Description:
If you have more than one User Directory in place which all need to be made available as SSO User_DIR, it might be desirable to propagate the various directories as a single DSA, in order to avoid the need to implement separate AuthHost infrastructures for each of them which would be required if they were integrated as individual User_DIRs.
Solution:
There are two possibilities to approach this requirement:
<Please see attached file for image>
set dsa AcmeCorp={ prefix = <DC com><DC AcmeCorp> dsa-name = <DC com><DC AcmeCorp><cn AcmeCorp> dsa-password = "secret" address = tcp "SSO81Server" port 14389 disp-psap = DISP cmip-psap = CMIP snmp-port = 14389 console-port = 14379 ssld-port = 1112 auth-levels = anonymous, clear-password trust-flags = allow-check-password, trust-conveyed-originator};
# logging and tracingsource "../logging/default.dxc"; # schemaclear schema;source "../schema/PolSrv.dxg"; # knowledgeclear dsas;source "../knowledge/PS_Servers.dxg"; # operational settingssource "../settings/AcmeCorp.dxc"; # service limitssource "../limits/default.dxc"; # access controlsclear access;source "../access/PS_Access.dxc"; # multiwrite DISP recoveryset multi-write-disp-recovery = false;
# directory information baseset alias-integrity = true;set limit-list = false;set limit-search = false;set eis-count-attr = dxEntryCount; # distribution controlsset multi-casting = true;set always-chain-down = true;set multi-chaining = true; # security controlsset min-auth = clear-password;set allow-binds = true;set access-controls = false;set ssl-auth-bypass-entry-check = false; # general controlsset op-attrs = true;
set always-chain-down = true;set multi-chaining = true
# Computer Associates DXserver/config/knowledge# Router_AD1.dxc# Routes to Active Directory on ACMECORP domainset dsa Router_AD1 ={prefix = <dc "com"><dc "AcmeCorp"><dc "dom1">native-prefix = <dc "com"><dc "AcmeCorp">dsa-name = <o AD_ACMECORP><cn Router_AD1>dsa-password = "secret"ldap-dsa-name = <dc "com"><dc "AcmeCorp"><cn "users"><cn "Administrator">ldap-dsa-password = "secret"address = tcp "Dom1Controller" port 389auth-levels = clear-password, ssl-authdsa-flags = read-onlytrust-flags = allow-check-password, no-server-credentialslink-flags = dsp-ldap, ms-ad};set transparent-routing = true ;
# Computer Associates DXserver/config/knowledge# Router_AD2.dxc# Routes to Active Directory on SUBDOM domainset dsa Router_AD2 ={prefix = <dc "com"><dc "AcmeCorp"><dc "dom2">native-prefix = <dc "com"><dc "AcmeCorp"><dc subdom>dsa-name = <o AD_ACMECORP><cn Router_AD2>dsa-password = "secret"ldap-dsa-name = <dc "com"><dc "AcmeCorp"><dc subdom><cn "users"><cn "Administrator">ldap-dsa-password = "secret"address = tcp "Dom2Controller" port 389auth-levels = clear-password, ssl-authdsa-flags = read-onlytrust-flags = allow-check-password, no-server-credentialslink-flags = dsp-ldap, ms-ad};set transparent-routing = true ;
# Computer Associates DXserver/config/knowledge/## PS_Servers.dxg written by eTrust PS Installation## Description:# Use this file to group and share DSA knowledge.# PS DSA's source this file# from its initialization file.#source "../knowledge/PS_AcmeCorp.dxc";source "../knowledge/PSTD_AcmeCorp.dxc";source "../knowledge/Router_AD1.dxc";source "../knowledge/Router_AD2.dxc";source "../knowledge/AcmeCorp.dxc ";
...set group = {name = "AD_Group"users = <dc "com"><dc "AcmeCorp"><dc dom1><cn "users"><cn "Administrator">, <dc "com"><dc "AcmeCorp"><dc dom2><cn "users"><cn "Administrator">};set admin-user = {group = "AD_Group"subtree = <dc "com"><dc "AcmeCorp">};set admin-user = {group = "AD_Group"subtree = <o "PS"><ou "LoginInfos"><ou ad-AcmeCorp>};...
<Please see attached file for image>
<Please see attached file for image>
<Please see attached file for image>
# Computer Associates DXserver/config/knowledge # Router_AD.dxc # Routes to Active Directory on ACMECORP and SUBDOM domain set dsa Router_AD = { prefix = <dc "com"><dc "AcmeCorp"> native-prefix = <dc "com"><dc "AcmeCorp"> dsa-name = <o AD_ACMECORP><cn Router_AD> dsa-password = "secret" address = tcp "GCDomController" port 3268 auth-levels = clear-password, ssl-auth dsa-flags = read-only trust-flags = allow-check-password, no-server-credentials link-flags = dsp-ldap, ms-ad }; set transparent-routing = true ;Since the Child Domain is transitively trusting the parent domain no changes are necessary to the CA Directory Access Controls in order to allow the DXlink accessing the Active Directory Child Domain, provided that the admin-user has been authorised to the Parent Domain as described in the SSO Implementation Guide.
<Please see attached file for image>
<Please see attached file for image>