2.4.1.6.3 Managing User Access and Groups
LDAP authentication applies only to newly created users. Access to sudo
and other system privileges is determined by group memberships.
Adding LDAP users to system groups
- The specified groups must exist on the DSR system before adding users.
- The utility supports adding multiple users to multiple groups simultaneously.
To add an LDAP user to a system group, perform the below command. Replace <LDAPUSER> with the username of LDAP user and <GROUP> with the system group name. The below command will add the user <LDAPUSER> to <GROUP> on all the servers of the topology.
/usr/TKLC/appworks/bin/ldapCliAuthentication.sh --add-user-to-group --user "<LDAPUSER>" --group "<GROUP>"
Example:
/usr/TKLC/appworks/bin/ldapCliAuthentication.sh --add-user-to-group --user "user1,user2" --group "group1,group2"
In this case, user1 and user2 (LDAP Users) will both be added to group1 and group2 for all the servers present in the topology.
Note:
LDAP users will only be available on the DSR system after LDAP has been configured by following the previous steps. Until that configuration is complete, user synchronization between the LDAP server and the DSR system will not take place.Granting sudo privilege to LDAP user
To grant sudo
permissions to LDAP users, add users to the
admgrp
group present in the DSR system. This can be performed by
running the following command on the Active NOAM (Network Operations, Administration and
Maintenance of the DSR system as the admusr
.
/usr/TKLC/appworks/bin/ldapCliAuthentication.sh --add-user-to-group --user "<LDAPUSER>" --group "admgrp"
Avoiding CLI Errors during login
awadm
system group. This can be performed by running the below
command on Active NOAM of DSR system as
admusr
./usr/TKLC/appworks/bin/ldapCliAuthentication.sh --add-user-to-group --user "<LDAPUSER>" --group "awadm"
The --add-user-to-group utility supports --hostnames flag. For more information, see Targeting Specific Servers.
Removing LDAP users from system groups
The script also provides a utility to remove LDAP users from system
groups. This ensures that LDAP users can be removed from existing DSR group
membership if required. To remove LDAP users from one or more DSR system groups, run
the below command as admusr
on Active NOAM server.
/usr/TKLC/appworks/bin/ldapCliAuthentication.sh --remove-user-from-group --user "<LDAPUSER>" --group "<GROUP>"
Example:
/usr/TKLC/appworks/bin/ldapCliAuthentication.sh --remove-user-from-group --user "user1,user2" --group "group1,group2"
In this case, user1 and user2 (LDAP users) will be removed from both the system groups, group1 and group2 from all the servers of topology.
Note:
This utility can only remove LDAP users from secondary groups, not from their primary group (GID). Primary group is the group which is set when the user is created in LDAP. To modify the primary group, changes must be made directly on the LDAP server.The --remove-user-from-group utility supports --hostnames flag. For more information on hostnames flag, see Targeting Specific Servers.