Otds-Installation and Administration Guide 21.3
Otds-Installation and Administration Guide 21.3
OTDS210300-IWC-EN-06
OpenText™ Directory Services
Installation and Administration Guide
OTDS210300-IWC-EN-06
Rev.: 2021-Aug-27
This documentation has been created for OpenText™ Directory Services CE 21.3.
It is also valid for subsequent software releases unless OpenText has made newer documentation available with the product,
on an OpenText website, or by any other means.
Tel: +1-519-888-7111
Toll Free Canada/USA: 1-800-499-6544 International: +800-4996-5440
Fax: +1-519-888-0677
Support: https://support.opentext.com
For more information, visit https://www.opentext.com
One or more patents may cover this product. For more information, please visit https://www.opentext.com/patents.
Disclaimer
Every effort has been made to ensure the accuracy of the features and techniques presented in this publication. However,
Open Text Corporation and its affiliates accept no responsibility and offer no warranty whether expressed or implied, for the
accuracy of this publication.
Table of Contents
1 Installing OpenText Directory Services Version 21 ............. 13
1.1 Installation prerequisites .................................................................. 13
1.1.1 Configuring installation prerequisites ................................................ 14
1.1.1.1 Configuring Tomcat for OTDS .......................................................... 14
1.1.1.1.1 If running OTDS on Tomcat with the Java Security Manager
enabled .......................................................................................... 16
1.1.1.2 Configuring WebSphere for OTDS ................................................... 17
1.1.1.3 Securing your server using SSL ....................................................... 18
1.2 Importing data from previous versions of Directory Services ............... 19
1.2.1 Exporting your data from OTDS 10.2.1 ............................................. 21
1.2.2 Exporting your data from OTDS 10.5 ................................................ 23
1.2.3 Exporting your data from OTDS 16 ................................................... 24
1.2.4 Exporting your data from another installation of OTDS 20 .................. 26
1.2.5 Importing your data to OTDS 21 ....................................................... 27
1.3 Install files for Directory Services ...................................................... 28
1.4 Installing Directory Services on Windows .......................................... 29
1.4.1 Installing OTDS on Windows from the UI .......................................... 29
1.4.1.1 Installing OTDS as a stand-alone or primary server ........................... 29
1.4.1.2 Installing OTDS as a replication server ............................................. 33
1.4.2 Installing OTDS on Windows from the command line ......................... 37
1.4.2.1 Installing OTDS as a stand-alone or primary server without
migration ........................................................................................ 39
1.4.2.2 Installing OTDS as a stand-alone or primary server with migration ..... 39
1.4.2.3 Installing OTDS as a replication server ............................................. 40
1.5 Installing Directory Services on UNIX or Linux ................................... 40
1.5.1 Installing OTDS on UNIX or Linux interactively .................................. 42
1.5.1.1 Installing OTDS as a stand-alone or primary server ........................... 42
1.5.1.2 Installing OTDS as a replication server ............................................. 46
1.5.2 Installing OTDS on UNIX or Linux non-interactively ........................... 50
1.5.2.1 Installing OTDS on UNIX or Linux non-interactively ........................... 51
1.6 Verifying your installation ................................................................. 51
1.7 Migrating RCS 10.2.1 to OTDS 21 .................................................... 52
1.8 Uninstalling Directory Services ......................................................... 53
2.3.1 If you imported data from OTDS 16.x or 20.x to 21.3.x ....................... 73
2.3.2 Setting up an OTDS server for synchronization and authentication ..... 74
2.4 The OTDS user interface ................................................................. 75
9.4 Manually deleting users and groups from the recycle bin ................. 279
Note: This guide describes Directory Services (OTDS) versions 21.3.x, and
includes descriptions of some features only available if you have installed
OTDS 21.3.x. For information about these features, see “Features added to
Directory Services Version 20” on page 57.
Note: For the minimum versions required see the Release Notes. For more
information, see OpenText Directory Services - Installation and Administration
Guide (OTDS-IWC) and the OTDS Release Notes on OpenText My Support
(https://knowledge.opentext.com/go/OTDS), and then select Documentation.
• Java 64-bit. You can download this from java.com, see “References to external
websites” on page 384. For information about configuring Java options, see
“Configuring Tomcat for OTDS” on page 14.
• A web application server. OTDS supports the following web application servers:
– Apache Tomcat 64-bit. You can download this from “tomcat.apache.org”, see
“References to external websites” on page 384. For more information, see
“Configuring Tomcat for OTDS” on page 14.
– IBM WebSphere 64-bit. You can get information from “ibm.com”, see
“References to external websites” on page 384. For more information, see
“Configuring WebSphere for OTDS” on page 17.
Caution
Do not use root to install OTDS. It can create security vulnerabilities
when running the application server using a root, or equivalent, user.
• Have full permissions to the destination directories for the install as well as
to the /etc/opentext directory for the registry.
• Have write access to the path where Tomcat is installed.
Because the user who runs Tomcat or WebSphere needs read access to all the
files in the OTDS installation directory, you need to designate one user to
both install OTDS and run Tomcat or WebSphere.
• Have a PATH statement that includes the bin directory for Java.
3. To allow for a more secure deployment, OTDS will no longer run OpenDJ
internally. This separation allows you to choose to run OpenDJ under one
account, while OTDS under Tomcat runs under a more restricted account that
has more limited rights and permissions.
• On Windows, an OpenDJ Server service will be created. You can now choose
to run OpenDJ under a LocalSystem account, while Tomcat runs under a
LocalService account.
– /<otds_install_dir>/opendj/bin/start-ds
– /<otds_install_dir>/opendj/bin/stop-ds
1. Ensure that the userid running Tomcat has read access to the complete OTDS
installation directory.
2. If you are installing Tomcat on UNIX or Linux, you could create an installation
user <otuser> and the group <otgroup> to be used with Tomcat. Sign in as the
<otuser> to begin the install.
Caution
Do not use the root user to install Tomcat on UNIX or Linux. It can
create security vulnerabilities when running the server using a root, or
equivalent, user.
Because the user who runs Tomcat or WebSphere needs read access to
all the files in the OTDS installation directory, you could designate one
user to both install OTDS and run Tomcat or WebSphere.
Caution
If you are installing on Solaris, UNIX, or Linux, do not use a package
installer to install Tomcat. Some package installers split the installation
of Tomcat across multiple directories. The OTDS installer assumes that
Tomcat is installed in a single directory.
3. Download Apache Tomcat and follow the Tomcat instructions to install it. For
information, see “References to external websites” on page 384.
4. On Windows, start the Monitor Apache Tomcat tool from All Programs -->
Apache Tomcat --> Monitor Tomcat.
Tip: You can also start the Monitor Apache Tomcat tool by starting the
<Tomcat_installdir>\bin\tomcat<version>w.exe executable.
Important
Do not use the -d64 option if you are using Java version 11 or higher. For
more information, see What is the problem if I see the error
“Unrecognized option: -d64” in my catalina.out log file? on page 393.
9. Restart Tomcat.
1.1.1.1.1 If running OTDS on Tomcat with the Java Security Manager enabled
You might choose to run OTDS on Tomcat with the Java Security Manager enabled.
If this describes your environment, you need to add the following initial security
policy to catalina.policy:
// OTDS
grant codeBase "file:<OTDSINSTALLDIR>/-" {
permission java.io.FilePermission
"${java.home}${file.separator}lib${file.separator}*", "read";
permission java.io.FilePermission
"${java.home}${file.separator}conf${file.separator}*", "read";
permission java.io.FilePermission
"${catalina.base}${file.separator}logs", "read";
permission java.io.FilePermission
"${catalina.base}${file.separator}logs${file.separator}-", "read, write,
delete";
permission java.io.FilePermission
"${java.io.tmpdir}", "read";
permission java.io.FilePermission
"${java.io.tmpdir}${file.separator}-", "read, write, delete";
permission java.io.FilePermission
"<OTDSINSTALLDIR>/otdsws/WEB-INF/classes/-", "read";
permission java.io.FilePermission
"<OTDSINSTALLDIR>/otdsws/WEB-INF/lib/-", "read";
1. Ensure that the userid running WebSphere has read and write access to the
complete OTDS installation directory.
2. Download WebSphere and follow the WebSphere instructions to install it, see
“References to external websites” on page 384.
• OTDS Classes:
Classpath:
${OTDS_INSTALL_ROOT}/otdsws/WEB-INF/lib
${OTDS_INSTALL_ROOT}/otdsws/WEB-INF/classes
5. OpenText recommends that you specify the JVM heap size to 1 GB or more. The
value you enter for the JVM heap size should be proportional to the number of
users OTDS will manage. OpenText recommends you enter a minimum value
as follows:
• If your number of users is 25,000 users or less, you should enter a minimum
value of 1024 MB
• If your number of users is 25,000 to 50,000 users, you should enter a
minimum value of 2048 MB
• If your number of users is 50,000 to 100,000+ users, you should enter a
minimum value of 4096 MB
For detailed information on enabling SSL on Tomcat, see “SSL Configuration How-
to” in “References to external websites” on page 384.
In the event that you need to perform a manual action for your OTDS installation,
for example if you need to move your OTDS installation to another machine, you
need to perform an export of all OTDS information from your existing installation
and then perform an import of all OTDS information to your new installation.
If your OTDS environment contains replicas, and you are upgrading to version
16.4.1 or higher, see “Upgrading an OTDS environment with one or more replicas”
on page 21 before beginning the upgrade process.
There are different methods that you need to follow depending on your existing
version of OTDS. This section lists the procedures you should follow.
Note: If you need to move your OTDS data from one machine to
another, you can perform a manual export of your OTDS data as
follows:
After you have collected the necessary files, move them to the
machine on which you intend to install your new version of OTDS,
and then follow the instructions during the installation to import
your OTDS data.
If you choose to switch from the RCS version to the stand-alone version of Content
Web Services, you must manually modify the Authentication Service WSDL box in
the Content Server resource's connection parameters. For more information about
the modification you need to make, see Authentication Service WSDL in the
“Connection parameters for Content Server resources” on page 201.
Note: This procedure requires that you know the OpenDS password. The
userid is “cn=Directory Manager” and the password, referred to as the
“bindPassword” below, is usually the password that was provided for the
[email protected] account at installation time.
If you do not have the OpenDS password, for whatever reason, you will need
to change it. For more information, see How do I reset the bindPassword, the
password required by the “export-ldif” command? on page 408.
1. Sign in to your OTDS 10.2.1 system. You will need to make copies of the
following three files to a temporary directory:
c. Generate a copy of the otds-10.2.1.ldif file. This file must be generated from
the system on which you run the Runtime and Core Services 10.2.1
program. This is an LDIF export of the entire OpenDS user database. You
can use any Lightweight Directory Access Protocol (LDAP) editor,
provided you ensure that the editor you choose will not break lines after a
certain number of characters. Do one of the following:
2. You have now prepared the three files necessary to begin the import of your
OTDS 10.2.1 data to your new OTDS 21 system. Ensure that these three files are
available on the system on which you will be installing Directory Services 21.
3. Follow the instructions found in the OpenText Directory Services Data Import
page of the installation. For more information, see “Installing Directory Services
on Windows” on page 29 or “Installing Directory Services on UNIX or Linux”
on page 40.
Tip: Installing OTDS 21 will also install OpenDJ, the replacement for
OpenDS. If you need to start the OpenDJ Control Panel, run the control-
panel.bat script from the <OTDS_installdir>\opendj\bat folder.
If you installed Directory Services to the default location, the control-
panel.bat is found on Windows at C:\OTDS\opendj\bat and on UNIX
or Linux at /usr/local/OTDS/opendj/bin.
Tip: You have the option to do an upgrade of OTDS 10.5 to 21 during the
installation of Version 21. However, you can choose to follow the procedure
detailed here if you want to perform a manual export of your 10.5 data to your
new Version 21 installation.
To make use of the automatic upgrade available when moving from a 10.5 to a
21 system, see “Installing OTDS as a stand-alone or primary server”
on page 29.
Note: This procedure requires that you know the OpenDJ password. The
userid is “cn=Directory Manager” and the password, referred to as the
“bindPassword” below, is usually the password that was provided for the
[email protected] account at installation time.
If you do not have the OpenDJ password, for whatever reason, you will need
to change it. For more information, see How do I reset the bindPassword, the
password required by the “export-ldif” command? on page 408.
1. Sign in to your OTDS 10.5 system. You will need to make copies of the
following two files to a temporary directory:
d. Click OK.
• To use the command line to export the data:
1. Open a command window while signed in as an administrator and
type the following command:
export-ldif "--ldifFile" "otds-10.5.ldif" "--backendID" "userRoot"
"--appendToLDIF" "--hostName" "localhost" "--port" "4440" "--bindDN"
"cn=Directory Manager" "--bindPassword" "********" "--trustAll" "--
noPropertiesFile"
2. You have now prepared the two files necessary to begin the import of your
OTDS 10.5 data to your new OTDS 21 system. Ensure that these two files are
available on the system on which you will be installing OpenText Directory
Services 21.
3. Follow the instructions found in the OpenText Directory Services Data Import
page of the installation. For more information, see “Installing Directory Services
on Windows” on page 29 or “Installing Directory Services on UNIX or Linux”
on page 40.
Tip: If you need to start the OpenDJ Control Panel, run the control-
panel.bat script from the <OTDS_installdir>opendj\bat folder.
If you installed Directory Services to the default location, the control-
panel.bat is found on Windows at C:\OTDS\opendj\bat and on UNIX
or Linux at /usr/local/OTDS/opendj/bin.
Note: This procedure requires that you know the OpenDJ password. The
userid is “cn=Directory Manager” and the password, referred to as the
“bindPassword” below, is usually the password that was provided for the
[email protected] account at installation time.
If you do not have the OpenDJ password, for whatever reason, you will need
to change it. For more information, see How do I reset the bindPassword, the
password required by the “export-ldif” command? on page 408.
1. Sign in to your existing OTDS 16 system. You will need to make copies of three
files to a temporary directory:
2. You have now prepared the three files necessary to begin the import of your
OTDS 16 data to your new OTDS 21 system. Ensure that these two files are
available on the system on which you will be installing Directory Services 21.
3. Follow the instructions found in the OpenText Directory Services Data Import
page of the installation. For more information, see “Installing Directory Services
on Windows” on page 29 or “Installing Directory Services on UNIX or Linux”
on page 40.
Tip: If you need to start the OpenDJ Control Panel, run the control-
panel.bat script from the <OTDS_installdir>opendj\bat folder.
Note: This procedure requires that you know the OpenDJ password. The
userid is “cn=Directory Manager” and the password, referred to as the
“bindPassword” below, is usually the password that was provided for the
[email protected] account at installation time.
If you do not have the OpenDJ password, for whatever reason, you will need
to change it. For more information, see How do I reset the bindPassword, the
password required by the “export-ldif” command? on page 408.
1. Sign in to your existing OTDS 20 system. You will need to make copies of three
files to a temporary directory:
2. You have now prepared the three files necessary to begin the import of your
OTDS data from your previous version 20 system to your new OTDS 21 system.
Ensure that these two files are available on the system on which you will be
installing Directory Services 21.
3. Follow the instructions found in the OpenText Directory Services Data Import
page of the installation. For more information, see “Installing Directory Services
on Windows” on page 29 or “Installing Directory Services on UNIX or Linux”
on page 40.
Tip: If you need to start the OpenDJ Control Panel, run the control-
panel.bat script from the <OTDS_installdir>opendj\bat folder.
If you installed Directory Services to the default location, the control-
panel.bat is found on Windows at C:\OTDS\opendj\bat and on UNIX
or Linux at /usr/local/OTDS/opendj/bin.
1. During the installation of your OTDS master server, follow the instructions
found in the Installation Type and OpenText Directory Services Data Import
pages of the installation. For more information, see “Installing Directory
Services on Windows” on page 29 or “Installing Directory Services on UNIX or
Linux” on page 40.
2. Optional After you have completed the installation of Directory Services 21:
a. And if you have a Content Server integrated with RCS 10.2.1, proceed to
“Migrating RCS 10.2.1 to OTDS 21” on page 52.
b. And if you imported data from version 16.x or from another version of 20,
follow the steps found in “If you imported data from OTDS 16.x or 20.x to
21.3.x” on page 73.
c. And if you imported data from one host to a new host, you must update
the value in the Synchronization Master Host box to reference your new
host name.
• If the OTDS installer detects a 10.5, 16.x, or 20 version of OTDS installed on the
system, you can choose to automatically upgrade that version to version 21. If
you choose this option, all existing data and configuration will be preserved.
• If you intend to install only one instance of OTDS, a stand-alone server, then that
server, by default, is designated the synchronization master server. As such, do not
choose a replication server installation. If you are installing on Windows, see “To
install Directory Services as a stand-alone or primary server:“ on page 29. If you
are installing on UNIX or Linux, see “To install OTDS as a stand-alone or
primary server:“ on page 42.
• However, if you intend to install multiple instances of OTDS on multiple
machines, your first installation, or primary server, will function as the
synchronization master server. For your first installation, do not choose a
replication server installation. For each subsequent installation, however, choose
a replication server installation. If you are installing on Windows, see “To install
OTDS as a replication server:“ on page 33. If you are installing on UNIX or
Linux, see “To install OTDS as a replication server:“ on page 46.
Default installa- Directory Services will install to: C:\OTDS\. OpenDJ will install to: C:\OTDS\opendj.
tion paths:
• and you want to install using the UI, follow the UI instructions in “To install
Directory Services as a stand-alone or primary server:“ on page 29.
• and you want to install using the command line, follow the command line
instructions in “Installing OTDS as a stand-alone or primary server without
migration” on page 39.
• and you want to install using the UI, follow the UI instructions in “To install
OTDS as a replication server:“ on page 33.
• and you want to install using the command line, follow the command line
instructions in “Installing OTDS as a replication server” on page 40.
If you are installing Directory Services version 21 on the same machine on which
you have a previous version of OTDS installed: ensure you have followed
“Importing data from previous versions of Directory Services” on page 19 and then
follow the UI instructions in “To install Directory Services as a stand-alone or
primary server:“ on page 29.
3. Right click the msi installation file and select Run as Administrator to start the
installation program.
Tip: If you want to run the installer and create an installation log file, you
can also choose to open a command prompt window as administrator, for
more information see “References to external websites” on page 384. Run
the OTDS-2130-WIN.msi installer from that administrator command
prompt window by typing the command:
msiexec.exe /i OTDS-2130-WIN.msi /l*v otds-installer.log
5. If you have a previous version of OTDS installed on this system you will see the
Installation Type window. Do one of the following:
• If your previous version of OTDS on this system is version 10.5, you can
choose to upgrade your existing 10.5 version to the 21 level, or install a
second version to this system such that you have both 10.5 and 21 installed
on this system:
– If you choose to upgrade your 10.5 version, you will migrate your
existing 10.5 data to the new 21 installation. Select Upgrade from version
10.5.0. When you click Next you will be taken to Step 15.
– If you choose to install this new version alongside your existing 10.5
version, select Installation of version 21. When you click Next you will
be taken to Step 6.
By default, following this installation, OTDS will install to the C:\OTDS
directory.
• If your previous version of OTDS on this system is version 16 or higher,
your settings from that previous installation will be used during the
installation of 21. After you click Next you will be taken to Step 15.
By default, following this installation, OTDS will install to the C:\OTDS
directory.
6. In the License Agreement window, read the license agreement in full. To accept
it, select I accept, and then click Next.
7. In the Destination Folder window, do one of the following, and then click Next:
• Accept the default installation folder for Directory Services and OpenDJ.
• Type a new, valid, path.
• Click the ... button to browse your computer to select the installation folder.
10. In the Java Virtual Machine window, if the Directory Services installer has
found the Java path on your computer, the Java path will appear in the Path
box. Do one of the following, and then click Next:
11. If you selected Tomcat as your application server, in the Apache Tomcat
Directory window:
a. You need to specify either the service name for Tomcat or the installed path
for Tomcat.
If the Directory Services installer has found the Tomcat path on your
computer, the service name and Path boxes will be filled. You can choose
to edit either the service name or the path.
Important
If the OTDS installer has not found Tomcat on your system, OpenText
recommends that you specify the service name for Tomcat.
If you want to specify, or edit, the installed path for Tomcat, you must
restart Tomcat before clicking Next.
b. Click Next.
a. In the Hostname box, type the fully qualified hostname for the installation
of OTDS and OpenDJ.
b. Directory Services provides a port number by default for both the LDAP
administration port, 4440, and LDAP communication port, 389, boxes.
a. The OTDS Administrator User Name box cannot be edited. The value
“[email protected]” is the default for this box.
b. In the Password box, type a password for the [email protected] user.
You can reset the “[email protected]” password from the OTDS web
client. See “Resetting a user password” on page 252 for more information.
c. In the Confirm password box, re-type the password exactly.
d. Click Next.
Note: If you do not apply a strong password, the OTDS installer will
warn you that you have applied a weak password and you are
advised to return and type a stronger password.
A strong password must contain at least eight characters. Among
those eight characters, you must have one of each of the following:
14. In the OpenText Directory Services Data Import window, if you will not be
importing any data, select No import, and then click Next. Otherwise, do the
following:
a. Optional If you want to import your 10.2.1 data to your new 21 installation,
select Import Data from OpenText Directory Services 10.2.1. Make sure
that the OTDS 10.2.1 RCS database is running and can be contacted.
If you want to import your 10.5 data to your new 21 installation, select
Import Data from OpenText Directory Services 10.5.
If you want to import your data from OTDS 16 or higher to this new 21
installation, select Import Data from OpenText Directory Services 16 or
higher.
b. In the Path to directory containing Import Data files box:
• If you are importing from 10.2.1, type the fully qualified directory
containing your 10.2.1 data files: boot.properties, config.ldif, and
otds-10.2.1.ldif. You can also use the ... button to browse to select
the path. These are the files that you prepared in “Exporting your data
from OTDS 10.2.1” on page 21.
• If you are importing from 10.5, type the fully qualified directory
containing your 10.5 data files: config.ldif and otds-10.5.ldif. You
can also use the ... button to browse to select the path. These are the files
that you prepared in “Exporting your data from OTDS 10.5” on page 23.
