabled. This means that the system does not use the default user-role relationship when synchronizing users from LDAP to the JD Edwards EnterpriseOne database.

Click this link to revise the default role relationship.

See Modifying the Default Role Relationships for LDAP.

Data Source/System User

Indicates whether a default data source or system user exists. Click this link to add or change the data source or system user.

See Modifying the Default User Security Settings for LDAP.

Click to jump to top of pageClick to jump to parent topicModifying the Default User Profile Settings for LDAP

Access the User Profile Revisions form. To do so, on the Configure LDAP Defaults form, click the User Profile link.

Modify the appropriate fields.

Note. The User ID field always contains the default user ID for the LDAP system. This field is read only.

Click to jump to top of pageClick to jump to parent topicModifying the Default Role Relationships for LDAP

Access the Work With Role Relationships form. To do so, on the Configure LDAP Defaults form, click the Role Relationships link.

Note. If LDAP authentication is enabled and user-role relationships are being managed by LDAP, then this option is disabled. This means that user-role relationship functionality from within JD Edwards EnterpriseOne is disabled.

On the Work With Role Relationships form, you can highlight a role in either the Assigned Roles or Available Roles menus, and then click the appropriate directional arrow button to add or remove the role for the default user.

Note. These values are only synchronized between JD Edwards EnterpriseOne and LDAP if the role is being managed by JD Edwards EnterpriseOne.

Click to jump to top of pageClick to jump to parent topicModifying the Default User Security Settings for LDAP

Access the Configure LDAP Defaults form.

  1. In the Configure Defaults area, click the Data Source/System User link.

    If the default data source or system user does not exist, the Security Revisions form appears.

  2. On the Security Revisions form, complete the System User field to add or change the data source or system user.

    If the default data source is defined, the Work With User Security form appears.

  3. To assign a different system user to the data source, on the Work With User Security form, select the security record and then click Select.

  4. On Data Source Revisions, click the search button in the System User field to assign a different system user.

  5. To add an additional data source, on the Work With User Security form, click Add.

  6. On the Security Revisions form, complete the fields as appropriate.

Click to jump to parent topicUsing LDAP Bulk Synchronization (R9200040)

This section provides an overview of LDAP bulk synchronization and discusses how to run the LDAP Bulk Synchronization batch process (R9200040).

Click to jump to top of pageClick to jump to parent topicUnderstanding LDAP Batch Synchronization

The LDAP server contains user profile data for multiple users. This data must also exist in the JD Edwards EnterpriseOne database server. The LDAP Bulk Synchronization batch process (R9200040) enables you to perform bulk synchronization of user profile records from the LDAP server to the JD Edwards EnterpriseOne database. Therefore, this report is beneficial because it populates data that is required for JD Edwards EnterpriseOne functionality.

Note. If the JD Edwards EnterpriseOne database contains user profile records that are not in the LDAP server, this data cannot be synchronized from JD Edwards EnterpriseOne to the LDAP server using the R9200040 batch process. JD Edwards EnterpriseOne does not provide a utility to perform this function.

Running the report synchronizes user profile data obtained from the LDAP server to the following JD Edwards EnterpriseOne database tables:

Table

Description

F0092

Library List User

F00921

User Display Preferences

F98OWSEC

Security settings

F95921

Role Relationship

F0093

Library List Control

F00922

User Display Preferences Tag File

F00924

User Install Package

F00926

Anonymous User Access Table

F9005

Variant Description - Control Tables

F9006

Variant Detail - Control Tables

F00927

E1 Users PIM Information

Example: LDAP Bulk Synchronization (R9200040)

The following example shows the PDF output of the R9200040 batch process. Note that if the data on the LDAP server is already the same as the corresponding data on the JD Edwards EnterpriseOne database server, the report lists the affected tables and shows a zero record synchronization, which indicates the data exists, but is identical.

LDAP Bulk Synchronization output

Click to jump to top of pageClick to jump to parent topicRunning the LDAP Bulk Synchronization Batch Process (R9200040)

Access the Batch Versions program (P98305). To do so, enter P98305 in the Fast Path.

  1. On the Work With Batch Versions – Available Versions form, enter R9200040 in the Batch Application field and click Select.

  2. On the Version Prompting form, click Submit.

Click to jump to parent topicUsing LDAP Over SSL

This section provides an overview on how to enable LDAP authentication over Secure Socket Layer (SSL) and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding LDAP with SSL

You can establish a secure LDAP connection between the JD Edwards EnterpriseOne server and the LDAP server.

