External Authority Resources can be created and managed from the NetWorker Management Console (NMC), NetWorker Web User Interface (NWUI), or authc scripts:
Log in to the NetWorker Management Console (NMC) with the default NetWorker Administrator account. Under the Setup tab-->User and Roles, there is a new option for External Authority.
Server Type | Select LDAP if the authentication server is a Linux/UNIX LDAP server, Active Directory if you are using a Microsoft Active Directory server. |
Authority Name | Provide a name for this external authentication authority. This name can be whatever you want it to be, it is only to differentiate between other authorities when multiple are configured. |
Provider Server Name | This field should contain the Fully Qualified Domain Name (FQDN) of your AD or LDAP server. |
Tenant | Tenants can be used in environments where more than one authentication method may be used, or when multiple authorities must be configured. By default, the "default" tenant is selected. The use of tenants alters your log-in method. Log in to the NMC with "domain\user" for the default tenant, or "tenant\domain\user" for other tenants. |
Domain | Specify your full domain name (excluding a hostname). Typically this is your base-Distinguished Name (DN) which is consisted of your Domain Component (DC) values of your domain. |
Port Number | For LDAP and AD integration, use port 389. For LDAP over SSL, use port 636. These ports are non-NetWorker default ports on the AD/LDAP server.
NOTE: Changing the port to 636 is not sufficient for configuring SSL. The CA certificate (and chain, if a chain is used) must be imported from the domain server to the authc server. See NetWorker: How to configure "AD over SSL" (LDAPS) from The NetWorker Web User Interface (NWUI).
|
User DN | Specify the Distinguished Name ![]() Specify the relative DN of the user account, or the full DN if overriding the value set in the Domain field. |
User DN Password | Specify the password of the user account specified. |
Group Object Class | The object class that identifies groups in the LDAP or AD hierarchy.
|
Group Search Path | This field can be left blank in which case authc is capable of querying the full domain. Permissions must be granted for NMC/ NetWorker server access before these users/groups can log in the NMC and manage the NetWorker server. Specify the relative path to the domain instead of full DN. |
Group Name Attribute | The attribute that identifies the group name; for example, cn. |
Group Member Attribute | Specifies the group membership of the user within a group.
|
User Object Class | The object class that identifies the users in the LDAP or AD hierarchy. For example, inetOrgPerson or user |
User Search Path | Like Group Search Path this field can be left blank in which case authc is capable of querying the full domain. Specify the relative path to the domain instead of full DN. |
User ID Attribute | The user ID that is associated with the user object in the LDAP or AD hierarchy.
|
authc_mgmt -u Administrator -p 'NetWorker_Admin_Pass' -e query-ldap-users -D query-tenant=tenant_name -D query-domain=domain_name authc_mgmt -u Administrator -p 'NetWorker_Admin_Pass' -e query-ldap-groups -D query-tenant=tenant_name -D query-domain=domain_name authc_mgmt -u Administrator -p 'NetWorker_Admin_Pass' -e query-ldap-groups-for-user -D query-tenant=tenant_name -D query-domain=domain_name -D user-name=external_username
[root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-users -D query-tenant=default -D query-domain=amer.lan The query returns 47 records. User Name Full Dn Name Administrator CN=Administrator,CN=Users,dc=amer,dc=lan ... bkupadmin CN=Backup Administrator,CN=Users,dc=amer,dc=lan [root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-groups -D query-tenant=default -D query-domain=amer.lan The query returns 72 records. Group Name Full Dn Name Administrators CN=Administrators,CN=Builtin,dc=amer,dc=lan ... NetWorker_Admins CN=NetWorker_Admins,OU=Groups,dc=amer,dc=lan [root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-groups-for-user -D query-tenant=default -D query-domain=amer.lan -D user-name=bkupadmin The query returns 1 records. Group Name Full Dn Name NetWorker_Admins CN=NetWorker_Admins,OU=Groups,dc=amer,dc=lan
6. When logged into the NMC as the default NetWorker Administrator account, open Setup-->Users and Roles-->NMC Roles. Open the properties of the "Console Application Administrators" role and enter the Distinguished Name (DN) of a AD/LDAP group (collected in step 5) in the external roles field. For users that require default NetWorker Administrator permissions, specify the AD/LDAP group DN in the "Console Security Administrators" role. For users /groups who do not need administrative rights to the NMC Console, add their full DN in the "Console User" - external roles.
nsraddadmin -e "OU=group,CN=you,CN=want,CN=to,CN=add,DC=domain,DC=local"
nsraddadmin -e "CN=NetWorker_Admins,OU=Groups,dc=amer,dc=lan"
authc_config -u Administrator -p NetWorker_Admin_Pass -e add-permission -D permission-name=FULL_CONTROL -D permission-group-dn="AD/LDAP_group_dn"For Example
[root@nsr ~]# authc_config -u Administrator -p '!Password1' -e add-permission -D permission-name=FULL_CONTROL -D permission-group-dn="CN=NetWorker_Admins,OU=Groups,dc=amer,dc=lan" Permission FULL_CONTROL is created successfully. [root@nsr ~]# authc_config -u Administrator -p '!Password1' -e find-all-permissions The query returns 2 records. Permission Id Permission Name Group DN Pattern Group DN 1 FULL_CONTROL ^cn=Administrators,cn=Groups.*$ 2 FULL_CONTROL CN=NetWorker_Admins,OU=Groups,dc=amer... [root@nsr ~]#