• If you are importing from 16 or higher, type the fully qualified directory
containing your data files. These are the files that you prepared in
“Exporting your data from OTDS 16” on page 24 or “Exporting your
data from another installation of OTDS 20” on page 26. You can also use
the ... button to browse to select the path.
If you followed the example during the export, the path is C:\temp.
c. Click Next.
Tip: If you see an error message indicating that the installer cannot write
to certain directories, it may be because you did not run the installer as
administrator. See Step 3 for information about how to run the installer as
administrator.
Note: “OpenText Directory Services 21” will appear in the Programs and
Features pane of the Windows Control Panel.
3. Right click the msi installation file and select Run as Administrator to start the
installation program.
Tip: If you want to run the installer and create an installation log file, you
can also choose to open a command prompt window as administrator, for
more information see “References to external websites” on page 384. Run
the OTDS-2130-WIN.msi installer from that administrator command
prompt window by typing the command:
msiexec.exe /i OTDS-2130-WIN.msi /l*v otds-installer.log
5. If you have a previous version of OTDS installed on this system, you will see
the Installation Type window. Do one of the following:
• If your previous version of OTDS on this system is version 10.5, you can
choose to upgrade your existing 10.5 version to the 21 level, or install a
second version to this system such that you have both 10.5 and 16.6 installed
on this system:
– If you choose to upgrade your 10.5 version, you will migrate your
existing 10.5.x data to the new 21 installation. Select Upgrade from
version 10.5.0. When you click Next you will be taken to Step 15.
– If you choose to install this new version alongside your existing 10.5
version, select Installation of version 16 or higher. When you click Next
you will be taken to Step 6.
By default, following this installation, OTDS will install to the C:\OTDS
directory.
• If your previous version of OTDS on this system is version 16, your settings
from that previous installation will be used during the installation of 21.
After you click Next you will be taken to Step 15.
6. In the License Agreement window, read the license agreement in full. To accept
the license, select I accept, and then click Next.
7. In the Destination Folder window, do one of the following, and then click Next:
• Accept the default installation folder for Directory Services and OpenDJ.
• Type a new, valid, path.
• Click the ... button to browse your computer to select the installation folder.
10. In the Java Virtual Machine window, if the Directory Services installer has
found the Java path on your computer, the Java path will appear in the Path
box.
Do one of the following, and then click Next:
11. If you chose Apache Tomcat as your application server, in the Apache Tomcat
Directory window:
a. You need to specify either the service name for Tomcat or the installed path
for Tomcat.
If the Directory Services installer has found the Tomcat path on your
computer, the service name and Path boxes will be filled. You can choose
to edit either the service name or the path.
Important
If the OTDS installer has not found Tomcat on your system, OpenText
recommends that you specify the service name for Tomcat.
If you want to specify, or edit, the installed path for Tomcat, you must
restart Tomcat before clicking Next.
b. Click Next.
a. In the Hostname box, type the fully qualified hostname for the installation
of OTDS and OpenDJ.
b. Directory Services provides a port number by default for both the LDAP
administration port, 4440, and LDAP communication port, 389, boxes.
The LDAP administration port number is used for administration traffic.
The LDAP communication port is used by OTDS for communication with
the LDAP directory server.
Either accept these default port numbers or enter your preferred port
numbers
c. Click Next.
a. In the Server name box, type the fully qualified domain name of the
machine that hosts the OTDS stand-alone, or primary, server installation.
b. In the LDAP administration port box, type the LDAP administration port
number of the machine that hosts the OTDS stand-alone, or primary, server
installation. If, during the installation of the primary OTDS, you kept the
default value, that value is 4440.
Note: The password entered must be the password used when you
installed OTDS.
f. Click Next.
Tip: If you see an error message indicating that the installer cannot write
to certain directories, it may be because you did not run the installer as
administrator. See Step 3 for information about how to run the installer as
administrator.
Note: “OpenText Directory Services 21” will appear in the Programs and
Features pane of the Windows Control Panel.
Common parameters
/i OTDS-2130-WIN.msi
The name of the OTDS installer. This parameter is required.
/qb
The parameter that directs that a silent install will be performed. This parameter
is required.
/l*v otds-installer.log
Allows you to optionally set up a log file for the installation, and names that log
file: otds-installer.log. This parameter is optional but recommended.
OTDS_PASSWORD=<your_password>
Requires you to specify your OTDS password for the “[email protected]”
user. This parameter is required.
HOST_NAME=<fully_qualified_domain_name>
Allows you to specify the fully qualified domain name of this installation of
OTDS and OpenDJ. This parameter is required. If omitted, the installer pases
“localhost” for this parameter.
LDAP_ADMIN_PORT=<LDAP_admin_port_number>
Allows you to specify your LDAP administration port number. This parameter
is optional. If omitted, the installer passes “4440” for this parameter.
LDAP_COMM_PORT=<LDAP_comm_port_number>
Allows you to specify your LDAP communication port number. This parameter
is optional. If omitted, the installer passes “389” for this parameter.
JAVADIR=<Java_installdir>
Allows you to specify your Java installation path. This parameter is optional.
APPSRVTYPE=<web_application_server>
Allows you to specify your web application server, type either “Tomcat” or
“WebSphere”. This parameter is required.
TOMCATSERVICENAME=<Tomcat_service_name>
Allows you to specify your Tomcat service name, if you are using Tomcat as
your web application server. This parameter is optional.
Note: If you are using Tomcat as your web application server, only one of
APPSRVTYPE or TOMCATSERVICENAME should be specified. If you specify
both parameters, only TOMCATSERVICENAME will be used.
INSTALLDIR=<OTDS_installdir>
Allows you to specify the installation path for OTDS. This parameter is optional.
If omitted, the installer passes “C:\OTDS\” for this parameter.
IMPORTDATA=1
Indicates to the installer that you will be migrating data. This parameter is
required.
IMPORTDATA_VER=<otds_version>
Indicates to the installer the version of OTDS from which you will be migrating
data. This parameter is required.
<otds_version> can be any one of: “1021”, “105”, “16”, or “20”.
IMPORTDATADIR=<path_to_ldif_file>
Specifies the path of your ldif file necessary for migration. This parameter is
required.
For information about how to generate the ldif file, see “Exporting your data
from OTDS 10.2.1” on page 21, or “Exporting your data from OTDS 10.5”
on page 23, or “Exporting your data from OTDS 16” on page 24, or “Exporting
your data from another installation of OTDS 20” on page 26.
ISREPLICA=true
Directs the installer to install OTDS as a replication server. This parameter is
required.
REPLICA_SERVER=<replication_server_name>
Requires that you specify your replication server name. This parameter is
required.
REPLICA_PORT=<replication_server_port_number>
Requires that you specify your replication server port number. This parameter is
optional. If omitted, the installer passes “8989” for this parameter.
REPLICA_LDAPPORT=<replication_server_LDAP_port_number>
Requires that you specify your replication server LDAP communication port
number. This parameter is required.
Note: “OpenText Directory Services 21” will appear in the Programs and
Features pane of the Windows Control Panel.
Note: “OpenText Directory Services 21” will appear in the Programs and
Features pane of the Windows Control Panel.
This procedure outlines the steps to install OTDS as a replication server during
installation. You can also manually enable OTDS as a replication server after
installation by using the otdstenant command line tool. For more information, see
OpenText Directory Services - Tenant Management Guide (OTDS-CCS).
Note: “OpenText Directory Services 21” will appear in the Programs and
Features pane of the Windows Control Panel.
Default installa- Directory Services will install to: /usr/local/OTDS. OpenDJ will install to: /usr/
tion paths: local/OTDS/opendj.
If you are installing Directory Services version 21 on the same machine on which
you have a previous version of OTDS installed:
ensure you have followed “Importing data from previous versions of Directory
Services” on page 19 and then follow the UI instructions in “Installing OTDS as
a stand-alone or primary server” on page 42.
1. Sign in to your server as the user who will install and run Directory Services.
This is the user and group you created in “Prerequisites for the installing
userid” on page 13.
a. The user running the installer must have execute permission to run all files
in the installer.
b. The following variables must be specified for both the user running the
installer as well as for the user running the web application service, either
Tomcat or WebSphere:
i. Ensure that the JAVA_HOME variable is pointing to the root of your Java
install. Specifically, this variable should not point to the bin directory.
ii. Ensure that the PATH variable includes the location of the Java
executable.
iii. Optional If you are using Tomcat, you can specify the CATALINA_HOME
variable to the location of Tomcat.
c. The following variable must be specified for the user running the OpenDJ
service:
If you are installing Directory Services as a replication server, follow the instructions
in “To install OTDS as a replication server:“ on page 46.
2. Sign in to your server as the user who will install and run Directory Services.
This is the user and group you created in “Prerequisites for the installing
userid” on page 13.
3. Make sure you followed all steps in “UNIX and Linux pre-requisites before
installing” on page 41.
5. In the directory in which you placed the install file, run the command:
tar -xvf <install_file>
6. Next, run the Directory Services setup script by running the command:
./setup -l otds-installer.log
8. If you have a previous version of OTDS installed on this system you will see the
Installation Type page. Do one of the following:
• If your previous version of OTDS on this system is version 10.5, you can
choose to upgrade your existing 10.5 version to the 21 level, or install a
second version to this system such that you have both 10.5 and 21 installed
on this system:
– If you choose to upgrade your 10.5 version, you will migrate your
existing 10.5 data to the new 21 installation. Select Upgrade from version
10.5.0, after which you will be taken to Step 22.
– If you choose to install this new version alongside your existing 10.5
version, select Installation of version 20, after which you will be taken to
Step 9.
By default, following this upgrade, OTDS will install to the /usr/local/
OTDS20 directory.
9. On the OpenText End User License Agreement page, read the license
agreement in full. To accept it, press A and then press ENTER.
a. If you want to accept the current value provided by the installer, press N,
and then press ENTER.
b. To change the current value, press M to modify, and then type the name of
an existing group to be used for the installation ownership.
This group must exist and the Installation user name you enter on the next
page must be a member of this group. This is the group that you created in
“Prerequisites for the installing userid” on page 13.
Press N and then press ENTER.
a. If you want to accept the current value provided by the installer, press N,
and then press ENTER.
b. To change the current value, press M to modify, and then type the user
name of an existing user to be used for the installation and installation
directory ownership. Unless the setup was run with elevated privilege, this
must be the user who ran the setup
This is the user that you created in “Prerequisites for the installing userid”
on page 13.
Press N and then press ENTER.
12. On the Installation directory page, the default installation path for the OTDS
install is /usr/local/OTDS. The default installation path for the OpenDJ install
is /usr/local/OTDS/opendj.
a. If you want to accept the default value provided by the installer, press N,
and then press ENTER.
b. To change the default value, press M to modify, and then type the new
installation location.
c. Press N and then press ENTER.
13. On the Application Server page, choose the number that corresponds to the
web application server you are using, either Apache Tomcat or IBM
WebSphere.
Press N and then press ENTER.
14. On the Replication Server page, because you are setting up your stand-alone or
primary Directory Services server, press 2 to select “No”. Press N and then
press ENTER.
15. If you selected Tomcat in Step 13, then on the Directory of Apache Tomcat page
type the location where Tomcat is installed.
If the Directory Services installer has found the Tomcat path on your computer,
the path might be listed next to “Current value”.
Press N and then press ENTER.
If the installer indicates that the path is incorrect, check to ensure that all
environment variables you specified in Step 2.b were correct.
16. On the OTDS Hostname page, you must type the fully qualified hostname for
this installation of OTDS and OpenDJ. Press M to modify, and then type the
fully qualified hostname.
Press N and then press ENTER.
17. On the LDAP Administration Port Number page, if you want to modify the
default setting, press M to modify, and then type the administration port
number to be used by LDAP. The default is 4440.
Press N and then press ENTER.
18. On the LDAP Communication Port Number page, if you want to modify the
default setting, press M to modify, and then type the communication port
number to be used by LDAP. The default is 1389.
Press N and then press ENTER.
19. On the OpenText Directory Services Administrator Password page type the
Directory Services administrator password.
At the confirm password prompt, re-type the password exactly.
You can reset the “[email protected]” password from the OTDS web client.
See “Resetting a user password” on page 252 for more information.
Note: If you do not apply a strong password, the OTDS installer will warn
you that you have applied a weak password and you are advised to return
and type a stronger password.
A strong password must contain at least eight characters. Among those
eight characters, you must have one of each of the following:
20. On the OpenText Directory Services Data Import page if you will not be
importing any data, press N to accept the default selection, and then press
ENTER.
Otherwise, do the following:
a. Optional If you want to import your 10.2.1 data to your new 21 installation,
press the number corresponding to 10.2.1. Make sure that the OTDS 10.2.1
RCS database is running and can be contacted.
b. If you want to import your 10.5 data to your new 21 installation, press the
number corresponding to 10.5.
c. If you want to import your data from OTDS 16 to this new 21 installation,
press the number corresponding to 16.
21. In the Directory of OpenText Directory Services Data Import page, press M to
modify and then type the fully qualified directory containing the data files from
your previous installation of OTDS:
• If you are importing from version 10.2.1, type the fully qualified directory
containing your 10.2.1 data files: boot.properties, config.ldif, and
otds-10.2.1.ldif. You can also use the ... button to browse to select the
path. These are the files that you prepared in “Exporting your data from
OTDS 10.2.1” on page 21.
• If you are importing from version 10.5, type the fully qualified directory
containing your 10.5 data files: config.ldif and otds-10.5.ldif. You can
also use the ... button to browse to select the path. These are the files that you
prepared in “Exporting your data from OTDS 10.5” on page 23.
• If you are importing from version 16 or above, type the fully qualified
directory containing your 16 or above data files: config.ldif and otds.
ldif. You can also use the ... button to browse to select the path. These are
the files that you prepared in “Exporting your data from OTDS 16”
on page 24 or “Exporting your data from another installation of OTDS 20”
on page 26.
If you followed the example during the export, the path is C:\temp.
Finally, press N and then press ENTER.
22. On the OpenText Directory Services Component review page, do one of the
following:
• To move back through the previous pages in order to change any of the
parameters, press P, and then press ENTER.
• To continue the installation, press I, and then press ENTER.
23. If you are using WebSphere, and you have migrated data, the OTDS path has
changed. You must reinstall OTDS in WebSphere.
2. Sign in to your server as the user who will install and run Directory Services.
This is the user and group you created in “Prerequisites for the installing
userid” on page 13.
3. Make sure you followed all steps in “UNIX and Linux pre-requisites before
installing” on page 41.
5. In the directory in which you placed the install file, run the command:
tar -xvf <install_file>
6. Next, run the Directory Services setup script by running the command:
./setup -l otds-installer.log
9. On the OpenText End User License Agreement page, read the license
agreement. To accept it, press A and then press ENTER.
a. If you want to accept the current value provided by the installer, press N,
and then press ENTER.
b. To change the current value, press M to modify, and then type the name of
an existing group to be used for the installation ownership.
This group must exist and the Installation user name you enter on the next
page must be a member of this group. This is the group that you created in
“Prerequisites for the installing userid” on page 13.
Press N and then press ENTER.
a. If you want to accept the current value provided by the installer, press N,
and then press ENTER.
b. To change the current value, press M to modify, and then type the user
name of an existing UNIX or Linux user under which the Directory Services
server process will run. This user name will be used for the installation and
the installation directory ownership. Unless the setup was run with
elevated privilege, this must be the user who ran the setup.
This is the user name that you created in “Prerequisites for the installing
userid” on page 13.
Press N and then press ENTER.
12. On the Installation directory page, the default installation path for the OTDS
install is /usr/local/OTDS. The default installation path for the OpenDJ install
is /usr/local/OTDS/opendj.
a. If you want to accept the default value provided by the installer, press N,
and then press ENTER.
b. To change the default value, press M to modify, and then type the location
where the Directory Services server and OpenDJ will be installed.
Press N and then press ENTER.
13. On the Application Server page, choose the number that corresponds to the
web application server you are using, either Apache Tomcat or IBM
WebSphere.
Press N and then press ENTER.
14. On the Replication Server page, because you are setting up a replication server,
press 1 to select “Yes”. Press N and then press ENTER.
15. If you selected Tomcat in Step 13, then on the Directory of Apache Tomcat page
type the location where Tomcat is installed.
If the Directory Services installer has found the Tomcat path on your computer,
the path might be listed next to “Current value”.
Press N and then press ENTER.
If the installer indicates that the path is incorrect, check to ensure that all
environment variables you specified in Step 2.b are correct.
16. On the OTDS Hostname page, you must type the fully qualified hostname for
this installation of OTDS and OpenDJ. Press M to modify, and then type the
fully qualified hostname.
Press N and then press ENTER.
17. On the LDAP Administration Port Number page, if you want to modify the
default setting, press M to modify, and then type the administration port
number to be used by LDAP. The default is 4440.
Press N and then press ENTER.
18. On the LDAP Communication Port Number page, if you want to modify the
default setting, press M to modify, and then type the communication port
number to be used by LDAP. The default is 1389.
Press N and then press ENTER.
19. On the Primary server fully qualified domain name page, type the fully
qualified domain name of the machine that hosts the OTDS stand-alone, or
primary, server installation.
Press N and then press ENTER.
20. On the Primary server LDAP Administration Port Number page, type the
LDAP Administration port number of the machine that hosts the OTDS stand-
alone, or primary, server installation. The default value is 4440.
Press N and then press ENTER.
Note: The password entered must be the password used when you
installed OTDS.
22. On the Primary server fully qualified domain name page, because you are
setting up this installation as a replication server, type the fully qualified
domain name of this replication server.
Press N and then press ENTER.
23. On the LDAP Replication Port Number page, because you are setting up this
installation as a replication server, type the LDAP port number of this
replication server.
Press N and then press ENTER.
24. On the OpenText Directory Services Component review page, do one of the
following:
• To move back through the previous pages in order to change any of the
parameters, press P, and then press ENTER.
• To continue the installation, press I, and then press ENTER.
25. If you are using WebSphere, and you have migrated data, the OTDS path has
changed. You must reinstall OTDS in WebSphere.
Make sure you followed all steps in “UNIX and Linux pre-requisites before
installing” on page 41.
The list of install files can be found in “Install files for Directory Services”
on page 28.
Installation parameters
The parameters to install OTDS non-interactively are:
-xrf <file>
Allows you to generate a response file.
-rf <file>
Allows you to specify the response file.
-q(b)[i|m|r|x]
Determines the user interface that will be displayed during the installation:
For example,
-qbi -responsefile <file_name>
-l <logfile_name>.log
Specifies that the OTDS installer log file, <logfile_name>.log, should be generated.
-debug
Enables script debugging messages for the installation.
For example,
-qbi -responsefile <file_name> -debug
1. Generate the response file for this installation by typing the following: ./setup
-xrf otdsresponse
2. Follow the dialogs to enter the required information to the response file. For
background information on these dialogs, see “Installing OTDS as a stand-alone
or primary server” on page 42.
Note: The password will not be captured in the response file. If you
require the password in the response file, you will need to manually
modify the response file.
3. Begin the installation by typing the following: ./setup -rf otdsresponse -qi
-l otds-installer.log
4. When the installation completes, and if you are both using WebSphere and you
have migrated data, the OTDS path has changed. You must reinstall OTDS in
WebSphere.
If Directory Services started successfully, you will see the line: INFO com.
opentext.otds.as.AsServlet - OTDS STARTED
3. If the installation failed, you will need to perform manual cleanup of files before
you can begin the installation again. For information about manually cleaning
up the files, see “To uninstall Directory Services from Windows:“ on page 53
or “To uninstall Directory Services from UNIX or Linux:“ on page 54.
Note: For information about the log files, see “Log Files“ on page 375.
4. If you are using WebSphere, and you have migrated data, the OTDS path has
changed. You must reinstall OTDS in WebSphere.
2. This step removes OTDS 10.2.1 from RCS and deletes OTDS data from 10.2.1.
Open your Administration Client and connect to RCS 10.2.1.
a. Under Configuration, select Runtime and Core Services and then do the
following:
b. The value is XML content. Use a text editor to carefully edit the XML.
Replace all instances of OTDS-ADMIN with OTDS-DISABLED. There
should be 3 instances.
c. Update the prop_value column using the following statement:
UPDATE rcs_config_property_large_str SET prop_value='<new_value>' WHERE
prop_key='appregistry'
7. Update the OTDS server URL in any resource, for example, in Content Server,
UMS or OTMM.
In Content Server, on the Content Server Administration page, in the Directory
Services Integration Administration area, change the OTDS Server URL to the
Directory Services 21 URL. For more information, see “Configuring Directory
Services integration administration in Content Server” on page 225.
• otdsDeploy.log
• RejectedEntriesFile.txt
• SkippedEntriesFile.txt
• The OpenDJ logs.
• otds-installer.log
• otds.log
If you installed OTDS and your web application server, either Tomcat or
WebSphere, to the default directories, you will find the following:
3. You have two options when uninstalling OTDS. Choose one of the following:
• If you do not want to generate an uninstaller log, open Control Panel and
select Uninstall a program. Click to highlight OpenText Directory Services
21. On the menu bar, click Uninstall, and then click Yes to confirm that you
want to uninstall.
• If you want to generate an uninstaller log file, open a command prompt
window as administrator, for more information see “References to external
websites” on page 384. Run the OTDS-2130-WIN.msi installer from that
administrator command window by typing the command:
msiexec.exe /x OTDS-2130-WIN.msi /l*v otds-uninstaller.log
You are running the same installer that you used to install OTDS. Next do
the following:
1. In the Windows Installer Welcome window, click Next.
2. In the Ready to Remove window, click Remove to confirm you want to
uninstall the product.
3. In the Completing the removal window, click Finish.
4. Optional When the uninstaller completes, and if you installed Directory Services
to the default directory, you can delete the C:\OTDS\ directory.
If you installed Directory Services to a custom directory, you can search for the
folder OTDS, then delete that folder.
5. Delete the OTDS files otds*.xml and ot-authws.xml, if they have not been
removed by the uninstall process.
If you are using Tomcat, you will find the files in the <Tomcat_installdir>
\conf\Catalina\localhost directory.
