Administrator Guide > Configuring Axon > Retrieve Users from LDAP Directory to Axon
  

Retrieve Users from LDAP Directory to Axon

Axon can connect to the LDAP directory in your organization, retrieve users, assign them user profiles, and display them in the Axon interface. You do not need to manually create users. Axon automatically creates the users after it connects to the LDAP server.
You can configure Axon to retrieve users from a specific domain in the LDAP directory. You can also search for users that match certain criteria within the domain that you specify, and assign them specific user profiles. After the users from the LDAP directory are created, users can log in to Axon using their email addresses and passwords that are configured in the LDAP directory.

Example

You want to retrieve users from the LDAP directory and assign them user profiles according to the following search critera:
To specify the search criteria for LDAP users, refer to Configure Access to the LDAP Server.

LDAP Users and Axon Objects

Axon creates new users or modifies the existing users when it retrieves users from the LDAP directory.
Axon creates or modifies users based on the following criteria:

Configure the Linux System to Connect to an SSL-Enabled LDAP Server

If the LDAP server in your organization requires SSL authentication, you must create a truststore in your Linux system and import the SSL certificate to the truststore before you configure the LDAP server. Axon uses the SSL certificate from the keystore to access the LDAP server.
    1. Run the following command to create a keystore in the Linux system:
    <INSTALLATION_DIR>/axonhome/java/jre/bin/keytool -keystore clientkeystore -genkey -alias ldapClient
    2. Enter the password to access the keystore. Enter the password again to confirm.
    3. Enter the following details about your user profile to create the keystore:
    When the console prompts you to confirm your user profile details, type Yes.
    4. Enter the password to access the LDAP client. Type the password that you entered in Step 2.
    5. Run the following command to import the SSL certificate of the LDAP server to the keystore:
    <INSTALLATION_DIR>/axonhome/java/jre/bin/keytool -importkeystore -srckeystore /<full_path_to_SSL_certificate_file> -srcstoretype pkcs12 -destkeystore /<location_of_SSL_certificate>/clientkeystore -deststoretype JKS
    Note: The SSL certificate file must be in the PFX format.
    6. Enter the password of the destination keystore. This is the keystore that you created in Step 1. Type the password that you entered in Step 2.
    7. Enter the password of the source keystore. This is the password of the SSL certificate.
The page displays the status of the SSL file import.

Configure Access to the LDAP Server

Configure Axon to connect to the LDAP server in your organization and retrieve users based on the criteria that you specify.
You must have the SuperAdmin profile to perform the task. You must enter the following types of parameters:
    1. From the Axon toolbar, click the Admin Panel menu item under your user name.
    2. In the menu on the left, under the Customize & Configure category, click System Settings.
    3. In the Group list, select LDAP Server.
    4. Click Edit, and configure the following properties:
    Property
    Description
    Host
    Required. LDAP host name or IP address. If LDAP is configured with SSL authentication, enter the LDAP host name.
    Port
    Required. Port number of the LDAP server.
    Principal Username
    Required. Distinguished Name of the LDAP administrator.
    For example, enter the Distinguished Name (dn) value as cn=Administrator, cn=users.
    Password
    Required. Password to log in to the LDAP server.
    SSL Enabled
    Optional. Select this option if the LDAP server requires SSL authentication.
    Search Base
    Required. Point in the hierarchy of root objects from where Axon starts the user search.
    For example, enter the search base as cn=users, dc=PAADS, dc=com.
    User Search Filter
    Optional. Search criteria to retrieve users. Axon retrieves the users and assigns that profile that you specify in the Profile field.
    For example, enter the search filter (&(sAMAccountName=*)(objectclass=user)) to search for all entries that match the object class user.
    User First Name
    Required. Attribute of an LDAP user that represents the first name of the Axon user.
    User Last Name
    Required. Attribute of an LDAP user that represents the last name of the Axon user.
    Distinguished Name (dn)
    Required. Attribute that represents the Distinguished Name (dn) of an LDAP user.
    User Email
    Required. Attribute of an LDAP user that represents the email address of the Axon user.
    Function Name
    Optional. Attribute of an LDAP user that represents the function of the Axon user.
    Function Description
    Optional. Attribute of an LDAP user that represents the function description of the Axon user.
    Office Location
    Optional. Attribute of an LDAP user that represents the office location of the Axon user.
    Internal Mail Code
    Optional. Attribute of an LDAP user that represents the internal mail code of the Axon user.
    Office Telephone
    Optional. Attribute of an LDAP user that represents the office telephone number of the Axon user.
    Mobile Phone
    Optional. Attribute of an LDAP user that represents the mobile phone number of the Axon user.
    Org Unit Name
    Optional. Attribute of an LDAP user that represents the organizational unit name of the Axon user.
    Default Org Unit Ref
    Optional. Reference number of the default organization unit that Axon assigns to all users.
    Org Unit Status
    Required. Default status that Axon assigns to all the organization units retrieved from the LDAP directory.
    Profile
    Optional. Default user profile that Axon assigns to all the users retrieved from the search criteria that you specify in the User Search Filter field.
    Employment Type
    Required. Default employment type that Axon assigns to all the users retrieved from the LDAP directory.
    Lifecycle
    Required. Default lifecycle that Axon assigns to all the users retrieved from the LDAP directory.
    Axon Super Admin Email
    Required. Email address of the Axon SuperAdmin that administers the users retrieved from the LDAP directory.
    Note: You must change the default admin@informatica.com value and enter a relevant SuperAdmin email address.
    LDAP SSL Certificate File
    Path to the SSL certificate in Linux that authenticates the LDAP server. Enter this value if the LDAP server requires SSL authentication.
    Note: The SSL certificate file must be in the PEM format.
    Trust Store for LDAP Synchronization
    Path to the truststore in Linux that contains the SSL certificate. Enter this value if the LDAP server requires SSL authentication.
    Trust Store Password for LDAP Synchronization
    Password of the truststore in Linux that contains the SSL certificate. Enter this value if the LDAP server requires SSL authentication.
    WebUser Search Filter
    Search criteria to retrieve users that need to have the WebUser profile in Axon.
    For example, enter the search filter (&(sAMAccountName=*)(objectclass=user)) to search for all entries that match the object class user.
    Admin Search Filter
    Optional. Search criteria to retrieve users that need to have the Admin profile in Axon.
    SuperAdmin Search Filter
    Optional. Search criteria to retrieve users that need to have the SuperAdmin profile in Axon.
    Update Axon User Profiles with LDAP
    Optional. Select this option if you want to automatically update the existing user profiles in Axon to match the user privileges in the LDAP directory. The update happens when you manually run a synchronization job from the Admin Panel to retrieve users or when Axon uses a scheduled job to synchronize the users.
    5. Click Save.
    6. In the Linux environment, run the following command to clear the Axon cache and restart the necessary services:
    sh <INSTALLATION_DIR>/axonhome/third-party-app/scripts/paramsync
    When you run the paramsync script, Axon restarts the HTTPD, Memcached, and email notification services.
Note: When you clear the cache and restart the Axon services, the Axon web interface might be disrupted for some users that are logged into Axon. Informatica recommends that you update the cache after you save your changes in all the System Settings pages. Additionally, perform this action during a maintenance period when very few users are using Axon.