LDAP Authentication Over SSL for Windows and UNIX

The JD Edwards EnterpriseOne server uses Netscape’s certificate database, cert7.db. You can obtain a cert7.db using the PKCS Utilities distributed by Netscape. Refer to Netscape’s documentation for more information on obtaining and using the PKCS Utilities.

For Windows and UNIX, establishing the secure connection between the JD Edwards EnterpriseOne application server and the LDAP server requires these items:

LDAP Authentication Over SSL for iSeries

The JD Edwards EnterpriseOne server uses IBM certificate database (.kdb) to store certificates on iSeries. You can create a certificate database on iSeries using Digital Certificate Manager.

For iSeries, establishing a secure connection between the JD Edwards EnterpriseOne application server and the LDAP server requires these items:

Click to jump to top of pageClick to jump to parent topicEnabling LDAP Authentication Over SSL for Windows and UNIX

To enable LDAP authentication over SSL for Windows or UNIX:

  1. Follow the documentation for your directory server to add the server certificate to the directory server.

  2. Using Netscape's PKCS Utilities, add the CA's trusted root certificate to the cert7.db certificate database.

  3. Enable SSL for the LDAP configuration using the LDAP Server Configuration Workbench application.

  4. Specify the SSL parameters.

    See Configuring the LDAP Server Settings.

  5. Restart the JD Edwards EnterpriseOne server.

Click to jump to top of pageClick to jump to parent topicEnabling LDAP Authentication Over SSL for iSeries

To enable LDAP authentication over SSL for iSeries:

  1. Follow the documentation for your directory server to add the server certificate to the directory server.

  2. Use Digital Certificate Manager to add and export the CA's trusted root certificate to the certificate database (.kdb file).

  3. Enable the SSL for the LDAP configuration using the LDAP Server Configuration Workbench application.

  4. Specify the SSL parameters.

    See Configuring the LDAP Server Settings.

  5. Restart the JD Edwards EnterpriseOne server.

Click to jump to parent topicExporting User Data to the LDAP Server

This section provides an overview of the data4ldap utility, lists prerequisites, and discusses:

Click to jump to top of pageClick to jump to parent topicUnderstanding the data4ldap Utility

The data4ldap utility automates the process of uploading JD Edwards EnterpriseOne user data to the LDAP server. The JD Edwards EnterpriseOne user data includes:

If you do not use this utility, you would have to populate the repository manually, which can lead to data being entered incorrectly. This illustration shows the data4ldap.exe utility uploading the JD Edwards EnterpriseOne user data to the LDAP server.

Uploading user data to the LDAP server with data4ldap.exe

The Language attribute is uploaded only for those JD Edwards EnterpriseOne users who are specifically assigned a language. By default, no language is assigned to a user when a user is added to JD Edwards EnterpriseOne. In such a case, no language is available for the particular user in the LDAP server. For example, if User 1 is assigned language E and User 2 is not assigned to any language, the language attribute is uploaded to the LDAP server only for User 1 and not for User 2.

Expired JD Edwards EnterpriseOne users and roles are also exported to the LDAP server. If a JD Edwards EnterpriseOne user record does not exist in the table F98OWSEC, then the particular user would not be exported to the LDAP server.

Click to jump to top of pageClick to jump to parent topicPrerequisites

Before you use the data4ldap utility, you must:

Click to jump to top of pageClick to jump to parent topicGranting Access to the data4ldap Utility

The data4ldap utility involves working with secured data, so you must ensure that only authorized users are able to access and run it. Use the External Calls Security form in the Security Workbench program (P00950) to grant a user or administrator access to this utility.

See Adding External Call Security.

Click to jump to top of pageClick to jump to parent topicConfiguring Parameters Required to Run the data4ldap Utility

The data4ldap utility can run only on the Enterprise Server and not on the client.

To run the data4ldap utility, you must configure these parameters:

data4ldap <UserID> <Environment> <Role> <IsRoleIncluded (*YES/*NO)> <IsOverwriteAllowed (*YES/*NO)>

Parameter

Description

UserID

Enter a valid JD Edwards EnterpriseOne user ID that has been granted access to the utility from External Call Security.

Environment

Enter a valid JD Edwards EnterpriseOne environment.

Role

Enter a valid JD Edwards EnterpriseOne role.

IsRoleIncluded

Specify whether or not JD Edwards EnterpriseOne role information is included in the export to the LDAP server.