For example, delete the following files:
• ot-authws.xml
• otds-admin.xml
• otdstenant.xml
• otds-usergroup.xml
• otds-v2.xml
• otdsws.xml
• otdsDeploy.log
• RejectedEntriesFile.txt
• SkippedEntriesFile.txt
• The OpenDJ logs.
• otds-installer.log
• otds.log
If you installed OTDS and your web application server, either Tomcat or
WebSphere, to the default directories, you will find the following:
3. Open a command prompt window as the user who installed Directory Services.
Run the Directory Services setup script by typing:
./setup
4. On the Change, Repair or Remove Installation page, select Uninstall, and then
press ENTER.
5. Optional If you installed Directory Services and OpenDJ to the default directories,
you can delete the /usr/local/OTDS directory.
If you installed Directory Services and OpenDJ to custom directories, you can
search for the folders otds and opendj, then delete those folders.
Getting Started
• Support for %mvjs: see “Support for javascript and multi-valued javascript
in the Format column” on page 190.
• New system attributes: see Enable Auto-Consolidation On Connection
Change on page 302, LDAP Retry Delay on page 307, and LDAP Retry
Number on page 308.
• New system attributes: see Enable Expired User Deletion on page 303,
Enable Maintenance on page 304, and Expired User Retention Period
on page 305.
• Bug fixes.
• Bug fixes.
• New system attributes: see Common Password URL on page 298 and
Account Creation Notification Enabled on page 294.
• Customizable resource mappings: see “Customizing Directory Services
mappings” on page 359.
• New user attribute mappings supported by REST API: see Gender
on page 208 and DisplayLanguage on page 207.
• New synchronized partitions indicators and notifications: see
“Synchronized User Partitions status indicated by color” on page 82 and
“To receive notifications when a manual consolidation is required”
on page 142.
• Bug fixes.
• OTDS will no longer run OpenDJ internally: see “Prerequisites for the
installing userid” on page 13.
• New system attribute: see SameSite Cookie Attribute on page 312.
• Symantec VIP two factor authentication: see “Symantec VIP and two-factor
authentication” on page 247.
2.1 Overview
Directory Services is a repository of user and group identity information and a
collection of services to manage this information for OpenText applications. OTDS
contains components for identity synchronization and single sign on for all
OpenText applications.
Directory Services offers synchronization and authentication features that can help
your organization save time, and administrative overhead, by enabling you to
maintain user information in one directory, for use by multiple OpenText
applications. For example, you can base your OpenText Content Server user
information on the user information already contained in your Windows domain. If
your organization maintains several Enterprise Server systems, they can all use the
same central user directory.
Directory Services can synchronize with your identity provider to pull user and
group information from your identity provider automatically. Directory Services
then pushes these users and groups to your OpenText applications automatically
and incrementally. This synchronization of user and group data across OpenText
applications allows Directory Services to enable single sign on and secure access to
all OpenText applications.
2.1.1 Terminology
To understand Directory Services, you must understand the following terms. These
terms are presented in the order in which you will encounter them when
configuring a Directory Services server.
Identity Provider
An identity provider is a source of user and group data that can be imported
into Directory Services. To import this data into Directory Services, you must
create a synchronized user partition that represents this source. Directory
Services currently supports the following identity providers:
Synchronization
The Enterprise Sync component of Directory Services is responsible for
gathering user and group data from your identity provider and ensuring it is
imported into your synchronized user partition in Directory Services.
Synchronization of user and group data changes in the associated identity
provider of a synchronized user partition is provided automatically by Directory
Services. Changes to user and group information are delivered automatically
unless they are paused by the administrator. Periodically, an administrator
might want to temporarily pause updates from an identity provider. For
example, if major changes were being made in the identity provider, an
administrator might pause regular updates until the changes were completed.
Synchronization is one-way. There is no delivery of changes to user or group
information from Directory Services back to the identity provider.
Important
The Restart Enterprise Sync button, available on the main Partitions page,
reboots the entire Enterprise Sync component, simulating the process that
occurs when restarting Apache Tomcat or IBM WebSphere.
• Synchronized resources
If a resource is synchronized, it means that the users and groups in the access
roles assigned to the resource are added to the internal users and groups
maintained by the application for which the resource is created.
Synchronized resources require that a connection to the application, for
example OpenText Content Server, be established. This means that you can
only create a synchronized resource after the application has been installed.
• Non-synchronized resources
Non-synchronized resources can still use Directory Services authentication
for single sign on. Non-synchronized resources are created for applications
that do not maintain an internal user and group directory that must be
synchronized with the users and groups from Directory Services. You can
create non-synchronized resources even if the applications for which they are
intended are not yet installed.
Figure 2-2 shows the centralization of user and group authentication for all ECM
Suite applications. ECM Suite applications are represented by resources in
Directory Services.
Access Roles
Access roles are used to control which resources users can access. You can assign
access roles to users, groups, organizational units, or user partitions. An access
role is a way of identifying users who have the same sign in privileges. For
example, you might create an Access to Content Server access role to give
your development group sign in privileges to Content Server.
When you have created an access role, you can add members to it. Members can
be individual users, whole groups, or whole partitions. An access role consists of
members that are connected to one or more resources. All users and groups in
an access role may be pushed to all the connected resources.
After you have created all your access roles and added members to each access
role, you can add the access role to your resources. This allows users of that
access role to sign in to these resources. Users and groups of that access role may
be pushed to the resource.
For any particular user, single sign on is enabled between all resources that are
connected to all that user's access roles. For more information, see “Access
Roles“ on page 237.
Note: Access roles should not be confused with the roles defined in an
application. Directory Services does not define which functionality of an
application a user is allowed to use, just if the user is granted access to it.
Figure 2-3 shows how access roles are used to control which resources users can
access.
Notes
• A user can sign in using their <user_name>, a fully qualified name in the
form <user_name>@<user_partition>, or a user name in the form
<domain>/<user_name>. If multiple users exist with the same
<user_name> across multiple partitions, OTDS will attempt to resolve the
<user_name>. If this is not possible, the directory-access.log will
contain a message to indicate that multiple identities for the given
<user_name> were found and the user will see an invalid credentials
message.
For more information, see “Authentication Handlers“ on page 149, “Single sign
on scenarios” on page 350 and “directory-access.log” on page 376.
Partitions
Partitions are self-contained copies of user information that allow you to
organize your users into a structured hierarchy of users, groups and
organizational units. A user partition in Directory Services is represented by a
unique name. Content can be imported and synchronized with Active Directory
(AD) and / or Lightweight Directory Access Protocol (LDAP) and can be
managed fully within OTDS. OTDS supports multiple, concurrent user
partitions. For more information, see “User partitions“ on page 81, “System
Status“ on page 371 and “User partitions“ on page 81.
Directory Services provides the following types of partitions:
Synchronized user partition
Synchronized user partitions are synchronized with an identity provider,
such as AD or LDAP. A synchronized user partition contains users, groups
and organizational units that are imported from the identity provider when
the user partition is created. A synchronized user partition can be
automatically kept up-to-date with its source directory. Users who are
imported from an identity provider into a synchronized user partition are
authenticated by the identity provider.
Non-synchronized user partition
Non-synchronized user partitions are created and maintained manually.
Unlike a synchronized user partition, a non-synchronized user partition
does not have an identity provider from which its users and groups are
imported. Users and groups in a non-synchronized user partition are
maintained entirely through the OTDS web client. Users who are created
and maintained manually in a non-synchronized user partition are
authenticated by Directory Services. Configurable password policies are
available for non-synchronized user partitions.
Non-synchronized administrative user partition
The non-synchronized administrative user partition, otds.admin, is
installed by default when a Directory Services server is installed. This
special non-synchronized user partition cannot be deleted or disabled. The
predefined administrative user, [email protected], which is created
when Directory Services is installed, is a member of the otadmins group in
the otds.admin user partition. The otadmins group is automatically given
access to any resource created by the otadmin user.
Authentication Handlers
Because users will need to authenticate through a variety of mechanisms, no
single authentication handler can be applied for any single user in all
circumstances. For example, a user might use Kerberos from the desktop, but
the next day may use credentials-based authentication through a Web site, and
the next may use SAP token-based authentication from within a SAP portal.
Directory Services provides a hierarchy of authentication handlers that are
sequentially evaluated until a definitive authentication result is reported by one
OTDS Connectors
OTDS connectors, or push connectors, are components of Directory Services that
update user and group data in resources so that they remain consistent with the
internal user data in Directory Services. Every synchronized resource has a
specific connector that allows it to communicate with Directory Services.
Figure 2-5 shows the plugable push connector used by every synchronized
resource in Directory Services.
Consolidation
Directory Services uses various mechanisms to keep user and group data
maintained in resources, current with data maintained in the identity provider,
and in Directory Services itself. However, Directory Services cannot guarantee
that such data is always up-to-date. For example:
• If a resource has a failure, and the backup brought online to replace it has old
data.
• If a resource encounters an unknown transient error, or has been unreachable
for some time, Directory Services may be prevented from delivering update
messages.
• It ensures user and group data in synchronized resources matches the data in
Directory Services.
• It also ensures user and group data in Directory Services matches the data in
the identity provider.
Attributes of users and groups are entered and maintained internally for users
and groups that are members of a non-synchronized user partition.
An organizational unit is similar to a folder and allows you to organize users
and groups in a hierarchical structure. When an organizational unit is added as
a member to an access role, only its users will be added to the attached
resources. If you want to add groups to your resources, you will need to add
these as members of your access role. When you add a group to an access role,
all its member users and groups are allocated to the attached resources.
For more information, see “Users and Groups“ on page 243.
Impersonation
Impersonation allows a user of one resource to appear as a different user on a
target resource and to potentially acquire all the privileges of the impersonated
user in that resource.
Important
Impersonation against any resource should not be enabled unless your
specific deployment requires it. The resource's documentation will specify
whether impersonation is required.
2.1.2 Architecture
In a distributed environment where integrated OpenText applications are required
to support single sign on, applications must connect to one instance of Directory
Services to avoid point-to-point complexity. A single Directory Services server is
installed and configured as the central authentication point for all other OpenText
applications.
The mappings from Active Directory / LDAP to Directory Services are configured as
part of the partition configuration. For more information, see “AD/LDAP user and
group ID attributes” on page 101 and “The OTDS unique ID” on page 87.
The mappings from Directory Services to resources are configured through the __
NAME__ attribute mapping of users and groups in the resource configuration. For
more information, see “Using resource attribute mappings” on page 189.
When creating a Directory Services server, the installation will create a non-
synchronized administrative partition, otds.admin, containing predefined default
groups:
For more information, see “The Directory Services default administrative groups”
on page 256.
Action Completed
Install Java.
For information, see “Configuring Tomcat for OTDS” on page 14 or
“Configuring WebSphere for OTDS” on page 17.
Install Apache Tomcat or IBM WebSphere. Start Tomcat or
WebSphere and watch for startup success in the logs.
For information, see “Configuring Tomcat for OTDS” on page 14 or
“Configuring WebSphere for OTDS” on page 17.
Install OpenText Directory Services.
For more information, see the “Install files for Directory Services”
on page 28.
Sign in to your server using the OTDS web client.
For more information, see “Accessing Directory Services”
on page 73.
Optionally, specify the password settings for all users in an OTDS
non-synchronized user partition.
For more information, see “Defining a global password policy for all
non-synchronized user partitions” on page 140.
Optionally, specify the audit reporting settings and notification
settings for OTDS.
For more information, see “To configure audit/reporting settings”
on page 322 and “To configure notifications settings” on page 325.
Define a user partition. It can be synchronized or non-synchronized.
For more information, see “User partitions“ on page 81.
Configure an access role for your new user partition.
For more information, see “Access Roles“ on page 237.
Action Completed
Install all products listed in Basic Directory Services server
on page 71.
Action Completed
Install OpenText Content Server. During the installation of Content
Server, ensure that you also install OpenText Content Web Services
without a resource identifier.
For more information, see Content Server Installation Guide (https://
knowledge.opentext.com/knowledge/piroot/llescor/v210300/llescor-
igd/en/html/_manual.htm).
Start the OTDS web client and sign in to your server to see the
nodes: Content Server and Directory Services.
For more information, see “Accessing Directory Services”
on page 73.
Define a synchronized Content Server resource.
For more information, see “Creating a synchronized resource”
on page 213.
Optionally, configure the enable password reset option in OTDS.
Password reset is enabled by default, however, it requires
configuration. For more information, see Enable Password Reset
on page 304.
Optionally, specify the audit reporting settings and notification
settings for OTDS.
For more information, see “To configure audit/reporting settings”
on page 322 and “To configure notifications settings” on page 325.
Create a non-synchronized user partition that will store the users
and groups either created in Content Server or migrated from the
Content Server database.
For more information, see “Creating a non-synchronized user
partition” on page 120.
Configure an access role for your new user partition to access your
Content Server resource.
For more information, see “Access Roles“ on page 237.
If your external version of OTDS is installed on a different system
than your installation of Content Server, you will need to add your
Content Server URL as a trusted site in OTDS. For more information,
see “Trusted Sites“ on page 329.
Sign in to Content Server as admin. Configure Content Server in the
Directory Services Integration Administration area of the Content
Server Administration page.
For more information, see “Configuring Directory Services
integration administration in Content Server” on page 225.
Restart the Content Server admin servers.
– my_machine.opentext.net
– 10.16.12.120
• Examples of default <web_application_server_port_number> include:
2. On the Partitions page, from the Actions menu of the first synchronized
partition, select Properties.
1. This procedure assumes you have installed Directory Services and signed in
with the [email protected] userid.
For more information, see “Installing OpenText Directory Services Version
21“ on page 13 and “Accessing Directory Services” on page 73. The most current
versions of supported environments can be found in the OpenText Directory
Services Release Notes in OpenText My Support (https://
knowledge.opentext.com/go/OTDS).
2. Create a basic synchronized user partition to populate your Directory Services
server with users and groups from your identity provider. For more
information, see “Defining a synchronized user partition” on page 89.
Alternatively, define your users and groups manually in a non-synchronized
user partition. For more information, see “Defining a non-synchronized user
partition” on page 117.
3. Define your synchronized resources and record their resource identifiers. You
should define resources for all applications that will use Directory Services for
authentication. Currently, the following applications require synchronized
resources:
Content Server
For detailed information, see “Configuring a synchronized resource for
Content Server” on page 200. You will also need Content Web Services
installed before creating a resource for Content Server. For information on
installing Content Web Services, see Content Server Installation Guide
(https://knowledge.opentext.com/knowledge/piroot/llescor/v210300/llescor-
igd/en/html/_manual.htm).
Note: Enterprise Process Services requires that you first create a non-
synchronized resource in order to define a resource identifier. This
resource identifier is used when installing Enterprise Process Services.
You can then return to this resource to change it to a synchronized
resource that points to your newly installed Enterprise Process
Services server.
After you have defined resources for each additional application that will use
Directory Services authentication, you need to record their resource identifiers.
For detailed information, see “Resources“ on page 181.
5. Define your access roles to control who can access your resources. You can
create different access roles to restrict which users are allowed to sign in to the
applications that use Directory Services. For more information, see “Access
Roles“ on page 237.
Assign access roles to the resources that connect Directory Services to the
applications that use its services. For more information, see “Editing access roles
for your resource” on page 231.
1. Header
The header runs across the top of the OTDS web client page. The header
contains the name of the product, “OpenText™ Directory Services”, and the
following menus:
a. The <userid> menu that contains:
In this graphic, the breadcrumb trail shows that the user is accessing the
Resources page of Directory Services. In the graphic below, the breadcrumb
trail shows that the user is accessing the New Synchronized User Partition
assistant of the Partitions page of Directory Services.
b. Button Bar
As you can see from both the breadcrumb trail graphic and the button bar
graphic, the buttons available on the button bar change depending on the
administration page you are accessing.
c. Home button
Clicking the OTDS home button takes you back to the main page.
3. Action Menus
The menu options available on the Actions menus change depending on the
administration page you are accessing.
4. Menu Bar
The menu bar appears at the left-hand side of the OTDS web client page. In
addition to the menu items, each area has an UP ARROW that, when clicked,
will roll up the menu items and hide them from view. The button now changes
to a DOWN ARROW. Click the DOWN ARROW to display the menu items.
Note: The External Import menu item will not appear in the Setup menu
until it has been enabled. For more information, see “External
Import“ on page 287.
5. Search area
Each administration page also contains a search area to allow you to filter the
displayed results. In the search area, which appears under the button bar, you
can choose to search by Starts with or Contains. Select one of the radio buttons
to define your search filter and then type your search query in the associated
box. Click Search to apply this search filter.
You can optionally choose to define the number of results that will display per
page. The default is 25 results per page. If the search produces multiple pages of
results, click Previous and Next to page through the results.
User partitions
• the number of users and groups who are members of each partition
• the number of recycled users and recycled groups who are members of each
partition
• whether the partition is enabled or not
• the Actions menu for each partition
Important
The Restart Enterprise Sync button, available on the main Partitions page,
reboots the entire Enterprise Sync component, simulating the process that
occurs when restarting Tomcat or WebSphere.
Note: For information about the Global Settings button on the button bar of
the Partitions page, see “Defining a global password policy for all non-
synchronized user partitions” on page 139 and “Configuring two-factor
authentication” on page 245.
A user in Directory Services has one Directory Services identity that maps their user
accounts across all resources. User information in Directory Services may be
provided by mapping to an identity provider in a synchronized user partition or by
entering data manually in a non-synchronized user partition.
For a complete list of supported identity providers, see the OpenText Directory
Services Release Notes in OpenText My Support (https://knowledge.opentext.com/go/
OTDS).
The administrator can choose to apply two-factor authentication at the user, group,
organizational unit, or partition level. For more information, see “Configuring two-
factor authentication” on page 245.
Example 3-1: Assume you must create partitions for Human Resources,
Payroll, and all staff members of company ABC Incorporated:
For more information about reserved special characters, see the “Distinguished
Names” page, which is referenced in “References to external websites” on page 384.
The user partition name must be unique within a Directory Services server. After the
name of a user partition is specified, it cannot be changed.
Attribute Meaning
c Country or Region
cn Common name. For example, the user's sign
in name.
displayName Display Name
facsimileTelephoneNumber Fax Number
givenName First Name
initials Middle Name
l City or Locale
mail Email address
notes Notes
o Organization name
oTCompany Company
oTDepartment Department
oTExternalID1 <user_name>
oTExternalID2 <user_name>@<user_partition>
oTExternalID3 <user_name>
or
<user_name>@<DNS_domain>
or
<user_name>@<user_partition>
Attribute Meaning
oTExternalID4 <NETBIOS_DOMAIN_NAME>
\<sAMAccountName>
or
<NETBIOS_DOMAIN_NAME>\<user_name>
or
<user_partition>\<user_name>
oTExtraAttr0-9 Extra attributes available for importing
information
oTStreetAddress Street Address
physicalDeliveryOfficeName Office
postalCode Zip Code or Postal Code
sn Surname or Last Name
st State or Province
telephoneNumber Phone Number
title Job Title
Important
oTExternalID1, oTExternalID2, oTExternalID3, and oTExternalID4 are the
attributes that give a user the set of identifiers that are used to authenticate that
user. In addition, one of these is also used as the user name format pushed to
resources. These attributes are to be changed only if defaults do not provide
desired values.
Example: An individual with the userid franz will have the following settings:
oTExternalID1: franz
oTExternalID2: franz@<partition>
oTExternalID3: franz@<company>.com
oTExternalID4: <COMPANY>\franz
Note: oTExternalID1 may or may not be unique for all users in Directory
Services.
Important
Attribute Meaning
cn Group Name
description Description
displayName Display Name
notes Notes
oTExternalID1 <groupname>
oTExternalID2 <group_name>@<user_partition>
oTExternalID3 <group_name>@<DNS_domain>
or
<group_name>@<user_partition>
oTExternalID4 <NETBIOS_DOMAIN_NAME>\<group_name>
or
<user_partition>@<group_name>
Important
OTDS Enterprise Sync will specify the values of each oTExternalID when
importing or consolidating users from an identity provider. The values for each
oTExternalID must never be manually specified.
• oTExternalID1 - <AD/LDAP_user_ID_attribute>
• oTExternalID2 - <AD/LDAP_user_ID_attribute>@<Partition _name>
If you select Generated OTDS Unique ID for the OTDS Unique ID, the following
mappings will be used:
• oTExternalID1 - <AD/LDAP_user_ID_attribute>
• oTExternalID2 - <AD/LDAP_user_ID_attribute>@<Partition_name>
• oTExternalID3 - <AD/LDAP_user_ID_attribute>@<Domain_name>
• oTExternalID4 - <NETBIOS_DOMAIN_NAME>\<AD/LDAP_user_ID_attribute>
Because the attribute specified for the unique ID, for example userPrincipalName,
does not apply to groups, the mapping does not depend on the selected OTDS
Unique ID, and is always:
• oTExternalID1 - <AD/LDAP_group_ID_attribute>
• oTExternalID2 - <AD/LDAP_group_ID_attribute>@<Partition_name>
• oTExternalID3 - <AD/LDAP_group_ID_attribute>@<Domain_name>
• oTExternalID4 - <NETBIOS_DOMAIN_NAME>\<AD/LDAP_group_ID_attribute>
For LDAP:
If you select AD/LDAP attribute for the OTDS Unique ID, the following mappings
will be used:
• oTExternalID1 - <AD/LDAP_user_ID_attribute>
• oTExternalID2 - <AD/LDAP_user_ID_attribute>@<Partition_name>
• oTExternalID3 - <specified_AD/LDAP_attribute>, for example mail
• oTExternalID4 - <Partition_name>\<AD/LDAP_user_ID_attribute>
If you select Generated OTDS Unique ID for the OTDS Unique ID, the following
mappings will be used:
• oTExternalID1 - <AD/LDAP_user_ID_attribute>
• oTExternalID2 - <AD/LDAP_user_ID_attribute>@<Partition_name>
• oTExternalID3 - <AD/LDAP_user_ID_attribute>@<Partition_name>
• oTExternalID4 - <Partition_name>\<AD/LDAP_user_ID_attribute>
Because the attribute specified for the OTDS Unique ID, for example mail, does not
apply to groups, the mapping does not depend on the selected OTDS Unique ID,
and is always:
• oTExternalID1 - <AD/LDAP_group_ID_attribute>
• oTExternalID2 - <AD/LDAP_group_ID_attribute>@<Partition_name>
• oTExternalID3 - <AD/LDAP_group_ID_attribute>@<Partition_name>
• oTExternalID4 - <Partition_name>\<AD/LDAP_group_ID_attribute>
You will need to create a synchronized user partition if you want to import users
and groups from your identity provider. After you have created a user partition, you
may never need to change any of its settings. Occasionally, though, you might want
to adjust the mapping of attributes from your identity provider into Directory
Services. You might also want to adjust special settings that are only available when
your user partition has been created. These special settings are internal Directory
Services settings that are not mapped to your identity provider attributes.