Retrieve Users from the LDAP Directory

After you configure Axon to connect to the LDAP server, you must initiate the process to retrieve the users from the LDAP directory and create People objects in Axon.
You can manually retrieve the users from the LDAP directory, or you can create a job that automatically retrieves the users based on the schedule that you specify.

Manually retrieve users from the LDAP directory

You can run a synchronization job from the Admin Panel to retrieve users from the LDAP directory.
  1. 1. From the Axon toolbar, click the Admin Panel menu item under your user name.
  2. 2. In the menu on the left of the page, under the Operational Management category, click Administrator's Panel.
  3. 3. Select Synchronize With LDAP Server on the left panel, and then click the Run button.
The page displays the status of the synchronization job.

Schedule a job to retrieve users from the LDAP directory

You can create a time-based job scheduler to retrieve users from the LDAP directory. To retrieve users according to schedule, Axon uses the following files:
At the time scheduled in the axon.jobs file, Axon runs the sync_ldap.sh script and retrieves the users from the LDAP directory.
Perform the following tasks to define the job schedule:
  1. 1. Go to the <INSTALLATION_DIR>/axonhome/axon_scheduler directory and open the axon.jobs file.
  2. 2. Configure the following properties to schedule the job:
  3. Property
    Description
    name
    Job name
    cmd
    Enter the following path to the script file: <INSTALLATION_DIR>/axonhome/axon_ldap_synchronizer/scripts/sync_ldap.sh
    time
    Specify the daily, weekly, or monthly email schedule. The six asterisks * * * * * * represent <second> <minute> <hour> <date> <month> <day_of_the_week>.
    For example, to run the job at 2.00 p.m. everyday, enter the following value: 0 0 14 * * *
    onError
    Enter Stop.
  4. 3. Save your changes.
  5. 4. If you make changes to the axon.jobs file, you must reload the Jobber schedule settings. Run the following command to reload the settings:
  6. <INSTALLATION_DIR>/axonhome/third-party-app/scripts/jobber reload
Note: You must have the write permission in the <INSTALLATION_DIR> directory for the Jobber utility to run the script file.

Check Status of Users Retrieved

Axon uses the bulk upload service to create or update the user profiles that it retrieves from the LDAP directory.
To see the status of the users that Axon creates or modifies, click the My Account menu item under your user name, and select My Jobs. If you are the Super Admin recorded in the Axon Super Admin Email field of the Admin Panel, you can view the status in the My Jobs section.