Enter *YES to export role information.

Enter *NO to not export role information.

IsOverwriteAllowed

Determine whether you want to override the LDAP server entries with the JD Edwards EnterpriseOne user-role data: Enter *YES to overwrite the LDAP server entries with the JD Edwards EnterpriseOne user-role data. Enter *NO if you do not want to overwrite the LDAP server entries with the JD Edwards EnterpriseOne user-role data.

Note. The IsOverwriteAllowed parameter is used in case the LDAP server already contains user data that is identical to JD Edwards EnterpriseOne user data. In this case, you have the option to overwrite the existing LDAP server user IDs with the current JD Edwards EnterpriseOne user IDs.The value of IsOverwriteAllowed parameter is valid only for user data (common name, language, password, and given name whichever is configured through the application P95928) and not for user-role relationship data.

Click to jump to top of pageClick to jump to parent topicRunning the data4ldap Utility on Windows

In the command prompt, navigate to Enterprise Server System\bin32.

  1. Enter the valid parameters. For example:

    data4ldap JDE DV812 *ALL *YES *YES

  2. Press Enter.

    The utility prompts for User – Password.

  3. Enter the password for the JD Edwards EnterpriseOne account.

Click to jump to top of pageClick to jump to parent topicRunning the data4ldap Utility on Unix or Linux

In the command prompt, navigate to Enterprise Server System\bin32.

  1. Enter the valid parameters. For example:

    data4ldap JDE DV812 *ALL *YES *YES

  2. Press Enter.

    The utility prompts for User – Password.

  3. Enter the password for the JD Edwards EnterpriseOne account.

Click to jump to top of pageClick to jump to parent topicRunning the data4ldap utility on iSeries

Access the iSeries command prompt.

  1. Type data4ldap and press F4.

    Some default values that are editable appear on the screen.

  2. Enter the valid parameters, for example:

    data4ldap JDE Password DV812 *ALL *YES *YES

  3. Press Enter.

Click to jump to top of pageClick to jump to parent topicScenarios for Uploading Users to the LDAP Server

This section discusses the following scenarios for uploading users to the LDAP server:

data4ldap JDE DV812 *ALL *NO *YES

All JD Edwards EnterpriseOne users are uploaded to the LDAP server and existing LDAP user data is overwritten. However, JD Edwards EnterpriseOne user-role relationship data is neither uploaded nor overwritten in the LDAP server.

data4ldap JDE DV812 *ALL *YES *YES

All JD Edwards EnterpriseOne user and user-role relationship data is uploaded to the LDAP server. The existing LDAP user data and LDAP role-relationship data is overwritten.

data4ldap JDE DV812 *ALL *YES *NO

All JD Edwards EnterpriseOne users who do not exist in the LDAP server are uploaded to the LDAP server. The existing LDAP users are not be overwritten.

All JD Edwards EnterpriseOne user-role relationship data is uploaded to the LDAP server and the existing LDAP role-relationship data is overwritten.

data4ldap JDE DV812 *ALL *NO *NO

All JD Edwards EnterpriseOne users who do not exist in the LDAP server are uploaded to the LDAP server, and the existing LDAP users are not overwritten.

However, JD Edwards EnterpriseOne user-role relationship data would neither be uploaded nor overwritten in the LDAP Server.

Click to jump to top of pageClick to jump to parent topicLDAP Server Behavior

This section provides information about LDAP server and:

Tree Delete Control

IBM Directory Server (IDS) and Microsoft Active Directory support Tree Delete Control. The Tree Delete Control extends the delete operation and allows the removal of sub trees within a directory using a single delete request.

It is always recommended that if the Role data are managed by the LDAP server, include the Role data (isRoleIncluded = *YES) while choosing the Overwrite option (isOverwriteAllowed = *YES).

For more details on Tree Delete Control, see:

Note. Oracle Internet Directory (OID) does not support Tree Delete Control.

Microsoft Active Directory

Microsoft Active Directory 2003 uses “inetOrgPerson” and a user password can be stored in the Active Directory attribute called “userPassword”. However, Active Directory 2003 must be configured to store a user password in the “userPassword” attribute. It can be configured by setting the 9th bit of dsHeuristics value. It is located in CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=domain. object. The value should look like this: 000000001. For details refer to:

http://technet2.microsoft.com/windowsserver/en/library/bb99fdd4-f8e0-490f-adae-6814cf081ff71033.mspx?mfr=true

Consider the following items when using Microsoft Active Directory: