nve:/opt/nre/java/latest/bin # keytool -list -keystore /opt/nre/java/latest/lib/security/cacerts -storepass changeit
keytool -list -keystore ..\lib\security\cacerts -storepass changeit
keytool -delete -alias ALIAS_NAME -keystore ../lib/security/cacerts -storepass changeit
openssl s_client -showcerts -connect LDAPS_SERVER:636
-----BEGIN CERTIFICATE-----
MIIGQDCCBSigAwIBAgITbgAAAAiwkngyAQWDwwACAAAACDANBgkqhkiG9w0BAQsF
ADBPMRUwEwYKCZImiZPyLGQBGRYFbG9jYWwxFjAUBgoJkiaJk/IsZAEZFgZlbWNs
...
7NZfi9DiEBhpFmbF8xP96qB/kTJC+29t/0VE8Fvlg87fRhs5BceIoX8nUnetNCdm
m4mGyefXz4TBTwD06opJf4NQIDo=
-----END CERTIFICATE-----
keytool -import -alias ALIAS_NAME -keystore ../lib/security/cacerts -storepass changeit -file PATH_TO\CERT_FILE
nve:/opt/nre/java/latest/bin # keytool -import -alias ldaps -keystore ../lib/security/cacerts -storepass changeit -file ~/ca.cer
Owner:
Issuer: CN=AMER-DC-CA, DC=dc, DC=lan
Serial number: 4900000004501b5e1c46b7c875000000000004
Valid from: Wed Feb 13 16:39:37 EST 2024 until: Sat Feb 13 16:49:37 EST 2026
Certificate fingerprints:
SHA1: CD:C5:E0:7B:52:68:4D:85:2D:08:FC:73:49:2F:53:08:4B:CC:DE:03
SHA256: 4B:B6:E9:B4:63:34:9B:55:52:A2:23:D1:57:5D:98:92:EB:B8:C3:31:CD:55:CD:53:B8:F0:D6:BB:64:A6:D6:61
...
...
...
Trust this certificate? [no]: yes
Certificate was added to keystore
nve:/opt/nre/java/latest/bin # keytool -list -keystore ../lib/security/cacerts -storepass changeit | grep ldaps
ldaps, Feb 13, 2024, trustedCertEntry,
1. From a web browser, access the NWUI server: https://nwui-server-name:9090/nwui
2. Log in using the NetWorker Administrator account.
3. From the menu, expand Authentication Server and click External Authorities.
4. From External Authorities, click Add+.
5. Populate the configuration fields:
Field
|
Value
|
Name
|
A descriptive name, without spaces for the LDAP or AD configuration. The maximum number of characters is 256. Specify ASCII characters in the configuration name only.
|
Server Type
|
AD over SSL
|
Provider Server Name
|
Specifies the hostname or IP address of the Active Directory Server.
|
Port
|
Port 636 is used for SSL, this field should populate automatically if "AD over SSL" is selected.
|
Tenant
|
Select the tenant if configured. If no tenant is configured or required, you can use the "default."
Configuring a tenant requires the following login syntax "tenant_name\domain_name\user_name." If the default tenant is used (common), then the login syntax is "domain_name\user_name." Tenant—Top-level organizational container for the NetWorker Authentication Service. Each external authentication authority in the local database is assigned to a tenant. A Tenant can contain one or more Domains, but the domain names must be unique within the tenant. NetWorker Authentication Service creates one integrated tenant name Default, which contains the Default domain. Creating multiple tenants helps you to manage complex configurations. For example, service providers with restricted datazones (RDZ) can create multiple tenants to provide isolated data protection services to tenant users. |
Domain
|
The full domain name including all DC values; e.g: example.com
|
User DN
|
Specifies the full distinguished name (DN) of a user account that has full read access to the AD directory.
|
User DN Password
|
Specifies the password of the user account that is used to access and read the AD direct.
|
Group Object Class
|
Required. The object class that identifies groups in the LDAP or AD hierarchy.
● For LDAP, use groupOfUniqueNames or groupOfNames. ● For AD, use group. |
Group Search Path (optional)
|
A DN that specifies the search path that the authentication service should use when searching for groups in the LDAP or AD hierarchy.
|
Group Name Attribute
|
The attribute that identifies the group name. For example, cn.
|
Group Member Attribute
|
The group membership of the user within a group.
● For LDAP: ○ When the Group Object Class is groupOfNames the attribute is commonly member. ○ When the Group Object Class is groupOfUniqueNames the attribute is commonly uniquemember. ● For AD, the value is commonly member. |
User Object Class
|
The object class that identifies the users in the LDAP or AD hierarchy. For example, person.
|
User Search Path (optional)
|
The DN that specifies the search path that the authentication service should use when searching for users in the LDAP or AD hierarchy. Specify a search path that is relative to the base DN that you specified in the configserver-address option. For example, for AD, specify cn=users.
|
User ID Attribute
|
The user ID that is associated with the user object in the LDAP or AD hierarchy.
For LDAP, this attribute is commonly uid. For AD, this attribute is commonly sAMAccountName. |
8. From the Server->User Groups menu Edit the User Groups that contain the rights that you want to delegate to AD/LDAP Groups or Users. For example to grant full Admin rights the AD group/user DN should be specified in the External Roles field of the Application Administrators and Security Administrators roles.
e.g: CN=NetWorker_Admins,DC=amer,DC=lan
This can also be done from command line:
nsraddadmin -e "AD_DN"
nve:~ # nsraddadmin -e "CN=NetWorker_Admins,DC=amer,DC=lan"
134751:nsraddadmin: Added role 'CN=NetWorker_Admins,DC=amer,DC=lan' to the 'Security Administrators' user group.
134751:nsraddadmin: Added role 'CN=NetWorker_Admins,DC=amer,DC=lan' to the 'Application Administrators' user group.
9. Once the AD group and/or user DNs have been specified click Save.
10. Log out of the NWUI interface and log back in using the AD account:
11. The user icon in the upper-right corner indicates which user account is signed in.
authc_mgmt -u Administrator -p NetWorker_Admin_Pass -e query-ldap-users -D query-tenant=tenant_name -D query-domain=domain_name
authc_mgmt -u Administrator -p NetWorker_Admin_Pass -e query-ldap-groups -D query-tenant=tenant_name -D query-domain=domain_name
authc_mgmt -u Administrator -p NetWorker_Admin_Pass -e query-ldap-groups-for-user -D query-tenant=tenant_name -D query-domain=domain_name -D user-name=ldap_username
e.g:
authc_mgmt -u Administrator -p Pa$$w0rd01 -e query-ldap-users -D query-tenant=default -D query-domain=lab.emc.com
The query returns 21 records.
User Name Full Dn Name
Administrator cn=Administrator,cn=Users,dc=lab,dc=emc,dc=com
Guest cn=Guest,cn=Users,dc=lab,dc=emc,dc=com
...
...
authc_mgmt -u Administrator -p Pa$$w0rd01 -e query-ldap-groups -D query-tenant=default -D query-domain=lab.emc.com
The query returns 55 records.
Group Name Full Dn Name
Administrators cn=Administrators,cn=Builtin,dc=lab,dc=emc,dc=com
NetWorker_Admins cn=NetWorker_Admins,cn=Users,dc=lab,dc=emc,dc=com
...
...
authc_mgmt -u Administrator -p Pa$$w0rd01 -e query-ldap-groups-for-user -D query-tenant=default -D query-domain=lab.emc.com -D user-name=bkupadmin
The query returns 5 records.
Group Name Full Dn Name
Domain Admins cn=Domain Admins,cn=Users,dc=lab,dc=emc,dc=com
NetWorker_Admins cn=NetWorker_Admins,cn=Users,dc=lab,dc=emc,dc=com
...
...