There are several options that you need to set when you create a synchronized user
partition. These options are explained below:
Connection Information
You can optionally choose to create multiple connections. However, if you are
going to create multiple connections, you need to ensure the following:
1. You can only specify one type of connection across all connections you
create. In other words, each connection you create must have the same
connection type, one of : AD, AD Global Catalog, or LDAP.
2. If you have multiple connections, and then you select Test Authentication
on the Authentication page, that test is run on all connections with the same
set of credentials.
However, if you select Test on any one of the Locations, Mappings, or
Attributes pages, then that test is only run on the initial connection you
created.
The functionality of the Query Server Parameters button on the
Authentication page is also only run on the initial connection you created.
3. You need to be aware that when a synchronized user partition is saved, an
LDAP Credentials Authenticator is created with parameters based on the
initial connection you created.
On the Connection Information page, these are the fields you needs to
complete:
• In the Hostname or address box, type the name of your identity provider,
Active Directory, Active Directory Global Catalog, or Lightweight Directory
Access Protocol (LDAP). This can be the fully qualified hostname of the
Authentication
You can choose one of the following three authentication methods to determine
how the connection is handled: None, Simple, or SASL (GSSAPI).
Note: If you select either Simple or SASL (GSSAPI), the identity provider
user name that you specify for authentication does not need special
privileges. A read-only account is sufficient. However, the data that can be
imported will depend on the access permission of the supplied user name.
In addition, functionality will be impaired if the account does not have
sufficient permissions. OpenText recommends that you use a service
account that can read the server's base DNs, schema, supported controls,
all user and group locations that are to be imported, and all relevant
attributes on the user and group objects. If you choose to have the
password for this service account expire, the new password will need to be
reconfigured on the partition.
• If you select SASL (GSSAPI), you must set the following boxes:
○ Username and Password: if you select this credential type, you will
need to enter the user name and password required to connect to the
identity provider. You will also need to define the Kerberos Realm
and Kerberos KDC, for more information, see “Configuration for the
Kerberos Realm and the Kerberos KDC” on page 91.
○ Key Tab File: if you select this credential type, you need to define the
Kerberos Realm and Kerberos KDC, for more information, see
“Configuration for the Kerberos Realm and the Kerberos KDC”
on page 91.
○ Process Account: if you select this credential type, you must set the
following registry setting:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos
\Parameters
Value Name: allowtgtsessionkey
Value Type: REG_DWORD
Value: 0x01
After setting the registry you must reboot the machine. You will also
need to define the Kerberos Realm and Kerberos KDC, for more
information, see “Configuration for the Kerberos Realm and the
Kerberos KDC” on page 91.
The Process Account credential type is only supported on Windows.
– Service Principal Name: must be set to a valid service principal that
exists for the server that you typed in the Host name or address box. By
default, this box will be populated.
– Quality of Protection: select one of the following:
Note: Configuration for the Kerberos Realm and the Kerberos KDC –
if you selected SASL (GSSAPI), you need to define the Kerberos
Realm and Kerberos KDC in either the Java krb5.conf file or in the
Java configuration options Tomcat configuration. The krb5.conf file
can, by default, be found in the <Java_install_path>\lib\security
\krb5.conf, for example, in C:\Program Files\Java\jre7\lib\
security\krb5.conf.
An example of the definitions of the Realm and the KDC in the Tomcat
configuration:
-Djava.security.krb5.realm=DOMAIN.LOCAL
-Djava.security.krb5.kdc=domainserver.domain.local
The default for the client keytab file is the krb5.keytab file in the home
directory of the user name used to run Tomcat. For example, /home/
jsmith/krb5.keytab or C:\users\jsmith\krb5.keytab.
On Windows, if Tomcat is being run as the system account, the file
default is C:\krb5.keytab on Windows 2008 R2 and C:\Windows\
System32\config\systemprofile\krb5.keytab on Windows 2012
R2.
If you intend making major changes, and you want to stop monitoring your
identity provider for changes, clear the Monitor changes check box. For more
information, see “Synchronization types” on page 99.
Notifications and Search
Select one of the following search methods:
• Paged search: if you select this option you must also select a Page size.
• Virtual list view search: if you select this option you must select a Page size,
and you can optionally enter a Sorting attribute.
• Unlimited
attributes in OTDS. For more information, see “AD/LDAP user and group ID
attributes” on page 101.
• The OTDS unique ID requires that you select one of the following methods:
For more information, see “The OTDS unique ID” on page 87.
Note: For more information, see OpenText Directory Services - Installation and
Administration Guide (OTDS-IWC) and the OTDS Release Notes on OpenText
My Support (https://knowledge.opentext.com/go/OTDS), and then select
Documentation.
Before connecting to an identity provider, you must understand the following about
your setup:
1. The network connection information for your identity provider. You will need
the name and port or IP address of your identity provider.
2. The location of all the users and groups that are relevant to you in your identity
provider.
3. The user and group information in your identity provider that you want to keep
synchronized with your Directory Services server. You can selectively filter
which users and groups you pull from your identity provider.
4. The mapping of user and group attributes from your identity provider to
Directory Services. A default mapping is provided. You can modify this
mapping to suit your needs.
For more information, see “Defining a synchronized user partition” on page 89.
If you choose no encryption method, None, the user name and password that you
supply on the Authentication page will be transmitted in clear text. For more
information, see “Defining a synchronized user partition” on page 89.
• If you select None, the identity provider must allow anonymous sign in to read
from the identity provider. See the note below regarding the possible limitations
for an anonymous account.
• If you select Simple, the authentication method that OpenText recommends
using, or SASL (GSSAPI), the user name that you provide must have sufficient
permissions to read from the identity provider.
Directory Services can import what the user can Read and Search. Objects and
attributes that the supplied user does not have Read or Search permission for
will not be imported into your user partition. By default, a user has Read and
Search access to most objects and attributes.
For LDAP servers, some other server-specific restrictions or limitations may
apply. For example, the Oracle Directory Server Enterprise Edition 11 only
returns the number of entries that are specified using the Look Through Limit
restriction. You must ensure that the supplied user has sufficient permissions for
the data you want to import from your identity provider.
1. The identity provider user name that you specify for authentication
does not need special privileges. A read-only account is sufficient.
However, the data that can be imported will depend on the access
permission of the supplied user name.
2. In addition, functionality will be impaired if the account does not have
sufficient permissions. OpenText recommends that you use a service
account that can read the server's base DNs, schema, supported
controls, all user and group locations that are to be imported, and all
relevant attributes on the user and group objects. If you choose to have
the password for this service account expire, the new password will
need to be reconfigured on the partition.
3. To fully support monitoring by USN query for AD or AD Global
Catalog, the specified account should be able to Read the deleted objects
container.
For more information, see “Defining a synchronized user partition” on page 89.
Clicking Add Location will allow you to select known locations in your identity
provider or browse the folder structure of your identity provider in a Browse for
Container window. If you select Recurse, you are specifying that you want to
import all users or groups from all sub-locations too.
On the Group Locations tab, you can select either groups or organizational units as
group locations. You can optionally select Import users from matched groups to
have Directory Services import users only from the groups that match the locations
and filter specified. If you select Import users from matched groups, and you
selected the Recurse option on the locations, all users and groups from nested
groups will be imported. Note that the locations and filter specified on the User
Locations tab are still enforced.
If Import users from matched groups is not selected, nested groups are not
imported.
Tip: You can optionally apply a custom filter to identify deleted users and
groups in this partition. For more information, see “Examples filtering one
synchronized partition's deleted users and groups” on page 145.
Note: If you change the filters on an existing user partition you will be
changing which users and groups are included in this partition. You must run
a consolidation because Enterprise Sync does not automatically import users
and groups again as a result of a change in configuration. As soon as you
consolidate, it will create and delete users and groups as necessary to match
what is defined by the filters.
The filters you can apply to users and groups to determine if they will be imported:
1. Object Filter: this AD/LDAP search filter defines, to OTDS, a user or group
object. After it has been defined, OTDS uses the definition to determine which
user or group objects will be examined by OTDS for import, consolidation, and
monitoring operations. An Object Filter must be defined or nothing will be
imported.
2. Attributes Filter: this AD/LDAP search filter adds more restrictions to the user
or group object definition. It is used to limit which of the objects defined in the
Object Filter box are imported to OTDS. An entry to the Attributes Filter box is
optional. If no Attributes Filter is defined, then only the Object Filter will be
used for import operations.
Tip: Basic LDAP filter syntax can be found in LDAP Query Basics in the
“Microsoft Tech Net Center”. For more information see “References to external
websites” on page 384.
User filters
The default user object filter in a synchronized user partition includes all users,
including deleted users:
(|(sAMAccountType=805306368)(&(isDeleted=TRUE)(objectClass=user)(!
(objectClass=computer))))
The default user filter includes all users, including deleted users:
(&(objectClass=user)(|(sAMAccountType=805306368)(isDeleted=TRUE)))
Example 3-2: User filter example: If you want to include all users that are
located in Ottawa or Austin, and who have the first name John, use the
following in the Attributes Filter:
(&(givenName=John)(|(l=Ottawa)(l=Austin)))
Example 3-3: User filter example: If you want to include all users in the
ABC123 group from the Users container in the ABC.company domain in
Active Directory, use the following filter:
Object Filter:
(objectClass=user)
Attributes Filter:
(memberOf=CN=ABC123,CN=Users,DC=ABC.company,DC=com)
Group filters
The default group object filter in a synchronized user partition includes all groups,
including deleted groups:
(objectClass=groupOfUniqueNames)
The default group filter in a non-synchronized user partition includes all groups,
including deleted groups:
(&(objectClass=group)(|(&(sAMAccountType=268435456)(|(groupType=2147483652)
(groupType=2147483650)(groupType=2147483656)))(isDeleted=TRUE)))
Example 3-4: Group filter example: In the ABC.net domain, there is a large
group: CN=ARC_Global_Default,OU=Exchange_Archiving,OU=Groups,
DC=ABC,DC=net. If you wanted to exclude this group from being
imported into your user partition, use the following filter:
Object Filter:
(&(objectClass=group)(|(&sAMAccountType=268435456)(|(groupType=2147483652)
(groupType=2147483650)))(isDeleted=TRUE))
Attributes Filter:
(!
(distinguishedName=CN=ARC_Global_Default,OU=Exchange_Archiving,OU=Groups,DC=ABC,DC=net))
In OTDS, the default group filter in a synchronized user partition uses the
sAMAccountType attribute to filter the group type. In Active Directory, the
sAMAccountType attributes for the different groups are:
The default group filter for OTDS for Universal Security and Global Security
groups is:
(&(objectClass=group)(|(&(sAMAccountType=268435456)(|(groupType=2147483652)
(groupType=2147483650)(groupType=2147483656)))(isDeleted=TRUE)))
The default group filter for OTDS for Domain Local Security is:
(&(objectClass=group)(|(&(|(sAMAccountType=536870912)(sAMAccountType=268435456))(|
(groupType=2147483652)(groupType=2147483650)(groupType=2147483656)))(isDeleted=TRUE)))
You might want to map attributes differently if you have special attributes in your
identity provider schema that map to unusual Directory Services attributes.
After applying the “%odn” format to any attribute, you need to consolidate the
partition with the AD or LDAP server in order to change the attribute to the original
DN. For more information, see “Consolidating users and groups in Partitions”
on page 142.
You can map the OTDS displayName attribute to your Active Directory
firstName and lastName, formatting the entry with the prefix “Dr.” to indicate
that all members of this user partition are medical doctors:
You can format the OTDS homePostalAddress attribute to include your LDAP
streetAddress, street, “ON”, and postal code attributes to indicate that all
members of this user partition reside in Ontario:
You can format the Manager attribute to preserve the original AD/LDAP value,
thereby ensuring that OTDS will not translate it:
You can format your OTDS group description attribute to display only
“Staff”:
An Active Directory Global Catalog identity provider will use USN query
synchronization by default. This type of synchronization monitors the identity
provider for objects and attributes that have changed since the previous
synchronization.
that finds the initial user and group data, and sends new copies of the data
whenever an entry is modified. This is continuous monitoring.
• If DirSync, USN query or Persistent Search are not available for your identity
provider.
• If it is not possible to maintain a permanent connection between your identity
provider and Directory Services.
Note: Directory Services will try to recover from broken connections when
it uses DirSync, USN query and Persistent search monitor. Directory
Services will synchronize changes made during periods where the
connection to your identity provider is lost.
• If you are making major changes to your identity provider. It might be useful to
schedule a full synchronization after major changes to your identity provider and
then change your monitoring properties to schedule periodic synchronizations
that update only changed entries.
Tip: You could also clear the Monitor changes check box when you are
making major changes to your identity provider and then Consolidate
when changes are complete.
• If your identity provider typically encounters constant changes. For example, if
user entries are updated every time a user signs in to a single sign on application,
you may want to use scheduled full synchronizations.
For more information, see “Defining a synchronized user partition” on page 89.
Some LDAP servers do not support Paged search and will use a Virtual list view
(VLV) search by default. The VLV search method is also an iterative method but the
results are sorted based on the Sorting attribute that you provide. It is slower than
the Paged search. For example, the Oracle Directory Server uses VLV because it does
not support paged search.
The Unlimited search method is the least preferred method of searching because
most Active Directory or LDAP servers will return a fixed number of entries in one
search result. This is set by the administrator of the server but it must be set to a
number more than the expected maximum number of entries in order to retrieve
them all in one search.
Important
The user running the search must have the proper rights to run an unlimited
search.
For more information, see “Defining a synchronized user partition” on page 89 and
“Performance issues” on page 405.
• objectGUID
• entryUUID
• nsUniqueId
• ibm-entryuuid
• guid
If, on the General page of the user partition creation assistant when you create a
user partition, you select the Start importing users and groups automatically check
box, it will automatically start importing users and groups from the identity
provider after you click Save. If you want to delay the start of this time-consuming
activity, clear the check box and, when you are ready to do the import, see
“Importing users and groups” on page 113.
Note: When you select the Start importing users and groups automatically
box, the user partition command Import Users and Groups will still appear in
the Actions menu. However, if you select the Import Users and Groups menu
option, it will display a message that users and groups have already been
imported.
If the initial import of users and groups completes without errors, the user partition
is automatically in a state where user and group changes in the associated identity
provider are delivered into Directory Services. This is called user synchronization.
If any full import of users and groups from the identity provider into Directory
Services encounters any errors or is stopped manually by an administrator, the user
partition does not receive user and group changes from the identity provider.
However, the incomplete user partition may be browsed and inspected. This might
provide valuable information about why the import failed. After the problem has
been resolved, you can choose the Import Users and Groups action in the OTDS
web client. This will start a complete data import of all users and groups.
After making a change to filter strings or user locations, you should import data
from your identity provider into Directory Services. You can do this by selecting
Consolidate from the Actions menu in the OTDS web client.
2. On the button bar, click Add. Next, from the Add list, select New Synchronized
User Partition.
3. Before you begin, ensure you have met all prerequisites. For more information,
see “Connecting to an identity provider” on page 93.
a. In the Host name or address box, type the name of your identity provider,
AD, AD Global Catalog, or LDAP. This can be the fully qualified hostname
of the physical machine or the IP address. Each connection you create must
be a unique hostname or IP address.
b. In the Port box, type the port number of your identity provider, AD, AD
Global Catalog, or LDAP. For more information, see “Defining a
synchronized user partition” on page 89.
Note: 389 is the default port number if you select None for the
Encryption method.
636 is the default port number if you select SSL for the Encryption
method.
c. In the Encryption method box, if the specified server used SSL, select SSL.
Otherwise, select None. For more information, see “Defining a
synchronized user partition” on page 89 and “When to use encryption”
on page 94.
d. Click Save.
e. Optional If you want to remove specific connections, click the box to the left
of the connection and then click Remove Selected.
If you want to remove all connections, click Remove All.
Important
A synchronized user partition must always have at least one
connection. OpenText recommends that you save the configuration
before you remove all connections.
f. Optional To verify that you have entered your information correctly, select
the box to the left of the item you want to test, and then click the Test
button. If your test succeeds, a message indicating success appears. If your
test fails, close the information window, and then make any necessary
corrections.
g. If you are creating, click Next. If you are editing, you can either save or
select the next tab to edit.
5. On the Authentication page, for information about the options available, see
“Defining a synchronized user partition” on page 89 and “Choosing an
authentication method” on page 94.
a. In the Name box, type a name for this user partition. For more information,
see “Naming the user partition” on page 84.
Important
After a user partition is created, you cannot change its name.
b. Optional You can click the Verify Partition Name button if you want to
check that the name you entered in Step 6.a is valid.
c. Optional In the Description box, type a description for this user partition.
d. Optional If you are creating this partition and you want to begin importing
users and groups immediately, select Start importing users and groups
automatically upon completion.
e. If you are creating, click Next. If you are editing, you can either save or
select the next tab to edit.
a. Accept the Server type that has been detected, or choose a different type
from the Server type list.
Note: After your partition has been created, you cannot edit the
Server type or Naming context.
b. Accept the Naming context that has been detected, or choose a different
starting point for your identity provider's hierarchy.
c. Optional To verify your changes, click Verify Settings. This will determine if
any changes that you have made to the Server type or Naming context are
valid for the server type detected. If your test succeeds, the message
Connected appears. If your test fails, close the window, and then correct
your server type or naming context information.
d. If you are creating, click Next. If you are editing, you can either save or
select the next tab to edit.
i. Click Add Search Location to add all the group locations that you
want to include in this profile of user accounts. For more information,
see “Understanding locations” on page 95. In the Add Search Location
box:
ii. Optional To edit an existing group location, in the Group Locations box,
select the Edit link next to the location you want to edit. Make your
edits in the Edit Location box, and then click Save.
iii. Optional To delete an existing group location, in the Group Locations
box, select the Delete link next to the location you want to delete.
Important
There is no verification step. As soon as you click Delete, the
location is removed.
iv. Optional To reset group locations to the default naming context, click
Reset Locations(s) To Default.
b. In the Object Filter and Attributes Filter area you can optionally choose to
include only those groups that match your filter parameters. The default
group location filters supplied by Directory Services will be sufficient for
most systems. For more information and to see examples of filters for your
server type, see “Applying filters” on page 95. If you want to apply filters,
do the following:
i. In the Object Filter box, type the filter that defines which group objects
will be examined by OTDS for import, consolidation, and monitoring
operations. This box is mandatory.
ii. Optional In the Attributes Filter box you can optionally type a filter that
defines further restrictions on which group objects, as defined in the
Object Filter box, are imported, consolidated, and monitored.
iii. Optional To reset the group filter to the default value, click Reset Filters
To Default.
c. Optional If you want to restrict the users imported by Directory Services to
those who are members of the groups found by the locations and filters
specified, select Import users only from matched groups.
Note: The main purpose of Test Filters and Locations is to check that
group filters and locations are correct. The Import users only from
matched groups option is ignored by the test.
e. If you are creating, click Next. If you are editing, you can either save or
select the next tab to edit.
f. If you subsequently make a change to the Group Locations page, and after
you have finished editing your synchronized user partition, you need to
consolidate the synchronized partition. For more information, see
“Consolidating changes to users, groups, organizational units, and
partitions” on page 142.
i. Add all the user locations that you want to include in this profile of
users. Click Add Search Location to enter at least one user location to
include in this user partion. For more information, see “Understanding
locations” on page 95.
ii. In the Add Search Location box:
Important
There is no verification step. As soon as you click Delete, the
location is removed.
v. Optional To reset user locations to the default naming context, click
Reset Location(s) To Default.
b. In the Object Filter and Attributes Filter area you can optionally choose to
include only those users that match your filter parameters. The default user
location filters supplied by Directory Services will be sufficient for most
systems. For more information and to see examples of filters for your server
type, see “Applying filters” on page 95. If you want to apply filters, do the
following:
i. In the Object Filter box, type the filter that defines which user objects
will be examined by OTDS for import, consolidation, and monitoring
operations. This box is mandatory.
ii. Optional In the Attributes Filter box you can optionally type a filter that
defines further restrictions on which user objects, as defined in the
Object Filter box, are imported, consolidated, and monitored.
iii. Optional To reset the user filter to the default value, click Reset Filters
To Default.
c. Optional Click Test Filters and Locations to see the first 100 users that will be
included in your partition with your current settings. Read the information
provided, then close the information window. Read the information in the
Test Filters and Locations window, then close the window.
Note: The main purpose of Test Filters and Locations is to check that
user filters and locations are correct. The Import users only from
matched groups option on the Group locations tab is ignored by the
test.
d. If you are creating, click Next. If you are editing, you can either save or
select the next tab to edit.
e. If you subsequently make a change to the User Locations page, and after
you have finished editing your synchronized user partition, you need to
consolidate the synchronized partition. For more information, see
“Consolidating changes to users, groups, organizational units, and
partitions” on page 142.
a. Optional If you want to monitor your identity provider for changes, select
Monitor changes and then, from the list, specify how Directory Services
should monitor for changes. This is dependent on the type of identity
provider that you are using to create this user partition.
If you intend making major changes, and you want to stop monitoring your
identity provider for changes, clear the Monitor changes check box.
b. Optional If you want to test the selected monitoring on your current identity
provider, click Test Monitoring, and then do one of the following:
• If you click Test when creating a partition, and if your test succeeds, the
message Connected Successfully appears. If your test fails, close the
window, and then make any necessary corrections.
