6 Configuring Settings
You can configure general Oracle Linux Automation Manager settings from the Administration section on the Settings page. These settings are grouped into the following categories:
-
Authentication: Provides general settings relating to authentication.
-
Jobs: Provides general settings relating to jobs.
-
Systems: Provides general settings relating to the Oracle Linux Automation Manager system.
-
User Interface: Provides general settings relating to the Oracle Linux Automation Manager user interface.
For more information about these fields, see the upstream documentation.
Configuring LDAP Authentication
Administrators can integrate Oracle Linux Automation Manager's authentication mechanism with one or more existing Lightweight Directory Access Protocol (LDAP) servers for centralized user management and better integration with existing identity management platforms, such as Active Directory.
To configure LDAP authentication:
- Log into Oracle Linux Automation Manager.
-
Expand the navigation menu, and click Settings.
The Settings page appears.
- In the Authentication panel on the Settings page, click LDAP Settings.
The LDAP Settings page is displayed with multiple tabs to allow you to enter configuration details for several LDAP servers. Configure the Default LDAP server by clicking the Edit button and then enter information into the fields displayed on the Default tab:
- LDAP Server URI
- Provide the URI to access your LDAP server in the format:
ldap://<host>:<port> where
<host> is the host name of the LDAP server and
<port> is the TCP port number that the LDAP server uses.
This field is required. For
example,
ldap://ldap1.example.com:389
If your LDAP server uses SSL, you can specify ldaps as the protocol within the scheme component of the URI. For example,ldaps://ldap1.example.com:636
- LDAP Bind DN
- Provide the Distinguished Name (DN) used to authenticate Oracle
Linux Automation Manager against the LDAP server using the Bind
operation. This field is required if your LDAP server does not allow
anonymous access. For
example:
uid=admin,cn=users,cn=accounts,dc=example,dc=com
- LDAP Bind Password
- Provide the Bind password for the Bind DN that you provided above. Note that the password is encrypted within the Oracle Linux Automation Manager database and is not displayed as you type it.
- LDAP Start TLS
- Either enable or disable Start TLS encryption for your LDAP server, depending on whether it is configured to support this function and valid SSL/TLS certificates are properly configured on the server. Note that you must not enable this option if you have set the protocol to ldaps within the URI Scheme component of the LDAP Server URI.
- LDAP User DN Template
- Optionally configure an LDAP User DN Template that can be used to
automatically authenticate against a particular DN for a user when a
user name is provided. The template can use the %(user)s
variable to automatically fill in the user name. For example:
uid=%(user),ou=Users,dc=example,dc=com
- LDAP Group Type
- Select an appropriate LDAP Group Type from the drop-down selector. This option defines how the LDAP server determines group membership for users when attempting to authorize them. LDAP Group Types map onto the ObjectClasses that are defined for your groups and may vary depending on your LDAP server. The option that you select here controls the filter used in the queries that are made to determine whether a user belongs to the LDAP Require Group or LDAP Deny Group.
- LDAP Require Group
- Optionally configure an LDAP Require Group by providing the DN of the group to which the users
must belong to be authenticated. This option prevents users from authenticating in
Oracle Linux Automation Manager unless they belong to a specific group of users. For
example, the following establishes a group called olamusers as being a required
group:
cn=olamusers,cn=groups,cn=accounts,dc=example,dc=com
- LDAP Deny Group
- Optionally configure an LDAP Deny Group by providing the DN of the group to which the users must
not belong to be authenticated. This option is the opposite of the LDAP Require
Group and prevents users from authenticating in Oracle Linux Automation Manager if
they belong to the group specified. For example, the following establishes a group
called engineers as being a denied
group:
cn=engineers,cn=groups,cn=accounts,dc=example,dc=com
- LDAP User Search
- The LDAP User Search field allows you to configure a search DN, scope
and filter to be used when determining whether a user is authorized to
authenticate in Oracle Linux Automation Manager. It is also used to
populate information about LDAP authenticated users in Oracle Linux
Automation Manager when they are viewed on the Users page under the
Access section of the navigation menu. For
example:
[ "cn=users,cn=accounts,dc=example,dc=com", "SCOPE_SUBTREE", "(uid=%(user)s)" ]
- LDAP Group Search
- The LDAP Group Search field allows you to configure a search DN, scope
and filter to be used when determining which groups a user belongs to.
