Use the hcmds64ldapuser command to register an LDAP search user account on the management server.
- Register an LDAP search user on the LDAP directory server.
- Verify the following information:
- DN and password of the LDAP search user
- Server identification name or the domain name for external
authentication servers of the LDAP directory server (for LDAP
authentication)
Specify the server identification name that was specified for the auth.server.name property in the exauth.properties file, or specify the domain name specified for auth.ldap.value-specified-for-auth.server.name.domain.name property in the exauth.properties file.
- Domain name of the RADIUS server (for RADIUS
authentication)
Specify the domain name specified for auth.radius.auth.server.name-property-value.domain.name in the exauth.properties file.
- Realm name of the Kerberos server (for Kerberos
authentication)
If you directly specify information about a Kerberos server in the exauth.properties file, specify the value specified for auth.kerberos.default_realm or auth.kerberos.auth.kerberos.realm_name-property-value.realm.
If you specify the settings in the exauth.properties file to use the DNS server to look up information about a Kerberos server, specify the realm name registered in the DNS server.
- In Windows:
-
Common-Component-installation-folder\bin\hcmds64ldapuser /set /dn DN-of-user-account-used-to-search-for-LDAP-user-info [/pass password-of-user-account-used-to-search-for-LDAP-user-info] /name name
- In Linux:
-
Common-Component-installation-directory/bin/hcmds64ldapuser -set -dn DN-of-user-account-used-to-search-for-LDAP-user-info [-pass password-of-user-account-used-to-search-for-LDAP-user-info] -name name
- DN-of-user-account-used-to-search-for-LDAP-user-info
Specify a DN by following the rules defined in RFC4514. For example, if the following characters are included in a DN, you must use a backslash (\) to escape each character.
Spaces # + , ; < = > \
- password-of-user-account-used-to-search-for-LDAP-user-info
This is case-sensitive and must exactly match the password registered in the LDAP directory server. If you execute the command without specifying the pass option, you will be prompted to enter a password.
- In the LDAP directory server, you can use double quotation marks (") for the DN and password. In the management server, however, you must register a user account whose DN and password do not include double quotation marks.
- If you are using Active Directory, you can use the dsquery command provided by Active Directory to verify the DN of a user. The following example shows how to use the dsquery command to verify the DN of the user administrator, and also shows the execution results:
dsquery user -name administrator
"CN=administrator,CN=admin,DC=example,DC=com"
- If the DN includes commas such as cn=administrator,cn=admin,dc=example,com, specify as follows:
In Windows:
hcmds64ldapuser /set /dn "cn=administrator,cn=admin,dc=example\,com" /pass administrator_pass /name ServerName
In Linux:
hcmds64ldapuser -set -dn "cn=administrator,cn=admin,dc=example\\,com" -pass administrator_pass -name ServerName