• If you click Test when editing a partition, read the information
provided, and then close the window.
c. Optional If you want to return to the default monitoring settings for this type
of identity provider, click Reset to Default.
d. If you are creating, click Next or Save. If you are editing, you can either
save or select the next tab to edit.
Note: The scheduler uses the date and time setting on the server that
functions as the master host of Directory Services.
b. Using the boxes, select the day and time for the scheduled synchronization.
After making a selection in a box, click Save.
In the Time box, to access a more complex option, click Advanced. You can
now select either Every or On each selected. If you select Every, you need
to use the boxes to select one number for Hour(s) and one number for
Minutes. If you select On each selected, you can select multiple numbers
under Hours and multiple numbers under Minutes.
After making any selection, make certain you click Save.
c. Optional To add a new schedule, click Add Schedule, and then select the
schedule days and time in the boxes.
d. Optional If you want to delete a schedule, under the Actions column, click
Remove next to the schedule you want to delete.
Note: You must have at least one schedule appearing on this page,
although it does not need to be enabled.
If you click Remove next to any schedule, that schedule is removed
immediately, there is no confirmation step.
e. If you are creating, click Next or Save. If you are editing, you can either
save or select the next tab to edit.
a. From the Search method list, select the search method that suits your
identity provider. The defaults are set based on the detected identity
provider in use. However, you may change the search method based on the
amount of user and group data being searched.
Depending on the search method you select, you may need to enter
information to the Page size and / or Sorting attribute boxes. For more
information, see “Defining a synchronized user partition” on page 89 and
“Search methods” on page 100.
b. If the search method you selected, for example Paged search, requires a
value in the Page size box, enter a value in that box.
c. If the search method you selected, for example Virtual list view search,
requires a value in the Sorting attribute box, enter a value in that box.
d. Optional If you want to perform a search on your identity provider with the
selected search control, click Test Search, and then do one of the following:
• If you click Test when creating a partition, and if your test succeeds, the
message Verified appears. If your test fails, a window indicating the
reason appears. Read the information provided, close the window, then
make any necessary corrections.
• If you click Test when editing a partition, a window is displayed
indicating if the search control succeeded on your identity provider.
Read the information provided, and then close the window.
e. If you want to return to the default search method detected for your
identity provider, click Reset to Default.
f. If you are creating, click Next or Save. If you are editing, you can either
save or select the next tab to edit.
Select either AD/LDAP attribute or Generated OTDS unique ID. For more
information, see “Defining a synchronized user partition” on page 89 and
“The OTDS unique ID” on page 87. If you select AD/LDAP attribute, you
must also enter the attribute that you want to use in the next box.
e. If you selected AD/LDAP attribute, then in the AD/LDAP attribute box,
enter the attribute that you want to use.
f. Optional To verify that you have entered your information correctly, select
the box to the left of the item you want to test, and then click the Test
button. If your test succeeds, a message indicating success appears. If your
test fails, close the information window, and then make any necessary
corrections.
g. Optional If you want to return to the default attributes for this type of
identity provider, click Reset to Default.
h. Click Save.
i. If you subsequently make a change to the Extended Functionality page,
and after you have finished editing your synchronized user partition, you
need to consolidate the synchronized partition. For more information, see
“Consolidating changes to users, groups, organizational units, and
partitions” on page 142.
Tip: If available, you can click Consolidate from the Actions menu to
make any changes to your users and groups effective. For more
information, see “Consolidating users and groups in Partitions”
on page 142.
• If you want to duplicate this partition, click Duplicate Partition, and then
see “Duplicating a synchronized user partition” on page 116.
• If you want to edit members, click View Members, and then see “Editing
members of groups in a synchronized user partition” on page 114.
• If you want to restart this partition, click Restart, and then see “Restarting a
synchronized user partition” on page 114.
• If you want to import users and groups, click Import Users and Groups, and
then see “Importing users and groups” on page 113.
• If you want to set two-factor authentication, click Two Factor Auth Settings,
and then see “Enabling two-factor authentication” on page 114.
• If you want to create attributes for this partition, click Partition Attributes
and then see “Creating system or custom attributes for one partition”
on page 147.
• If you want to enable or disable this partition, click Enable/Disable
Partition, and then see “Enabling or disabling a user partition” on page 148.
• If you want to allocate this partition to a license, click Allocate to License
and then see “Allocate to license” on page 255.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
• If you want to delete this partition, see “Deleting a synchronized user
partition” on page 116.
• If you want to consolidate changes to users and groups, see “Consolidating
changes to users, groups, organizational units, and partitions” on page 142.
1. From the web administration menu, click Partitions, and then click Actions
next to your user partition.
Note: The Import Users and Groups option is only available if you did
not perform the import when you created your synchronized user
partition. After you have successfully imported users and groups to the
synchronized user partition, the Import Users and Groups option will no
longer appear as an option on the menu. In the event you need to, you can
perform a consolidate operation. For more information, see
“Consolidating changes to users, groups, organizational units, and
partitions” on page 142.
Important
OpenText recommends that you do not perform a Restart action unless
directed by OpenText technical support.
You can choose to define settings at one level and then define at a lower level to
override those settings. For example, you can enable two-factor authentication
globally but define it as disabled for a specific user, group, organizational unit, or
partition.
1. Optional If you want to set two-factor authentication global settings for all users,
groups, organizational units, and partitions:
Note: For information about resetting a user's secret key, see “Resetting a
user's secret key” on page 248.
Tip: You may want to duplicate a synchronized user partition when you
want to save a partition's configuration before making changes that you
want to test.
2. From the Actions menu of the synchronized user partition you want to
duplicate, click Duplicate Partition.
3. In the Duplicate box, in the Duplicate Partition Name box, type the name for
this new user partition.
4. Optional Click Verify Partition Name if you want to verify that you have entered
a unique partition name.
5. Click OK.
2. Click to select the box to the left of the partition you want to delete, and then, on
the button bar, click Delete.
3. You need to confirm that you want to delete this user partition and all the users
and groups in it.
Important
1. The users and groups will be removed from the resources that are
using them.
2. Users and groups from a deleted partition(s) will not be moved to the
Recycle Bin. Any users and groups from a deleted partition(s)
currently in the Recycle Bin will be deleted.
Tip: If there are a large number of users and groups in a user partition,
this action may take a long time. The deleting... status indicator appears
beside the user partition name until the server has completed the
operation. Click Refresh to determine if the server has completed the
deletion. For more information, see “Jobs“ on page 363.
Password requirements
The minimum password requirements are determined by the Password Policy that
applies to this user. Password policies apply to all users in a non-synchronized user
partition. The default password policy requires the following when entering or
changing a user account password:
– uppercase character
– lowercase character
– digits (number)
– special character or symbol
• You must supply at least three unique passwords before a password can be
reused.
You can change the password policy for your non-synchronized user partition. For
more information, see “Password policy for non-synchronized user partitions”
on page 138.
Password complexity
If you choose to leave the default password policy rules for users when they are
setting their password, the following characters must be present:
Note: In addition to the default password rules, you can choose to ensure that
users cannot use sequential characters (uppercase or lowercase) from their
username.
You can only edit properties of groups in non-synchronized user partitions. For
more information, see “Editing groups in a non-synchronized user partition”
on page 130.
To delete a group from a non-synchronized user partition, you must use the Delete
action in the Partitions object. For more information, see “Deleting groups in a non-
synchronized user partition” on page 135.
When an organizational unit has been added to an access role, only users in that
organizational unit will be given accounts on resources to which the access role has
been added. The groups in the organizational unit will not be pushed to the
resources that the access role has been added to.
You can only delete organizational unit from a non-synchronized user partition. You
must use the Delete action in the Partitions object. For more information, see
“Deleting organizational units in a non-synchronized user partition” on page 138.
a. In the Name box, type a descriptive name for your user partition.
Use the same best practices for naming your non-synchronized user
partition as you use for synchronized user partitions. For more information,
see “Naming the user partition” on page 84. If your name is a unique
partition name, the icon next to the Name box will display a green check
mark.
b. Optional In the Description box, type a brief description of the purpose of
this non-synchronized user partition.
c. Click Save to create your non-synchronized user partition.
3. Optional Add users to your non-synchronized user partition. For more
information, see “Creating users in a non-synchronized user partition”
on page 122.
4. Optional Add groups to your non-synchronized user partition. For more
information, see “Creating groups in a non-synchronized user partition”
on page 129.
5. Optional Add organizational units to your non-synchronized user partition. For
more information, see “Creating an organizational unit in a non-synchronized
user partition” on page 135.
6. Optional Configure a password policy for your non-synchronized user partition.
For more information, see “Password complexity” on page 117.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
• If you want to delete this non-synchronized user partition, see “Deleting a
non-synchronized user partition” on page 122.
2. Click to select the box to the left of the user partition name you want to delete,
and then, from the button bar, click Delete.
3. Confirm that you want to delete this user partition and all the users and groups
in it.
Important
1. The users and groups will be removed from the resources that are
using them.
2. Users and groups from a deleted partition(s) will not be moved to the
Recycle Bin. Any users and groups from a deleted partition(s)
currently in the Recycle Bin will be deleted.
Tip: If there are a large number of users and groups in a user partition,
this action may take a long time. The deleting status indicator appears
beside the user partition name until the server has completed the
operation. Click Refresh to determine if the server has completed the
deletion.
2. From the Actions menu of the non-synchronized user partition in which you
want to create a user, click View Members.
3. On the button bar, click Add. From the Add menu, select New User.
i. Select the Account is disabled box if you want to deny this user sign in
privileges on your resources.
By default, a user account is enabled, allowing the user to sign in to the
resources to which they have access. If you select this box, the user can
no longer sign in to those resources. For example, this can be used to
temporarily prevent a user from having access to resources, while they
are on leave, without removing their account or access roles. This can
be changed later by editing the user. For more information, see “User
accounts can have a status of locked out, disabled, or expired”
on page 118.
ii. Select the Account expires box if you want to set an absolute date and
time beyond which this user cannot sign in to OTDS. After selecting
the box, use the calendar picker to choose the date and time. The
expiry date you select can be changed or removed at any time.
b. In the Password Options area, from the list, select one of the following:
Note: This option also applies when a user is first created. This
occurs because a newly set password constitutes a password reset.
• Do not require password change on reset: to ensure that the user does
not need to change their password when it has been reset by the
administrator.
Under this option, to further manage password changes, you can also
choose to select either or both of:
i. In the Password box, type the initial password of the new user. The
password you type must meet the minimum complexity requirements.
For more information, see “Password requirements” on page 117.
ii. In the Confirm password box, re-type the initial password of the new
user. The passwords must be identical.
d. If you have finished adding information for your new user, click Save. To
continue to the next page, click Next.
6. Optional On the Organization page, you can choose to specify any general
organization information. If you have finished adding information for your new
user, click Save. To continue to the next page, click Next.
7. Optional On the User Attributes page, you can choose to specify any additional
user attribute values. For more information, see “Defining user attributes”
on page 85.
8. Optional On the Custom Attributes page, you can choose to specify any
additional custom attribute values, or edit existing custom attributes.
i. In the Type box, enter the type of custom attribute you are defining.
ii. In the Name box, enter a name for this custom attribute.
iii. In the Value box, if you require it, enter a value for your custom
attribute.
iv. Click Save to the right of your custom attribute.
b. To delete a custom attribute, select the check box to the left of the custom
attribute you want to delete, and then click Delete Selected Attributes.
c. To remove all custom attributes, click Clear All Attributes.
Note: If you did not meet the password requirements when you typed the
user password, a warning message will appear detailing the minimum
password requirements. You will not be able to save the user until you
have met the minimum password requirements.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. From the Actions menu associated with the user you want to edit, click
Properties. You can use the search box to find the user.
• If you want to consolidate this user, click Consolidate, and then see
“Consolidating users in a partition” on page 126.
• If you want to set two factor authentication for this user, click Two Factor
Auth Settings, and then see “Enabling two-factor authentication”
on page 129.
• If you want to edit the groups to which this user belongs, click Edit
Membership, and then see “Editing members of groups in a non-
synchronized user partition” on page 131.
• If you want to view recursive memberships for this user, click View
Recursive Membership, and then see “To view all application roles
(recursively) assigned to a specific user, group, or application role”
on page 272.
• If you want to edit the application roles to which this user belongs, click Edit
Application Roles, and then see “Editing an application role” on page 269.
• If you want to view the application roles to which this user belongs, click
View Effective Roles, and then see “Editing an application role”
on page 269.
• If you want to reset this user's password, click Reset Password, and then see
“Resetting a user password in a non-synchronized user partition”
on page 127.
• If you want to allocate this user to a license, click Allocate to License, and
then see “Allocate to license” on page 255.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
Tip: You can also, from the web administration menu, click Partitions and
then, from the user partition's Actions menu, select View Members. Select
the Users tab.
3. From the Actions menu associated with the user you want to consolidate, select
Consolidate. You can use the Search box to find the user.
If you know of a user who should be present in OTDS but is not listed, you can
consolidate that missing user as follows:
3. In the Account DN box, enter the DN of the missing user in the User DN box.
4. Click OK.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user for whom you want the password reset, or use the Search box to
find the user.
From the Actions menu associated with the user whose password you want to
reset, select Reset Password.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user whose account you want unlocked, or use the Search box to find
the user.
From the Actions menu associated with the user whose account you want to
unlock, select Properties.
4. Click Save.
Important
The Partition Restrictions option is intended for non-synchronized
partitions that will be used in the OpenText cloud. Any restrictions created
here will apply to objects created from Enterprise Directory Sync.
OpenText recommends that you do not apply partition restrictions to any
non-synchronized partition unless directed to do so by OpenText.
2. From the Actions menu of the non-synchronized user partition you want to
configure, click Partition Restrictions.
4. In the Maximum Number of Groups box, to restrict the number of groups that
can be created from Enterprise Directory Synchronization, enter the maximum
number of groups allowed.
The default is “-1”, meaning no restriction on the number of groups that can be
created.
5. Optional In the Allowed Domains box, if left blank, all domains will be allowed.
If you include any domain in this box, OTDS will check to see if a user's or
group's attribute has a configured domain. If so, the domain must be listed in
this box before the user or group will be imported.
OTDS will check the following attributes: email, oTExternalId1,
oTExternalId2, oTExternalId1, or oTExternalId1.
a. You can optionally type or select a domain name. If left blank, the default
setting, then all domains will be permitted.
b. To add or remove a domain to or from this non-synchronized partition,
from the list, select an available domain, and then click Add/Delete.
6. The Bind authentication to allowed domains box is for OpenText internal use
only.
7. Click OK.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user that you want to delete or use the Search box to find the user.
Select the box to the left of the user you want to delete, and then, from the
button bar, click Delete.
3. Confirm that you want to delete this user by clicking OK.
i. In the Type box, enter the type of custom attribute you are defining.
ii. In the Name box, enter a name for this custom attribute.
iii. In the Value box, if you require it, enter a value for your custom
attribute.
iv. Click Save to the right of your custom attribute.
b. To delete a custom attribute, select the check box to the left of the custom
attribute you want to delete, and then click Delete Selected Attributes.
c. To remove all custom attributes, click Clear All Attributes.
1. From the web administration menu, click Users & Groups, and then select the
Groups tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
2. Select the group that you want to edit, or use the Search box to find the group.
From the group's Actions menu, click Properties.
3. Optional From the Actions menu associated with any group you want to edit, do
the following:
• If you want to consolidate this group, click Consolidate, and then see
“Consolidating groups in a partition” on page 133.
• If you want to set two factor authentication for this group, click Two Factor
Auth Settings, and then see “Enabling two-factor authentication”
on page 114.
• If you want to edit the groups to which this group belongs, click Edit
Membership, and then see “Editing members of groups in a non-
synchronized user partition” on page 131.
• If you want to view recursive memberships for this group, click View
Recursive Membership, and then see “To view all application roles
(recursively) assigned to a specific user, group, or application role”
on page 272.
• If you want to edit the application roles to which this group belongs, click
Edit Application Roles, and then see “Editing an application role”
on page 269.
• If you want to view the application roles to which this group belongs, click
View Effective Roles, and then see “Editing an application role”
on page 269.
• If you want to edit the administrators of this group, click Edit
Administrators, and then see “Editing administrators of groups in a non-
synchronized user partition” on page 133.
• If you want to allocate this group to a license, click Allocate to License, and
then see “Allocate to license” on page 255.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
• If you want to delete this group, see “Deleting groups in a non-synchronized
user partition” on page 135.
1. From the web administration menu, click Users & Groups, and then select the
Groups tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the Actions menu of the partition you want to edit, select View
Members. Next, select the Groups tab.
2. Find the group that you want to edit, or use the Search box to find the group.
From the Actions menu associated with the group whose members you want to
edit, select Edit Membership.
a. In the Users and Groups Associations box, use the Search box to find
members to add to the group. From the search results box, select the check
box to the left of the members you want to add to the group, and then click
Add Selected.
b. Continue searching for, and adding, members. After you have finished
adding members to this group, in the Users and Groups Associations box,
click Close.
4. If you want to add a member to the list of groups that this group,
<group_name>@<partition_name>, is a “member of”, on the
<group_name>@<partition_name> page, click the Member Of tab:
6. Optional If you want to remove a member from the group that this group is a
“member of”:
Note: When you remove a member of a group, you do not delete the
member.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
3. Select the group that you want to edit, or use the Search box to find the group.
4. Click the Actions link next to the group whose administrators you want to edit.
From the Actions menu, click Edit Administrators.
6. Use the Search box to find users or groups to add to the administrators. From
the search results box, select the users or groups you want to designate as
administrators, and then click Add Selected.
7. Continue searching for, and adding, administrators. After you have finished
adding administrators, in the Users and Groups Associations box, click Close.
Tip: You can also, from the web administration menu, click Partitions and
then select View Members from the user partition's Actions menu. In the
center of the page, select the Groups tab.
4. Click Actions next to the group you want to consolidate. From the Actions
menu, click Consolidate.
6. Click Consolidate to consolidate user data for the selected existing group across
all selected resources.
If you know of a group who should be present in OTDS but is not listed, you can
consolidate that missing group as follows:
4. Click OK.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
3. Select the group that you want to delete, or use the Search box to find the
group.
4. Select the box to the left of the group you want to delete. Next, from the button
bar, click Delete.
5. Confirm that you want to delete this group by clicking OK.
Note: When you delete a group, you do not delete the users.
1. From the web administration menu, click Partitions and then, in the center of
the page, click the Actions link associated with the non-synchronized user
partition in which you want to create an organizational unit. From the Actions
menu, click View Members.
2. Select the Organizational Units tab.
a. In the Organizational Unit name box, type a descriptive name for the
organizational unit to be displayed in your non-synchronized user
partition.
b. Optional In the Description box, type a longer description of the
organizational unit. For example, you might explain that you have
included all development managers from the French and German offices of
your company.
4. Click Save.
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose organizational
unit you want to edit.
3. Select the Organizational Units tab. Select the Actions link next to the
organizational unit you want to edit. From the Actions menu, click Properties.
4. Optional From the Actions menu associated with any organizational unit you
want to edit, do the following:
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose administrators
you want to edit.
3. Click the Organizational Units tab, and then click the Actions link next to the
organizational unit you want to edit. From the Actions menu, click Edit
Administrators.
4. Click Add Administrator. In the Users and Groups Associations box, use the
Search box to find users or groups to add to the administrators. From the search
results box, select the users or groups you want to designate as administrators,
and then click Add Selected.
5. Optional If you want to remove a user or group from the administrators listed in
the Administrators area:
a. Select the user or group you want to remove, and then click Remove
Administrator.
b. Click Delete to confirm that you want to remove this administrator.
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose organizational
unit you want to delete.
3. Select the Organizational Units tab. Select the box to the left of the
organizational unit you want to delete, and then, from the button bar, click
Delete.
4. Confirm that you want to delete this organizational unit by clicking OK.
Caution
When you delete an organizational unit, all users and groups in the
organizational unit will be deleted and removed from the resources
with which they are associated.
When you define a global password policy, OTDS will automatically apply it to all
non-synchronized user partitions you create thereafter. You can still access each
non-synchronized user partition and override the global password policy by setting
a password policy for that one non-synchronized user partition.
OTDS applies the Open Web Application Security Project (OWASP) 10,000 worst
passwords list as a default of disallowed passwords. If a user attempts to set as their
password one of the words on this list, they will receive an error message. It is
possible to configure an additional file or URL, using the system attribute Common
Password URL on page 298, with additional disallowed passwords. Any file or URL
specified in this system attribute is a supplement to the default OWASP list.
OpenText recommends that, if using a custom file, it be less than 1MB in size.
When you follow the “Defining a global password policy for all non-synchronized
user partitions” on page 140 procedure, you will set the global password policy for
your OTDS environment. However, setting a global password policy will only apply
that global policy to any existing non-synchronized user partition that is already set
to use a global password policy.
Only newly created non-synchronized user partitions will use the global password
policy by default. You still need to edit the password policy of each existing non-
synchronized user partition and select the Use global policy box.
Note: If you want to set a global password policy that can apply to all non-
synchronized user partitions, see “Defining a global password policy for all
non-synchronized user partitions” on page 140.
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose password
policy you want to set.
3. In the Password Policy box, to apply the global password policy you defined in
the “Defining a global password policy for all non-synchronized user
partitions” on page 140 procedure to this non-synchronized user partition,
select Use global policy.
4. If you cleared the Use global policy box, then, in the Password Quality area, do
the following:
a. In the Password can be changed in (days) box, enter the minimum number
of days before a new password can be changed. The default value is 1.
b. In the Password expires in (days) box, enter the number of days before the
password expires and must be changed. The default value is 90.
c. In the Lockout Failure Count box, enter the maximum number of invalid
password attempts before the user is locked out. The default is 3.
d. In the Lockout Duration (minutes) box, enter a number, in minutes, that a
user will be locked out from their account if they exceed the maximum
number of invalid password attempts. The default is 15.
6. Click OK.
Note: If you want to define an individual password policy that applies to one
non-synchronized user partition, see “Password policy for non-synchronized
user partitions” on page 138.
2. On the main Partitions page, on the button bar, click Global Settings. From the
Global Settings menu, select Password Policy.