This search query is also used to process the LDAP Organization and Team
mappings. For example:
[ "cn=groups,cn=accounts,dc=example,dc=com", "SCOPE_SUBTREE", "(objectClass=posixgroup)" ]
- LDAP User Attribute Map
- The LDAP User Attribute Map allows you to map LDAP attributes for a user entry to Oracle Linux
Automation Manager attributes that are used to populate information about the user
within the UI. The Oracle Linux Automation Manager attributes that can be mapped
follow:
- first_name
- last_name
You can map these attributes to the attribute entries for a user within your LDAP server. For example, the following describes an attribute map:{ "first_name": "givenName", "last_name": "sn", "email": "mail" }
- LDAP Group Type Parameters
- This setting controls the parameters used when performing a group lookup
on the LDAP server. There are two possible settings
here:
{ "member_attr": "member", "name_attr": "cn" }
Note that if you are using Active Directory themember_attr
attribute must not be set and should be excluded from the configuration. - LDAP User Flags By Group
- The LDAP User Flags by Group field allows you to map LDAP groups to
different roles within Oracle Linux Automation Manager. LDAP users
belonging to a particular group can be configured as
superusers
and users belonging to an alternate group can be configured asauditors
. All other users that are authenticated are given standard user permissions within Oracle Linux Automation Manager. For example:{ "is_superuser": [ "cn=olamadmins,cn=groups,cn=accounts,dc=example,dc=com" ], "is_system_auditor": [ "cn=olamauditors,cn=groups,cn=accounts,dc=example,dc=com" ] }
- LDAP Organization Map
- To configure Organization mappings for Oracle Linux Automation Manager
you need to provide the mappings between your LDAP groups and your
Organizations in Oracle Linux Automation Manager. Organizations are
presented as keys within the JSON formatted string that you provide
within this field. For each organization mapping you provide keys for
the group entries for users and administrators within the group. Each
map can have the following keys and values:
- admins:
-
None: organization admins are not updated based on LDAP values.
-
True: all users in LDAP are automatically added as admins of the organization.
-
False: no LDAP users are added as admins of the organization.
-
A string or list of strings that specify the group DN(s) to query for group members that should be assigned the admin role within the organization.
-
- remove_admins:
-
True: users that are not a member of the admins groups are removed from the organization’s admin users.
-
False: users that are members of the admins groups are added to the organization's admin users.
-
- users:
-
None: organization users are not updated based on LDAP values.
-
True: all users in LDAP are automatically added as users of the organization.
-
False: no LDAP users are added as users of the organization.
-
A string or list of strings that specify the group DN(s) to query for group members that should be assigned the user role within the organization.
-
- remove_users:
-
True: users that are not a member of the users groups are removed from the organization’s users.
-
False: users that are members of the users groups are added to the organization's users.
-
- admins:
- LDAP Team Map
- LDAP Team Maps are similar to LDAP Organization Maps and the primary key
in each entry maps onto the Team rather than the organizational unit.
Key options and values for each entry include:
- organization: an organization as defined either in your Organization mappings or within Oracle Linux Automation Manager, itself. If no entry is provided or the organization does not exist, an organization is created automatically.
- users:
-
None: team members are not automatically updated from LDAP.
-
True: all users in LDAP are automatically added as team members.
-
False: no LDAP users are added as team members.
-
A string or list of strings that specify the group DN(s) to query for group members that should be added as team members.
-
- remove:
-
True: users that are not a member of the users groups are removed from the team.
-
False: users that are members of the users groups are added to the team.
-
{ "LDAP Team 1": { "organization": "LDAP Group 1", "users": "cn=olamusers,cn=groups,cn=accounts,dc=example,dc=com", "remove": false }, "LDAP Support": { "organization": "LDAP Group 1", "users": "cn=support,cn=groups,cn=accounts,dc=example,dc=com", "remove": true } }