3. In the Password Policy box, in the Password Quality area, do the following:
a. In the Password can be changed in (days) box, enter the minimum number
of days before a new password can be changed. The default value is 1.
b. In the Password expires in (days) box, enter the number of days before the
password expires and must be changed. The default value is 90.
c. In the Lockout Failure Count box, enter the maximum number of invalid
password attempts before the user is locked out. The default is 3.
5. Click OK.
The Consolidate option is not available until an Import Users and Groups
operation is run. For more information, see “Importing users and groups”
on page 113. After you have successfully imported users and groups to the user
partition, you can perform a “Consolidating changes to users, groups, organizational
units, and partitions” on page 142 operation.
a. Optional If you are consolidating a synchronized user partition and you want
to consolidate the selected object in OTDS with the identity provider, AD or
LDAP, select Consolidate with identity provider.
b. Optional If you want to direct OTDS to verify and repair a discrepancy in its
internal referential integrity attributes, for example oTMember or
oTMemberOf, select Verify and repair.
Tip: Make sure you have completed all requirements for enabling
notifications as detailed in “Requirements before enabling Notifications in
OTDS” on page 323.
b. In the OTDS Notification Events box, in the Available Event IDs box,
click to select Sync Partition - Partition Consolidation Required and then
click ADD.
1. After you have started a consolidation from OTDS into your synchronized
resources, and provided it has not completed, from the web administration
menu, select Jobs.
2. From the Actions menu associated with the consolidation you want to cancel,
click Cancel Consolidation.
Custom attributes
Custom attributes are for the use of applications. They are intended for applications
that integrate with OTDS to allow them to store their application properties.
Important
OpenText recommends that you do not create custom attributes.
System attributes
The system attributes you can create on a partition are the same as those in the
“System Attributes” on page 294 tab. However, these partition system attributes
only affect the behavior for users and groups within that partition, rather than to the
entire system. They are currently used to enable auto-provisioning or two-factor
authentication on a per-partition basis.
When you create a system attribute on a partition, as described in this chapter, that
attribute applies only to the users and groups within that partition. When you create
a system attribute in “Adding a system attribute” on page 319, that system attribute
applies to all users and groups across all partitions.
Important
OpenText recommends that you only create system attributes on a partition if
directed by OpenText support.
Tip: You may need to consult with your Active Directory system administrator
to identify those system attributes that are saved in deleted users and groups in
order to create your own filters.
This example will filter deleted users. It will create a system attribute that
applies to all users in one synchronized partition only.
Note: In order for this system attribute to function, the partition you
select must have the USN query monitoring applied. For more
information, see Monitoring on page 92.
3. On the System Attributes tab, click Add, and then do the following:
a. In the Name field, type:
otds.es.FilterDeletedUsers
This example will filter deleted groups. It will create a system attribute that
applies to all groups in one synchronized partition only.
Note: In order for this system attribute to function, the partition you
select must have the USN query monitoring applied. For more
information, see Monitoring on page 92.
3. On the System Attributes tab, click Add, and then do the following:
a. In the Name field, type:
otds.es.FilterDeletedGroups
1. From the Actions menu of the user partition on which you want to create an
attribute, click Partition Attributes.
7. Next to the new attribute, click Save. If you are finished adding your attributes,
on the button bar, click Save.
8. Optional If you want to remove specific attributes, click the box to the left of the
attribute and then click Remove Selected.
If you want to remove all attributes, click Clear All.
1. From the Actions menu of the user partition on which you want to create an
attribute, click Partition Attributes.
6. Optional Enter a value to the Value box. You can type a filter in this field,
provided this partition has the USN query monitoring method applied. For
more information, see “Examples filtering one synchronized partition's deleted
users and groups” on page 145 and Monitoring on page 92.
7. Next to the new attribute, click Save. If you are finished adding your attributes,
on the button bar, click Save.
8. Optional If you want to remove specific attributes, click the box to the left of the
attribute and then click Remove Selected.
If you want to remove all attributes, click Clear All.
2. From the Actions menu of the user partition you want to enable, click Enable.
2. From the Actions menu of the user partition you want to disable, click Disable.
The Auth Handlers page displays a list of all defined authentication handlers
including default authentication handlers provided by Directory Services. The
Scope column displays whether the authentication handler applies to specific
partitions or all partitions. You can view the priority of an authentication handler.
The priority determines the sequence in which the authentication handler is applied.
You can also view whether the authentication handler is enabled or disabled.
The administrator can choose to apply two-factor authentication at the user, group,
organizational unit, or partition level. For more information, see “Configuring two-
factor authentication” on page 245.
• Parameters:
Guest Account
• Parameters:
HTTP Anonymous
• Description: always succeeds with the configured user name. Use this at the
end of the authentication handler chain to grant anonymous access using the
named guest account.
If the HTTP Anonymous authentication handler is prioritized after the
http.negotiate authentication handler, and domain users will use single sign
on into their domain accounts, all other users will automatically end up as
the guest account.
• Default Status: not displayed.
• Parameters:
http.cookie
HTTP Negotiate
Internal Authenticator
OAuth 1.0
Facebook, Google, LinkedIn, Microsoft, and Yahoo use the OAuth 2.0
protocol. For more information, see OAuth 2.0 on page 155.
These authentication handlers are disabled by default, and must be enabled
for these providers to show up on the Directory Services sign in page. If you
want to enable auto-provisioning of OAuth accounts, see Enable Auto-
Provisioning of Accounts on page 302.
• Default Status: displayed and disabled.
• Default Authentication Handler Name: Twitter OAuth
• Parameters:
OAuth 2.0
Facebook, Google, LinkedIn, Microsoft, and Yahoo use the OAuth 2.0
protocol.
These authentication handlers are disabled by default, and must be enabled
for these providers to show up on the Directory Services sign in page. If you
want to enable auto-provisioning of OAuth accounts, see Enable Auto-
Provisioning of Accounts on page 302.
• Default Status: displayed and disabled.
• Default Authentication Handler Name: Facebook OAuth, Google OAuth,
LinkedIn OAuth, Microsoft OAuth, Yahoo OAuth
• Parameters:
OpenID 2.0
otds.admin
• Description: maintains an HTTP session with the client browser through the
use of HTTP cookies. This allows potentially expensive authentication
requests to be bypassed for the duration of the session, as it avoids requiring
users to re-authenticate for the duration of the session as they access different
resources.
• Default Status: not displayed.
• Parameters:
• Description: enables applications to verify SAP logon tickets and extract the
user ID from the logon ticket. Validates SAP tokens using SAP certificates
stored in password-protected Personal Security Environment .pse files. If
you need to provide more certificates than the authentication handler allows,
add another authentication handler. OTDS calls the SAPSSO libraries to
validate and decrypt the SAP tokens.
• Default Status: not displayed.
• Parameters:
A priority is required when you are using multiple authentication handlers for user
partitions on your Directory Services server. Every user partition will use a default
authentication handler that has a default priority. Usually, this default is sufficient to
correctly apply authentication handlers according to the type of sign in attempt
being authenticated.
When new handlers are applied locally to a user partition or globally to all user
partitions, you need to set a priority to control which authentication handler is
evaluated first.
The following graphic shows authentication handlers that have been defined with
priorities. Taking two of these authentication handlers as an example, they will be
used in the following order:
1. If you select the OAuth 1.0 protocol you need to configure it with a Consumer
Key and a Consumer Secret on the Parameters page. This protocol is used by
LinkedIn, Twitter and Yahoo.
2. If you select the OAuth 2.0 protocol you need to configure it with a Client ID
and a Client Secret on the Parameters page. This protocol is used by
Facebook, Google and Microsoft.
These values are obtained after the OTDS instance, your specific installation, is
registered with the OAuth provider. In order to register your instance of OTDS with
the provider, or site, that you want OTDS to access, you will first need to have an
account with that site. For example, to register OTDS to access Facebook, you will
first need a Facebook account. You will need to sign in to your account, then visit
one, or all, of the following locations to register the OTDS instance:
These authentication handlers are disabled by default, and must be enabled in order
for these providers to show up on the Directory Services sign in page. If you want to
enable auto-provisioning of OAuth accounts, see Enable Auto-Provisioning of
Accounts on page 302.
Note: The “<Provider>://” prefix must match the prefix configured on the
authentication handler.
• Change the User Identifier Parameter to the parameter containing the email
address of the user.
• Change the authentication principal attribute to use oTUserID1.
• The Web Browser SSO profile, the HTTP authentication handler, which will
redirect to the identity provider to authenticate and parse the SAML token and
verify the signature on the token.
• The SAML token profile 1.1, the Token authentication handler, which will ensure
that the entire <wsse:Security> header XML is picked up by OTDS and passed, as
a token, to OTDS through authenticateToken(). It will parse the entire
<wsse:Security> header to retrieve the <ds:SignedInfo> section of the SOAP request,
and verify the signature of the caller.
For more information, see “Configuring SAML” on page 176 and Enable Auto-
Provisioning of Accounts on page 302.
In order to accomplish this, you must map the claim, or attribute, statement
containing the group name. For example, map one of http://schemas.microsoft.
com/ws/2008/06/identity/claims/role or http://schemas.xmlsoap.org/
claims/Group to the oTMemberOf OTDS attribute. These examples are set by default
when creating a new SAML 2.0 authentication handler.
Note: WS-Trust functionality has only been tested with ADFS. If using another
identity provider, it must have a WS-MEX metadata URL that must be
specified for the WS-Trust Metadata URL.
• CA SiteMinder
• Entrust TruePass
• Entrust GetAccess
• RSA Access Manager
• Any other product that sets an HTTP header or cookie to provide the identity of
the user.
The following table shows default values for the HTTP header for each product.
Most third-party authentication product agents do not have agents for either Tomcat
or WebSphere. Therefore, a web server is required and it must be configured to
proxy requests to either Tomcat or WebSphere.
The Apache Tomcat connector, and associated reference guide, is available from the
“Apache Tomcat Connectors web site”, “tomcat.apache.org/connectors-doc/”, see
“References to external websites” on page 384.
For more information, see “Integrating Directory Services with Web Access
Management applications” on page 178.
2. From the button bar, click Add. The New Authentication Handler wizard will
guide you through the steps.
4. On the User Partition page, select one of the following, and then click Next:
5. If the authentication handler you chose has required parameters, you will see
the Parameters page. On the Parameters page, enter those required parameters
and then click Next.
For information about authentication handler required parameters, in the web
admin UI, on the Parameters page, click Parameters Descriptions. You can also
view descriptions of the parameters in the “List of authentication handlers”
on page 150.
a. Optional Clear the Enable authentication handler box if you do not want to
enable this authentication handler. By default, this box is selected and the
authentication handler is enabled when it is created.
b. In the Priority box, specify a priority to explicitly control the order in which
authentication handlers are evaluated. For more information, see
“Prioritizing authentication handlers” on page 166.
c. From the list box, select an attribute that will uniquely find a given user in
Directory Services.
d. As soon as you have the attribute, click Add to add the attribute to the
Authentication principal attribute box. If you need to make changes,
highlight the attribute in the Authentication principal attribute box and
click Delete to remove it.
For more information, see “Authentication principal attribute” on page 149.
7. Click Save.
a. You cannot change the value in the Authentication Handler name box.
5. Click Save.
Caution
Deleting an authentication handler cannot be undone.
2. Select the box to the left of the authentication handler you want to delete, and
then, on the button bar, click Delete.
3. In the Delete box, click OK to confirm or click Cancel to keep the authentication
handler.
2. From the Actions menu of the authentication handler whose priority you want
to change, click Properties.
4. On the Configuration page, in the Priority box, type the new priority.
5. Click Save.
2. From the Actions menu of the authentication handler you want to enable, click
Enable.
2. From the Actions menu of the authentication handler you want to disable, click
Disable.
Note: Before beginning this procedure, use the command: nslookup <IP_
address_of_server>
Ensure that this command succeeds on your OTDS server, and that it returns
otdsserver.domain.com, or the matching server name in the SPN.
3. Set the Java system properties by choosing one of the following options:
• Your third option is to set up a default /etc/krb5.conf file. Next, read the
manual entry by running the man krb5.conf command.
Important
1. If you change the service account's password you will require a new
keytab file.
2. If you change the keytab file you must restart Tomcat or WebSphere.
3. Any client workstations that have authenticated with OTDS using the
previous keytab file will need to sign out, then sign back in.
4. OpenText recommends that this procedure should be performed one
time, at OTDS installation time only, and subsequent updates to the
keytab file should be avoided.
1. Obtain the “Oracle E-Business Suite Software Development Kit for Java”:
a. Sign in to the “My Oracle Support” web site, for more information see
“References to external websites” on page 384.
b. Download the “Oracle E-Business Suite Software Development Kit for Java,
document number 974949.1”, for more information see “References to
external websites” on page 384.
c. Copy the fndext.jar file to your <Tomcat_home>/lib directory.
<applications_username>/<applications_username_pwd>
is an Oracle E-Business Suite user name and password, an applications user,
that you create for OTDS to use. That applications user must have the UMX|
APPS_SCHEMA_CONNECT role assigned to it.
You will provide these credentials, the user name and password that you
create here, in the Oracle EBS authentication handler.
<OTDS_server_node_name>
is the node name of the OTDS server.
<OTDS_server_IP_address>
is the IP address of the OTDS server.
<EBS_System_DBC_file>
is the location of your standard Oracle EBS system DBC file.
For Oracle E-Business Suite 11i, the DBC file is typically located under
$FND_TOP/secure. For Release 12, the DBC file is typically located under
$FND_SECURE. If the DBC file does not exist, the system administrator
should generate it using Autoconfig. See the Oracle E-Business Suite
System Administrator's Guide - Configuration for more information on
the DBC file.
4. After this command completes, it will generate a Desktop DBC file that you
must then specify in the Oracle EBS authentication handler created in OTDS.
1. Export the Identity Provider, IdP, metadata from the IdP into XML format.
Consult the provider's documentation for details.
2. Create a SAML 2.0 Authentication Handler. During the creation of your SAML
authentication handler, enter the parameters as follows:
a. In the Identity Provider (IdP) Name box, enter any name for the Identity
Provider.
b. You must specify only one of either IdP Metadata URL or IdP Metadata
File.
Note: The private key and certificate for OTDS are only required if
the IdP requires signed authentication requests, or if the IdP sends
encrypted assertions, or if the IdP encrypts the NameID.
j. In the Claim 1-10 and OTDS Attribute 1-10 boxes, you can specify
mappings of claims, or attribute statements, in the SAML assertion to
OTDS attributes. These mappings can only be used to set and update
attributes on an auto-provisioned SAML account. For more information,
see “Specifying mappings of claims in the SAML assertion” on page 169.
k. In the Trust Certificate 1-10 box, enter the certificates of other systems that
can authenticate over web services with a SAML token, for example WS-
Security with SAML assertions. This is only required if using web services
from custom written applications that use OpenText web services available
through Runtime and Core Services.
attribute to select for the Authentication Principal Attribute. You can view the
properties of any user to verify the desired attribute.
4. Obtain the OTDS Service Provider, SP, metadata to be imported into the IdP by
accessing the URL: http(s)://<OTDSserver:port>/otdsws/login?
SAMLMetadata=<name>, where <name> is the value entered in the Identity
Provider Name box of the handler's parameters.
5. Import OTDS' metadata from Step 4 into the IdP.
1. The WAM web server agent must be configured to intercept calls to Directory
Services. To allow the agent to intercept calls to Directory Services on Tomcat or
WebSphere, it is necessary to have the web server act as a reverse proxy to
Directory Services. As a result, Directory Services will be accessible through the
web server port, typically port 80. If you want the web server to forward traffic
destined for Directory Services, you must configure the web server.
If you are using Apache Tomcat, you can use the Tomcat Connector for this
purpose.
Note: Any native capability in the web server, such as the Application
Request Routing (ARR) for IIS, will not work if it routes requests before
the web server agent has processed the request.
The Tomcat Connector is available for IIS, Apache Web Server, and Sun ONE
Web Server from the “Apache Software Download web site”, for more
information see “References to external websites” on page 384.
2. All Directory Services application paths must be configured to be processed by
the connector in the uriworkermap.properties file. This includes the
following paths:
• /OTDSConnectors/*
• /ot-auth/*
• /ot-authws/*
• /ot-reg/*
• /ot-transfer/*
• /ot-trigger/*
• /ot-universaladmin/*
• /otds-system-configuration/*
• /otds-usergroup/*
• /otds-v2/*
• /otdsws/*
The complete list can be viewed through the Tomcat Manager user interface or
through the WebSphere Integrated Solutions Console.
Resources
This section describes creating, editing, and deleting resources. This section also
describes how to deliver user and group data to synchronized resources and how to
configure synchronized and non-synchronized resources for authentication.
You will need to create a new resource in Directory Services to represent each
application that you want to connect to your Directory Services server for
synchronization and authentication. You can create a non-synchronized resource or
a synchronized resource.
The Resources page displays an alphabetical list of all resources that you have
defined to represent the enterprise applications. It also displays the resource ID for
that resource, the display name, and the description.
By selecting any resource's Actions link, you can view and edit the Access Roles
that apply to this resource. You can also allow users on your resource to
impersonate users on another resource, manage synchronization of data from
Directory Services to your resource, and control authentication of users on this
resource. In certain cases, the control of authentication is a two-step process that
requires initiation of authentication in Directory Services followed by the actual
activation of authentication at the enterprise application.
Resources buttons
Services, then you must create a non-synchronized resource, install your resource,
and then change your non-synchronized resource to a synchronized resource and
map it to the installed resource.
2. On the button bar, click Add. The New Resource wizard will guide you
through the steps to create a new resource.
a. In the Resource name box, type a descriptive name for this resource.
Because a resource can be used by multiple products, you might consider
using the environment and purpose as your resource name. For example,
“Production document processing” or “Test billing system”. The name you
type here cannot be edited later.
b. Optional In the Display Name box, if you want this resource's displayed
name to be different than the name you provided in the previous box, the
Resource name box, type the name you want displayed on the Resources
page in this box. This box can be edited at a later date.
c. Optional In the Description box, type a short description of this resource.
Note: The resource identifier will not appear for a New Resource
creation but will be available for selection when editing an existing
resource. See “Editing a synchronized resource” on page 220 for more
information.
d. From the Sign in UI Version list, select which OTDS user interface to
display at the OTDS sign in page. To accept the default of the resource,
select “default” from the list. For more information, see “Customizing the
sign-in page” on page 356.
e. Optional In the Sign in UI Style box, type the full file name with extension of
the customized graphic to be applied to the OTDS login page. For example,
type “my_company_graphic.png”. For more information, see
“Customizing the sign-in page” on page 356.
f. Optional In the Sign out URL box, if you want to implement OTDS' single
sign out functionality, you must enter a value in this box and the Sign out
Method box.
Check the documentation for this resource being created for the value to
enter in this box. For more information, see “Single sign out” on page 353.
g. Optional From the Sign out Method list, if you want to implement OTDS'
single sign out functionality, you must enter a value in this box and the
previous box, the Sign out URL box.
The value you type to this box is supplied in the documentation for the
resource for which this is being created. For more information, see “Single
sign out” on page 353.
h. Click Next.
4. On the Synchronization page, clear the User and group synchronization box,
and then click Next.
b. Click Save.
b. Optional Click Verify Activation to check that the resource has activated
with Directory Services. An information box appears. Read the information,
then close the information box.
Important
After your resource has been created, you should configure access roles to
allow users with those access roles to sign in to your resource. A default
access role, Access to <Resource name> is created when you create a
resource. The group, [email protected] is automatically added to
this access role. This allows the user [email protected] to access your
resource. For more information on configuring access roles, see “Editing
access roles for your resource” on page 231.
1. From the web administration menu, click Resources, and then select the non-
synchronized resource you want to configure.
2. In the center pane, from the Actions menu associated with the non-
synchronized resource you want to configure, select one of the following:
• If you want to edit the non-synchronized resource, click Properties, and then
follow the instructions found in “Editing a non-synchronized resource”
on page 185.
• If you want to view or copy the resource identifier of your non-synchronized
resource, or if you want to verify your activation status, click Activation
Status.
• If you want to edit the access roles for this non-synchronized resource, click
Edit Access Roles, and then follow the instructions in “Editing access roles
for your resource” on page 231.
• If you want to edit the impersonation settings for this non-synchronized
resource, click Impersonation Settings, and then follow the instructions in
“Editing impersonation settings” on page 232.
2. From the Actions menu associated with the non-synchronized resource your
want to edit, click Properties.
4. On the Synchronization page, the User and group synchronization check box
is cleared because this is a non-synchronized resource.
6. Click Save.
1. From the web administration menu, click Resources, and then click the select
box to the left of the resource name you want to delete.
Note: You may want to click Refresh to confirm that the resource has been
deleted.
This section describes creating, editing, deleting, and importing user and group data
in synchronized resources.
Important
You must install Content Web Services before creating a synchronized
resource for Content Server. For more information on installing Content
Web Services, see OpenText Content Server - Installation Guide (LLESCOR-
IGD).
• eDocs DM: see “Connection parameters for eDocs DM resources” on page 196
• Enterprise Process Services: see “Configuring a synchronized resource for
Enterprise Process Services” on page 212
• MBPM: see “Connection parameters for MBPM resources” on page 196
• Media Management: see “Connection parameters for OpenText Media
Management resources” on page 196
• Process Component Library: see “Connection parameters for Process Component
Library resources” on page 197
• REST (Generic): see “Connection parameters for REST (Generic) resources”
on page 197
• Service Center: see “Connection parameters for Service Center resources”
on page 197
• WSM Delivery Server: see “Connection parameters for WSM Delivery Server
resources” on page 198
• WSM Management Server: see “Connection parameters for WSM Management
Server resources” on page 199
You can also customize the rights that Directory Services has to create, modify, or
delete users in your resource. For more information, see “Managing user and group
permissions for this resource” on page 188.
Tip: Whenever these permissions are changed, you should Consolidate all
users and groups that have access to this resource. For more information, see
“Consolidating users and groups in Partitions” on page 142.
Important
The __NAME__ attribute mapping must be configured to the user or sign in
name format desired for your resource. Select an OTDS attribute that will
ensure that the user/sign in names in the resource will be unique across all
users pushed. If users from only one partition will be accessing the resource, or
you are certain there are no user name conflicts between your partitions, you
can use oTExternalID1. Otherwise, use oTExternalID3 or oTExternalID4,
depending on the desired format.
You cannot specify a compound mapping for the __NAME__ attribute. A simple
mapping is required to do reverse lookups in Directory Services. Authentication
requires reverse-lookup of a user name, from the name in the resource to the actual
user object in OpenDJ. Because OTDS cannot perform the reverse lookup if the
account name is a compound value, user names in the resource must not be
computed as a compound mapping.
For more information about the __NAME__ attribute mapping, see __NAME__
on page 209.
When creating or editing a synchronized resource in OTDS, you have the option of
creating user and group attribute mappings between OTDS and your synchronized
resource. You can also customize the format of these mappings as follows:
Format Description
%l Format the string as lowercase.
%s Maintain the string as entered.
%u Format the string as uppercase.
%v Use this format option with values that are
DN's in order to translate to the user name or
group name of the target DN.
In general, you can use the Java Formatter syntax in addition to the specific options
listed in the table. For more information, see the “Java Formatter” reference in
“References to external websites” on page 384.
5.2.1.3.2 Support for javascript and multi-valued javascript in the Format column
The Format column also supports the use of %mvjs in order to be able to converge
multiple OTDS attribute values into a single resource attribute value.
javascript (%js)
Javascript is supported in the form “%js:<javascript>”. When using %js, the
javascript is invoked once for each attribute value.
multi-valued javascript (%mvjs)
Multi-valued javascript is supported in the form “%mvjs:<javascript>”. When
using %mvjs, the javascript is invoked once, with all OTDS attribute values
passed to the script as an array of values. The expected return value of %mvjs is
either:
The javascript must be a function called “format”. The parameters are the values of
the OTDS attributes.
This option references a URI to a file. If, for example, you have the following
mapping in OTDS:
– %js:file:/c:/temp/eFileNameConversion.js
– %mvjs:file:/c:/temp/eFileNameConversion.js
The second option is to place the javascript in the Format column directly.
Drawing from Example 5-1, “An example showing a javascript file referenced
in the Format column” on page 190, type one of the following in the Format
column:
%js:function format(name, type){ if (type == "1") return "wg_"+name; else if (type ==
"2") return "ag_"+name; else return name";}
This example shows one way to implement a mapping for a user's preferred
language as described in DisplayLanguage on page 207. This example
references a URI to a file. If, for example, you have the following mapping in
OTDS:
– %js:file:/c:/temp/DisplayLanguageFile.js
– %mvjs:file:/c:/temp/DisplayLanguageFile.js
if (lang.indexOf("ar")>=0) {
return "_ar";
} else if (lang.indexOf("ca")>=0) {
return "_ca_ES";
} else if (lang.indexOf("de")>=0) {
return "_de";
} else if (lang.indexOf("en")>=0) {
return "_en_US";
} else if (lang.indexOf("es")>=0) {
return "_es";
} else if (lang.indexOf("fi")>=0) {
return "_fi_FI";
} else if (lang.indexOf("fr")>=0) {
return "_fr";
} else if (lang.indexOf("it")>=0) {
return "_it";
} else if (lang.indexOf("iw")>=0) {
return "_iw";
} else if (lang.indexOf("ja")>=0) {
return "_ja";
} else if (lang.indexOf("kk")>=0) {
return "_kk_KZ";
} else if (lang.indexOf("ko")>=0) {
return "_ko_KR";
} else if (lang.indexOf("nl")>=0) {
return "_nl";
} else if (lang.indexOf("pl")>=0) {
return "_pl_PL";
} else if (lang.indexOf("pt")>=0) {
return "_pt";
} else if (lang.indexOf("ru")>=0) {
return "_ru_RU";
} else if (lang.indexOf("sv")>=0) {
return "_sv";
} else if (lang.indexOf("zh")>=0) {
if (lang.indexOf("tw")>=0 || lang.indexOf("hk")>=0) {
return "_zh_TW";
}
return "_zh_CN";
} else if (lang.indexOf("uk")>=0) {
return "_uk_UA";
}
return "_en_US";
}
You need to modify the text above to remove any conditions for language
packs that are not installed on your system.
This example shows one way to implement a mapping for a user's gender as
described in Gender on page 208. This example places the javascript in the
Format column directly, and can be used if the gender attribute accepts either
“m” or “f” in OTDS. You would need to adapt this javascript for other cases.
– %js:function format(gender) {
if ("m".equals(gender)) {
return 0;
} else if ("f".equals(gender)) {
return 1;
}
return null;
}
– %mvjs:function format(gender) {
if ("m".equals(gender)) {
return 0;
} else if ("f".equals(gender)) {
return 1;
}
return null;
}
You can also use resource attribute mappings to automatically create groups in your
resource based on attributes of the users.
The following examples walk you through some common scenarios. To access the
Add User Attribute to Mapping dialog box referenced in these examples, do the
following:
You do this by adding a user attribute mapping from your Directory Services
attribute to your resource. In the Add User Attribute to Mapping dialog box,
do the following:
Example 5-6: You can also create groups for each department using a
user attribute mapping
The group name in the resource will be taken from the department number in
Directory Services.
4. Click Save.
Example 5-7: If you add “department” to the format and a user has
oTDepartment=Finance, then that user will be added to the Finance
department resource group using the following mapping:
4. Click Save.
Multiple source attributes should each have a %s in the format. If you have a
user with the following attribute values:
• firstName=Fred
• surname=Smith
• title=Mr
Then using the following mapping, the value for Fred's displayName in the
resource will be “Mr. Fred Smith”.
4. Click Save.
2. Configure access roles for this resource. See “Configuring access to your
Content Server resource” on page 224.
3. Complete the authentication activation process for this resource with the
administrative interface of Content Server. You will use Directory Services
Integration Administration to connect your Directory Services resource to your
Content Server. See “Configuring Directory Services integration administration
in Content Server” on page 225.
This section defines the connection parameter options that you need to enter in the
Advanced Connection Information page of the resource creation assistant when
you are creating a synchronized resource for Content Server. The connection
parameters are required for Directory Services to communicate with Content Server:
Type the symbol for ditto " for the CS domain if you want to
use the same name as the partition name:
<Mappings>
<M>
<P>Partition Name 1</P>
<D>"</D>
</M>
</Mappings>
Photo
This optional user attribute mapping needs to be created by the administrator. It
allows you to map a Content Server photo attribute to either a JPEG photo or a
photo in OTDS, pushed from the synchronized partition.
In addition to creating the mapping for the Photo user attribute in OTDS, you
will also need to edit the REST API URL text box. For more information, see the
REST API URL information in “Connection parameters for Content Server
resources” on page 201.
To map this photo in OTDS, do the following:
1. In OTDS, in Resources, from your Content Server's Actions menu, click
Properties.
2. On the Connection Information page, in the REST API URL parameter,
type:
http://<fully_qualified_server_name>/<Content Server_service_name>/cs.exe/api
Manager
This optional user attribute mapping needs to be created by the administrator. It
allows you to map a Content Server manager attribute to the OTDS attribute
DisplayLanguage
This optional user attribute mapping needs to be created by the administrator. It
allows you to set the user's PreferredLanguage setting in Content Server.
In addition to creating the mapping for the DisplayLanguage user attribute in
OTDS, you will also need to edit the REST API URL text box. For more
information, see the REST API URL information in “Connection parameters for
Content Server resources” on page 201.
To map this language in OTDS, do the following:
Gender
This optional user attribute mapping needs to be created by the administrator. It
allows you to set the user's Gender setting in Content Server.
In addition to creating the mapping for the Gender user attribute in OTDS, you
will also need to edit the REST API URL parameter. For more information, see
the REST API URL information in “Connection parameters for Content Server
resources” on page 201.
To map this gender in OTDS, do the following:
2. On the Connection Information page, in the REST API URL text box, type:
http://<fully_qualified_server_name>/<Content Server_service_name>/cs.exe/api
__NAME__
You can set whether to preserve the case of user and group names being pushed
to Content Server or whether to set them to either lower or upper case. You can
set user name case sensitivity on the User Attribute Mappings page. You can set
group name case sensitivity on the Group Attribute Mappings page.
In the Format text box:
For more information, see “Using resource attribute mappings” on page 189.
Note: If you want to manage users through the Content Server user
interface instead of the OTDS administration UI, set the Disable Resource
Name Formatting on page 298 and Disable Resource Name Mapping
on page 299 system attributes to “true” on the Content Server Members
partition when the Content Server resource is using a non-default__NAME__
attribute mapping.
GroupID
The default mapping between the Content Server attribute GroupID and the
OTDS attribute oTDepartment defines the user's base group, for example the
department, in Content Server. The user's department in Content Server is
equivalent in concept to a Unix user's primary GID, and, as such, a group must
exist in Content Server to represent this department.
For this reason, you should be aware of the mapping of the OTDS attribute
oTDepartment in your synchronized user partition's user attribute mappings,
and realize that a group will be created in Content Server to represent the user's
department.
If you remove the default mapping between the Content Server attribute
GroupID and the OTDS attribute oTDepartment, users will be created in the
Content Server Default Group.
Content Web Services supports mapping a limited number of the resource user
attributes. The following table lists the resource user attributes that Content Web
Services supports mapping:
Attribute Meaning
FirstName First Name
MiddleName Middle Name
LastName Last Name
Phone Phone Number
Fax Fax Number
GroupID Department
Title Job Title
MailAddress Email Address
OfficeLocation Office Location
TimeZone Time Zone
UserPrivileges Privileges
Environment Variable
The Environment Variable parameter allows you to choose which variable
to use for determining the user name. By default, this will be set to REMOTE_
USER. Other authentication schemes may set Environment Variable to a
different value, such as Siteminder, which uses the value HTTP_SM_USER.
Username Formatting
The Username Formatting area allows you to select how to format the value
in the above environment variable.
• Remove domain name: this will display the user name only. Choose this
option if uniqueness of user names is guaranteed across all domains in
your Windows domain registry. This is the default selection.
• Do not format: this will leave the user name unchanged. Choose this
option if uniqueness of user names is guaranteed only within each domain
in your Windows domain registry.
• Resolve through OTDS: the value from REMOTE_USER is sent to OTDS in
order to find the corresponding user name in Content Server. You must
configure OpenText Directory Services. For more information, see
OpenText Directory Services - Installation and Administration Guide (OTDS-
IWC) and the OTDS Release Notes on OpenText My Support (https://
knowledge.opentext.com/go/OTDS), and then select Documentation.
Integration Settings
This area provides Content Server with the information it needs to access either
the internal or the external version of OTDS. All three boxes in this area are
required.
If you are accessing an internal version of OTDS, Content Server's installation
will have populated the following three boxes: OTDS Server URL, OTDS Sign
In URL, and Resource Identifier.
If you are accessing an external version of OTDS, the Admin must first create a
Content Server resource in OTDS. For more information, see OpenText Directory
Services - Installation and Administration Guide (OTDS-IWC) and the OTDS
Release Notes on OpenText My Support (https://knowledge.opentext.com/go/
OTDS), and then select Documentation.
During the process, a unique identifier, called the resource ID, is generated. The
resource ID and the OpenText Directory Services server URL are required
values, and must be entered to set up OTDS Authentication in Content Server.
For more information, see OpenText Directory Services - Installation and
Administration Guide (OTDS-IWC) and the OTDS Release Notes on OpenText
1. In the web administration client, click Resources, and then create a resource for
the second Content Server using the New Synchronized Resource wizard.
Make sure you enter the fully-qualified domain names for the two WSDL
definitions of your second Tomcat or WebSphere instance.
3. Add users and groups to the access role for your second Content Server.
This section defines the connection parameter options that you need to enter in the
Connection Information page of the resource creation assistant when you are
creating a synchronized resource for Enterprise Process Services. The connection
parameters are required for Directory Services to communicate with Enterprise
Process Services:
The following parameters describe your connection options when you are creating
your resource:
2. From the button bar, click Add. The New Resource assistant will guide you
through the steps to create a new resource.
a. In the Resource name box, type a descriptive name for this resource.
Because a resource can be used by multiple products, you might consider
using the environment and purpose as your resource name. For example,
“Production document processing” or “Test billing system”. The name you
type here cannot be edited later.
b. Optional In the Display Name box, if you want this resource's displayed
name to be different than the name you provided in the previous box, the
Resource name box, type the name you want displayed on the Resources
page in this box. This box can be edited at a later date.
Note: The resource identifier will not appear for a New Resource
creation but will be available for selection when editing an existing
resource. See “Editing a synchronized resource” on page 220 for more
information.
d. From the Sign in UI Version list, select which OTDS user interface to
display at the OTDS sign in page. To accept the default of the resource,
select “default” from the list. For more information, see “Customizing the
sign-in page” on page 356.
e. Optional In the Sign in UI Style box, type the full file name with extension of
the customized graphic to be applied to the OTDS login page. For example,
type “my_company_graphic.png”. For more information, see
“Customizing the sign-in page” on page 356.
f. Optional In the Sign out URL box, if you want to implement OTDS' single
sign out functionality, you must enter a value in this box and the Sign out
Method box.
Check the documentation for this resource being created for the value to
enter in this box. For more information, see “Single sign out” on page 353.
g. Optional From the Sign out Method list, if you want to implement OTDS'
single sign out functionality, you must enter a value in this box and the
previous box, the Sign out URL box.
The value you type to this box is supplied in the documentation for the
resource for which this is being created. For more information, see “Single
sign out” on page 353.
h. Click Next.
Tip: When creating a Content Server resource, leave the Delete users
and groups check box cleared to ensure that Directory Services does
not delete any Content Server users or groups.
d. Click Next.
Important
Take care when entering values to this page as the information entered
here cannot be verified by OTDS.
a. Map your Directory Services user attributes to the equivalent user attribute
in the resource. For more information about attribute mappings, see “Using
resource attribute mappings” on page 189.
To edit the text boxes in the Resource Attribute, OTDS Attribute(s) or
Format columns, click in the cell you want to edit, then type your change.
Use the Format text box to customize your attribute mapping. For more
information, see “Applying user partition attribute mappings” on page 98.
b. Optional If you want to add another user attribute, click Add Attribute to
Mappings. In the three text boxes, do the following:
i. In the Resource Attribute text box, type the resource attribute name.
ii. In the OTDS Attribute(s) text box, type the OTDS user attribute name.
iii. In the Format text box, type the format to be used. For more
information, see “Support for javascript and multi-valued javascript in
the Format column” on page 190.
iv. Click Save.
c. Optional If you want to delete a user attribute, click the select box to the left
of the attribute you want to delete, and then click Delete Selected.
Important
There is no delete confirmation box. Be cautious when deleting a user
attribute mapping.
d. Optional If you want to return to the default mappings, click Reset to
Default.
By clicking Reset to Default, all OTDS user attribute mappings will be
reverted to the default settings at installation, and all custom user attribute
mappings you have created will be deleted.
e. Click Next.
Important
Take care when entering values to this page as the information entered
here cannot be verified by OTDS.
i. In the Resource Attribute text box, type the resource attribute name.
ii. In the OTDS Attribute(s) text box, type the OTDS group attribute
name.
iii. In the Format text box, type the format to be used. For more
information, see “Support for javascript and multi-valued javascript in
the Format column” on page 190.
iv. Click Save.
c. Optional If you want to delete a group attribute, click the select box to the left
of the attribute you want to delete, and then click Delete Selected.
Important
There is no delete confirmation box. Be cautious when deleting a
group attribute mapping.
d. Optional If you want to return to the default mappings, click Reset to
Default.
By clicking Reset to Default, all OTDS group attribute mappings will be
reverted to the default settings at installation, and all custom group
attribute mappings you have created will be deleted.
e. On the button bar, click Save.
a. Copy the resource identifier to use the resource identifier in the resource's
configuration to activate the resource with Directory Services.
Tip: You can Edit a resource to copy the resource identifier at any
time. For more information, see “Editing a synchronized resource”
on page 220.
b. Optional Click Verify Activation to check that the resource has activated
with Directory Services.
Important
After your resource has been created, you should configure access
roles to allow users with these access roles to sign in to your resource.
A default access role, Access to <Resource name>, is created when
you create a resource. The group, [email protected], is
automatically added to this access role. This allows the user
[email protected] to access your resource. For more information
on configuring access roles, see “Editing access roles for your
resource” on page 231.
c. Click OK to close the Resource Activation window.
1. From the web administration menu, click Resources, and then select the non-
synchronized resource you created for Enterprise Process Services in “Creating
a non-synchronized resource” on page 183. If you have not created a non-
synchronized resource, follow the steps in “Creating a non-synchronized
resource” on page 183, and then return to these steps.
2. In the center pane, from the Actions menu associated with the non-
synchronized resource you created for Enterprise Process Services, click
Properties.
3. On the General Information page, make any changes you want to the general
resource properties, and then click the Synchronization tab.
a. Enter the connection parameters that are required for Directory Services to
communicate with Enterprise Process Services.
a. Map your Directory Services user attributes to the equivalent user attribute
in the resource. For more information about attribute mappings, see “Using
resource attribute mappings” on page 189.
b. Click Save.
a. Copy the resource identifier to use the resource identifier in the resource's
configuration to activate the resource with Directory Services.
b. Optional If you want to check that the resource has activated with Directory
Services, click Verify Activation.
Important
After your resource has been created, you should configure access roles to
allow users with those access roles to sign in to your resource. A default
access role, Access to <Resource name> is created when you create a
resource. The group, [email protected] is automatically added to
this access role. This allows the user [email protected] to access your
resource. For more information on configuring access roles, see “Editing
access roles for your resource” on page 231.
Tip: You can Edit a resource to copy the resource identifier at any time.
9. Edit the Access to <your resource> access role to allow users and groups in
the Enterprise Process Services access role to access your User Management
Server. For more information, see “Access Roles“ on page 237. These users and
groups will be pushed to User Management Server.
They will appear in the web administration client in Enterprise Process
Services > User Management Server > Users and Groups.
After you change a user, group, or access role in Directory Services, User
Management Server will be automatically synchronized. If a user or group is
removed from the access role, the user will be disabled in User Management
Server.
1. From the web administration menu, click Resources, and then select the
synchronized resource you want to configure.
2. In the center pane, from the Actions menu associated with the synchronized
resource you want to configure, select one of the following:
• If you want to edit the synchronized resource, click Properties, and then
follow the instructions found in “Editing a synchronized resource”
on page 220.
• If you want to view or copy the resource identifier of your synchronized
resource, or if you want to verify your activation status, click Activation
Status.
• If you want to edit the access roles for this synchronized resource, click Edit
Access Roles, and then follow the instructions in “Editing access roles for
your resource” on page 231.
• If you want to edit the impersonation settings for this synchronized
resource, click Impersonation Settings, and then follow the instructions in
“Editing impersonation settings” on page 232.
• If you want to turn user synchronization on or off, click Turn User
Synchronization On/Off, and then follow the instructions in “Turning user
synchronization on or off” on page 233.
• If you want to consolidate the resource, click Consolidate, and then follow
the instructions in “Consolidating a synchronized resource” on page 223.
1. From the web administration menu, click Resources, and then select the
synchronized resource you want to edit.
2. In the center pane, from the Actions menu associated with the synchronized
resource you want to edit, click Properties.
a. The User and group synchronization check box is selected because this is a
synchronized resource. You can optionally change this resource to a non-
synchronized resource by clearing the User and group synchronization
check box.
b. From the Synchronization connector list, select your desired connector.
For more information about user and group synchronization, see “User and
group synchronization” on page 188.
c. In the This connector will area, grant rights to allow Directory Services to
create and modify users and groups in your connector. You can select the
Create users and groups, Modify users and groups and/or Delete users
and groups check boxes.
Tip: Leave the Delete users and groups check box cleared when
creating a Content Server resource to ensure that Directory Services
does not delete any Content Server users and groups. For more
information, see “Managing user and group permissions for this
resource” on page 188.
d. Click Save if you have finished editing your resource, or click Connection
Information to proceed to the next page.
5. On the Connection Information page, do the following:
a. You can edit the connection information for your connector. Connection
parameters descriptions for each synchronization connector are linked
below. You also have the option of clicking Parameters Descriptions to
open these descriptions.
a. Map your Directory Services user attributes to the equivalent user attribute
in the resource. For more information about attribute mappings, see “Using
resource attribute mappings” on page 189.
b. Optional If you want to add another user attribute, click Add Attribute to
Mappings. In the three text boxes, do the following:
i. In the Resource Attribute text box, type the resource attribute name.
ii. In the OTDS Attribute(s) text box, type the OTDS user attribute name.
iii. In the Format text box, type the format to be used.
iv. Click Save.
c. Optional If you want to delete a user attribute, click the select box to the left
of the attribute you want to delete, and then click Delete Selected.
Important
There is no delete confirmation box. Be cautious when deleting a user
attribute mapping.
i. In the Resource Attribute text box, type the resource attribute name.
ii. In the OTDS Attribute(s) text box, type the OTDS group attribute
name.
iii. In the Format text box, type the format to be used.
iv. Click Save.
c. Optional If you want to delete a group attribute, click the select box to the left
of the attribute you want to delete, and then click Delete Selected.
Important
There is no delete confirmation box. Be cautious when deleting a
group attribute mapping.
d. On the button bar, click Save.
1. From the web administration menu, click Resources, and then select the
synchronized resource you want to consolidate.
2. In the center pane, from the Actions menu associated with the synchronized
resource you want to consolidate, click Consolidate.
Note: The product or resource may not support the following delete
functionality. If the product or resource does not support this delete
functionality, an error will be written to the otds.log file.
a. Optional Select Delete users that are not consolidated if either of the
following is true:
• If you need to remove users created in the resource by means other than
through OTDS.
• If you need to deal with cases where OTDS could not reach the
resource, for whatever reason, in order to delete users when they are
deleted in OTDS.
b. Optional Select Delete groups that are not consolidated if either of the
following is true:
2. Click the select box to the left of the synchronized resource you want to delete,
and then, on the button bar, click Delete.
2. From the Actions menu associated with the Access to <Resource name> access
role, click View Access Role Details. Add any additional users, groups, or
organizational units. For more information, see “Assigning members to an
access role” on page 238.
3. Click Save.
Tip: You can use a shortcut to access this page directly, http://<fully_
qualified_server_name>/<Content Server_service_name>/cs.exe?
func=otdsintegration.settings.
An example of a URL is: http://machine1.opentext.com/OTCS/cs.exe?
func=otdsintegration.settings
• Remove domain name: this will display the user name only. This is the
default selection.
If you are using an internal installation of OTDS, leave Remove domain
name selected.
• Do not format: this will leave the user name unchanged.
• Resolve through OTDS: the value from REMOTE_USER is sent to OTDS
in order to find the corresponding user name in Content Server. You
must configure OpenText Directory Services. For more information, see
OpenText Directory Services - Installation and Administration Guide (OTDS-
IWC).
d. In the Username Case Sensitivity area, click Preserve Case to preserve the
user name when the user signs in to Content Server or click Lowercase to
change the user name to all lowercase letters when the user signs in to
Content Server.
If you are using an internal installation of OTDS, leave Preserve Case
selected.
a. In the OTDS Server URL box, enter the URL of the Directory Services
server.
The URL must include the fully-qualified domain and port number of the
Directory Services server. For example, the URL would be one of:
• http://<server_name>:<port_number>
• https://<server_name>:<port_number>
Note: The connection test does not check whether the OpenText
Directory Server is configured properly with Content Server. It only
checks that the URL provided in the OTDS Server URL box is valid.
a. In the OTDS Sign In URL box, specify a URL to which users are redirected
when they sign in. For an example of the URL convention, see Step 3.a.
Note: You might choose to select this option when OTDS is only
accessible to users through an external URL.
b. If you want to display a log-out option for users that are authenticated with
single sign on, select Show log-out option for SSO users.
5. In the Web Administrator Password area, type the Content Server Web
Administrator Password in the box provided, and then click Save.
5.2.8.3 Migrating users and groups from Content Server 10.5 to Directory
Services 21.3.x
If you have Content Server 10.5 in your existing environment, and you install
Content Server 21.3.x with an internal installation of Directory Services, you can
select an option to migrate all Content Server 10.5 users and groups into the new,
internal installation of OTDS.
You can also perform this migration if you have installed the stand-alone version of
OTDS 21.3.x.
Following this migration, all existing users and groups in OTDS contained in the
Content Server Members partition, and any Content Server domain partitions, will
be replaced with users and groups in the current database.
First follow these steps to access the User and group migration page:
1. Sign in to Content Server as the admin and open the Content Server
Administration page.
2. After signing into the Content Server Administration page as the admin, type
the following to access the migration page directly, http://<fully_qualified_
server_name>/<Content Server_service_name>/cs.exe?func=
otdsintegration.migrate
1. If your Content Server installation uses an internal installation of OTDS and you
want to change your Content Server database, or you are upgrading your
installation of Content Server, then you must first follow the instructions in “To
Export OTDS Data” in the OpenText Directory Services Integration Administration -
OpenText Content Server (LLESDSI-H-AGD).
During the process of changing your Content Server database or upgrading
your Content Server installation, you will see the User and group migration
page.
2. On the User and group migration page, in the OTDS Partition box, type the
name of the OTDS partition that will be used by Content Server. This is the
OTDS partition that stores any users and groups created in Content Server or
migrated from the Content Server database.
Note: The partition name you enter will only be used when users and/or
groups are migrated from the Content Server database, or when users
and/or groups are created directly in Content Server instead of being
created through OTDS.
3. You can only choose to perform one of either migrating your Content Server
users and groups, or importing your OTDS data. Do one of the following:
Important
The migration function cannot distinguish users synchronized
from OTDS from internal Content Server users. If you have
already synchronized new users and/or groups from OTDS to
Content Server, and you use the migration option, you will end
up with duplicate users and groups.
There are three options associated with the Migrate option. You can
select any of the following:
You will now need to import your OTDS data. Select the Import OTDS
data box. The Import option will import users and groups, as well as OTDS
configuration.
c. In the LDIF data file box, type the pathname and filename to the ldif file
that you created when you exported your data in OpenText Directory
Services Integration Administration - OpenText Content Server (LLESDSI-H-
AGD).
4. Type the Content Server Web Administrator Password in the box provided,
and then click Continue. This process may take a few minutes.
Important
When the administrator attempts to migrate data from one 21 version of OTDS
to another, the passwords for the users set within any synchronized partition
or any synchronized resource will not migrate. This specifically applies to the
passwords for the users that communicates with the synchronized partition or
synchronized resource.
After the migration procedure has finished, the administrator must go into
their synchronized partition or synchronized resource in OTDS and manually
add those passwords.
For more information, see “Using impersonation” on page 231 and “Editing
impersonation settings” on page 232.
• Turn on synchronization of changes made in Directory Services so that they are
delivered to your synchronized resource automatically using the resource
connector.
After your synchronized resource is set up you can manage synchronization of
data changes from Directory Services to your resource. You may want to
Consolidate changes to users and groups in your user partitions to deliver bulk
updates to your resource after you have turned on user synchronization. For
more information, see “Turning user synchronization on or off” on page 233.
Using impersonation
Impersonation should only be allowed when an application needs to perform
actions in the system as another user. This can be required, for example, if an
application runs background jobs on behalf of users. The corresponding
application's documentation will specify whether impersonation is required.
A resource can only impersonate users that have been granted access to that
resource.
1. From the web administration menu, click Resources. From your resource's
Actions menu, click Edit Access Roles.
2. On the Edit Access Roles for resource <resource_name> page, select check boxes
for each Access Role to be granted permission to sign in to this resource. All
users and groups in this access role will be allowed to sign in to this resource.
3. Click OK.
1. From the web administration menu, click Resources. From your resource's
Actions menu, click Notifications.
a. Select the Disable Notifications check box if you do not want notifications
for license usage for this resource.
b. In the E-mail Addresses text box, type, each on a new line, the email
addresses of each individual who should receive these notifications.
If no email addresses are specified, the email address from the General
Notifications area in “Notifications Settings” on page 323 will be used. If
there is no email address in either text box, no notifications will be sent.
d. Click OK.
Note: You can edit impersonation settings for a resource or for an OAuth
client.
2. Select your synchronized resource's Actions menu, and then click Turn User
Synchronization On.
2. Select your synchronized resource's Actions menu, and then click Turn User
Synchronization Off.
For example, Content Server requires that you use the Directory Services
Integration Administration page in Content Server Administration to activate
authentication. When you activate Content Server for authentication using Directory
Services Integration Administration you will need to supply the <server name> and
<port> of your Directory Services server and the resource identifier that you were
given when you created your synchronized Content Server resource.
Tip: Refresh your resource in the web administration client after completing
activation on your resource.
After a resource is activated and enabled for authentication, the following actions
will be available:
1. From the web administration menu, click Resources. From your resource's
Actions menu, click Enable Authentication.
2. Confirm that you want to enable authentication for this resource, and then click
Enable Authentication.
1. From the web administration menu, click Resources. From your resource's
Actions menu, click Disable Authentication.
2. Confirm that you want to disable authentication for this resource, and then click
Disable Authentication.
This section describes creating, editing, and deleting access roles. This section also
describes how to assign members to access roles and allow users with particular
access roles to sign on to selected resources.
You will need to create access roles to define for which resources you want your
users and groups to have sign in privileges. An access role can be assigned to users
or groups for any number of resources.
Note: An access role will only enable authentication for a resource. The
resource may still deny access based on authorization to use a function.
Directory Services does not manage authorization for components.
The Access Roles page displays a list of all access roles that you have defined to
control who can access which resources. This page also displays whether groups are
included in this access role.
When you select an access role's Actions menu, you can view the Members of that
access role and the Resources that they are allowed to access. Members of an access
role can be user partitions, organizational units, individual users, groups, or
application roles. You can also view the resources that members of this access role
are allowed to access. Both the members and the resources can be edited.
3. In the Name text box, type the name of this new access role.
The name of the access role should clearly indicate what type of users you are
describing with this particular access privilege. For example, Development
Managers, Development Managers (NA), Employees. Access role names must
be unique. The name Local RCS Administrators is a reserved access role
name.
4. Optional In the Description text box, type a description of this new access role.
5. Click Save.
2. From your access role's Actions menu, click View Access Role Details.
Note: If your user partition is small, it may be easier to add all users in a
user partition to a particular access role. If you have a large number of
users in a user partition, it is more efficient to select only the groups that
require access to the resource.
• If you want to add all members in a user partition to an access role, click to
select the User Partitions tab.
• If you want to add all users in an organizational unit to an access role, click
to select the Organizational Units tab. This adds all users in the
organizational unit to this access role. Groups within organizational units
are not added by default. For more information, see “Including groups from
organizational units in an access role” on page 238. Organizational units
appear with an organizational unit icon after they are added.
You cannot selectively exclude users from this access role after your
organizational unit has been added to this access role. For more information,
see “Including organizational units in an access role” on page 238.
• If you want to add specific users to an access role, click to select the Users
tab. Users appear with a user icon after they are added.
Note: Users found by the search that are already members of the access
role are shown in the results but you cannot select and add them again.
• If you want to add all members in a group to an access role, click to select
the Groups tab. Groups appear with a group icon after they are added.
• For information about the Resources tab, see “Assigning access roles to
resources” on page 241.
5. On the Add <item> - <access_role_name> page, select the check box to the left of
each <item> whose members you want to assign to this access role. If you are
adding users, click to select each specific user you want to add. This will add
either the specific user selected, or all users in the partition, organizational unit,
or group to your access role.
6. Click Add Selected Items to Access Role, and then click Close Dialog.
b. From your access role's Actions menu, click View Access Role Details.
c. Select the relevant tab to display the members in the access role. Select one
of User Partitions, Organizational Units, Users, Groups, Roles or
Resources depending on what you want to remove from the access role.
d. Select the check box to the left of the item you want to remove from the
access role, and then, click Delete.
e. Click Save.
2. From the access role's Actions menu, click View Access Role Details.
4. Click Add.
a. Click to select all resources to which the access role members will be
allowed to sign in.
b. Click Add Selected Items to Access Role, and then click Close Dialog.
1. From the web administration menu, click Access Roles, and then click in the
Description text box of the access role you want to edit.
2. Edit the description of this access role. No other text boxes can be edited.
3. Click Save.
2. On the Access Roles page, click the select box to the left of your access role, and
then click Delete.
Important
After an access role has been deleted, users in this access role will no
longer have access to its resources unless they are also mapped to this
resource through another access role.
This section describes viewing, editing, and consolidating user and group
information. The Users and Groups page provides a common access point to all the
users and groups that are found in all user partitions in Directory Services. This
includes both synchronized users and non-synchronized users.
The Users and Groups page displays all users and groups across all partitions. You
can view details such as the user partition to which the user or group belongs, and
the location, in that partition, of the user or group.
Tip: The number of users and groups displayed is defined by the Results per
page list. Click Previous or Next to page through the results. The search box
can also be used to find particular users or groups to limit your display.
From any user's or group's Actions menu, you can view user details such as the
groups of which a user is a member. You can view group details such as the list of
users who belong to a group and the groups of which a particular group is a
member. The search function allows you to display a specific number of users and
groups that match your search criteria.
Note: OTDS searches only attributes related to the user's identifier and name.
Users
When you select Edit Membership from any user's Actions menu, a list of groups
that this user is a Member Of is displayed. For more information on viewing and
editing users, see “Configuring users” on page 249.
Selected users can be consolidated to all their resources. For more information, see
“Consolidating users” on page 251.
Groups
When you select Edit Membership from any group's Actions menu, the following is
displayed:
For more information on viewing and editing groups, see “Configuring groups”
on page 256.
Selected groups can be consolidated to all their resources. For more information, see
“Consolidating groups” on page 262 to consolidate a selected group.
When the user logs into OTDS for the first time:
1. The user will be taken to a Secret Key page. The user will need to enter the
secret key to their TOTP client.
2. Their TOTP client will then provide them with a time-sensitive authentication
code. The user must enter the authentication code to the Authentication Code
text box on the OTDS sign in page.
Inherit settings
If you select this option, the two-factor authentication settings defined for the
parent object will take effect. OTDS will first check to see if there is an existing
setting for two-factor authentication on a parent. If there is no parent two-factor
authentication setting to inherit, OTDS will apply the global setting.
The order of inheritance that OTDS checks:
1. organizational unit membership
2. partition
3. global settings
When you select Inherit settings, the settings that will be inherited will be
displayed, dimmed. This allows you to see the inherited settings that you will be
applying, including whether two-factor authentication has been enabled. If these
are not the settings you want applied, change your selection to Define settings
on page 246 to make changes.
Define settings
If you select this option, you will need to choose your two-factor authentication
settings from the options below. These settings will override the settings on any
parent object.
You must first select Enable two-factor authentication to allow you to choose
from among the following settings. This option enables two-factor
authentication for users in the partition, organizational unit, or group. If you
clear this option, you will disable two-factor authentication for those users.
• Intranet subnets that aren't within the standard private IP ranges can be
configured using the OTDS system attribute otds.as.intranetSubnets
on page 310.
• To ensure that the values in the X-Forwarded-For header or the
Forwarded header are trusted, all proxies in the request, including the
immediate caller's IP, need to be listed in the OTDS system attribute
otds.as.trustedProxies on page 310.
Allow skipping
Select this option to allow the users to skip two-factor authentication when
they login from a remembered device. A remembered device is a client from
which the users has successfully logged in to OTDS with an authentication
code previously.
• directory.auth.ThirdPartyTwoFactorProvider=duo
For more information, see Third-Party Two-Factor Authentication Provider
on page 316.
• duo.akey=<DUO application secret key>. This value is generated by OTDS and
should not be manually configured.
For more information, see duo.akey on page 300.
• duo.host=<DUO API hostname>
For more information, see duo.host on page 300.
• duo.ikey=<DUO integration key>
For more information, see duo.ikey on page 300.
• duo.skey=<DUO secret key>
For more information, see duo.skey on page 301.
3. As with embedded two-factor authentication in OTDS, the two-factor
authentication must be configured in OTDS on the users, groups, or partitions as
detailed in “Enabling two-factor authentication” on page 114.
manager. For more information about Symantec VIP, see “References to external
websites” on page 384.
You need to complete the following in order to enable two-factor integration using
Symantec VIP:
1. From the web administration menu, find the user for whom you want to reset
the secret key.
2. From the Actions menu associated with the user you want to edit, click Two
Factor Auth Settings.
3. In the Two Factor Authentication Settings box, click Reset Secret Key to reset
the secret key for the user. The user will be provided a new secret key for their
TOTP client the next time they login. For more information, see “Configuring
two-factor authentication” on page 245.
Only users in non-synchronized user partitions may be edited. To create a new user
in a non-synchronized user partition, you must use the New User assistant from the
User Partitions page. For more information, see “Creating users in a non-
synchronized user partition” on page 122.
To delete a user from a non-synchronized user partition, you must use the Delete
action from the User Partitions page. For more information, see “Deleting users”
on page 256.
This is the special administrative user that must be used to configure the Directory
Services server. It is automatically added as a member of each of the default groups.
3. Below the button bar, select one of the two search options, either Starts with or
Contains.
4. In the Search text box, type the text for which you want to search.
5. Click Search.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. From the Actions menu associated with the user you want to edit, click
Properties. You can use the search box to find the user.
3. Optional From the Actions menu associated with any user you want to edit, do
the following:
• If you want to consolidate this user, click Consolidate, and then see
“Consolidating users in a partition” on page 126.
• If you want to set two factor authentication for this user, click Two Factor
Auth Settings, and then see “Enabling two-factor authentication”
on page 129.
• If you want to edit the groups to which this user belongs, click Edit
Membership, and then see “Editing members of groups in a non-
synchronized user partition” on page 131.
• If you want to view recursive memberships for this user, click View
Recursive Membership, and then see “To view all application roles
(recursively) assigned to a specific user, group, or application role”
on page 272.
• If you want to edit the application roles to which this user belongs, click Edit
Application Roles, and then see “Editing an application role” on page 269.
• If you want to view the application roles to which this user belongs, click
View Effective Roles, and then see “Editing an application role”
on page 269.
• If you want to reset this user's password, click Reset Password, and then see
“Resetting a user password in a non-synchronized user partition”
on page 127.
• If you want to allocate this user to a license, click Allocate to License, and
then see “Allocate to license” on page 255.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
• If you want to delete this user, see “Deleting users in a non-synchronized
user partition” on page 129.
Tip: You can also, from the web administration menu, click Partitions and
then, from the user partition's Actions menu, select View Members. Select
the Users tab.
3. From the Actions menu associated with the user you want to consolidate, select
Consolidate. You can use the Search box to find the user.
If you know of a user who should be present in OTDS but is not listed, you can
consolidate that missing user as follows:
3. In the Account DN box, enter the DN of the missing user in the User DN box.
4. Click OK.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user for whom you want the password reset, or use the Search box to
find the user.
From the Actions menu associated with the user whose password you want to
reset, select Reset Password.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user whose account you want unlocked, or use the Search box to find
the user.
From the Actions menu associated with the user whose account you want to
unlock, select Properties.
4. Click Save.
You can choose to define settings at one level and then define at a lower level to
override those settings. For example, you can enable two-factor authentication
globally but define it as disabled for a specific user, group, organizational unit, or
partition.
1. Optional If you want to set two-factor authentication global settings for all users,
groups, organizational units, and partitions:
Note: For information about resetting a user's secret key, see “Resetting a
user's secret key” on page 248.
1. From the web administration menu, you can choose a user, group, or partition
to allocate to a license. Select either Partitions or Users & Groups.
Important
Previously, products did not use this functionality. This functionality
became available with OTDS 20.4.2.
OpenText recommends that you do not select the allocate option unless
you have advanced knowledge of licensing for your product. For more
information, see “License Keys“ on page 333.
2. Find the partition, user, or group that you want to allocate to a license or
counter. From that partition's, user's, or group's Actions menu, click Allocate to
License.
Note: If your installation of OTDS does not contain licenses, the Allocate
to License box does not appear.
a. From the License list, select the license to which this user, group, or
partition will be allocated.
Note: When you allocate a group, all members of that group are
allocated to the license. When you allocate a partition, all members of
that partition are allocated to the license.
b. From the Counter list, select either the product or the feature of the product
to which this user, group, or partition will be allocated.
Note: If you select the main product from this list, then the user,
group, or partition members will be recursively allocated to the main
product and to all features of the product.
This list is only available if you are using OTDS 20.4.2.
c. Some selections from the Counter list may display a License Type field.
This field appears when a license has a unit name of “users”. If this field
appears, it is not editable.
d. Click Allocate to License.
4. View the information message “license allocation has begun”. You can monitor
license actions in the “otds.log” on page 375 log file.
1. From the web administration menu, click Users & Groups, and then select the
Users tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Users tab.
2. Select the user that you want to delete or use the Search box to find the user.
Select the box to the left of the user you want to delete, and then, from the
button bar, click Delete.
Group ID Description
otadmins Administrators of all OpenText products.
Group ID Description
otasadmins OpenText Archive Server administrators.
otdsadmins OpenText Directory Services administrators with full
privileges. The complete OTDS admin UI is available.
otdsreadonlyadmins Users who are OTDS read-only administrators. A read-only
administrator is a user who can view all OTDS
configuration, reset user passwords, and consolidate
individual users. In order for a user to be a read-only
administrator:
• A group called otdsreadonlyadmins must be created
in the otds.admin partition.
• The user must be a member of the
otdsreadonlyadmins group, either directly or
indirectly by way of another group.
Note: You must add users directly to these groups to allow them to act as
administrators. For example, each user allowed to administer Archive Center
must be added to the otasadmins group.
Note: These privileges apply across nested groups within the same user
partition. Thus, if Group B is a member of Group A, and User X is a delegated
administrator of Group A, then User X can administer both Group A and
Group B. Likewise, if User X is a delegated administrator of the organizational
unit in which Group A is located, User X can administer both Group A and
Group B.
3. Select one of the Search options radio buttons: Starts with or Contains.
4. In the Search text box, type the text for which you want to search.
5. Click Search.
1. From the web administration menu, click Users & Groups, and then select the
Groups tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
2. Select the group that you want to edit, or use the Search box to find the group.
From the group's Actions menu, click Properties.
3. Optional From the Actions menu associated with any group you want to edit, do
the following:
• If you want to consolidate this group, click Consolidate, and then see
“Consolidating groups in a partition” on page 133.
• If you want to set two factor authentication for this group, click Two Factor
Auth Settings, and then see “Enabling two-factor authentication”
on page 114.
• If you want to edit the groups to which this group belongs, click Edit
Membership, and then see “Editing members of groups in a non-
synchronized user partition” on page 131.
• If you want to view recursive memberships for this group, click View
Recursive Membership, and then see “To view all application roles
(recursively) assigned to a specific user, group, or application role”
on page 272.
• If you want to edit the application roles to which this group belongs, click
Edit Application Roles, and then see “Editing an application role”
on page 269.
• If you want to view the application roles to which this group belongs, click
View Effective Roles, and then see “Editing an application role”
on page 269.
• If you want to edit the administrators of this group, click Edit
Administrators, and then see “Editing administrators of groups in a non-
synchronized user partition” on page 133.
• If you want to allocate this group to a license, click Allocate to License, and
then see “Allocate to license” on page 255.
Important
OpenText recommends that you do not select this option. No products
currently use this functionality.
• If you want to delete this group, see “Deleting groups in a non-synchronized
user partition” on page 135.
4. On the button bar, click Save.
1. From the web administration menu, click Users & Groups, and then select the
Groups tab.
Tip: You can also, from the web administration menu, click Partitions and
then, from the Actions menu of the partition you want to edit, select View
Members. Next, select the Groups tab.
2. Find the group that you want to edit, or use the Search box to find the group.
From the Actions menu associated with the group whose members you want to
edit, select Edit Membership.
3. On the <group_name>@<partition_name> page, on the Members tab, to add a
member to this group, on the button bar, click Add Member:
a. In the Users and Groups Associations box, use the Search box to find
members to add to the group. From the search results box, select the check
box to the left of the members you want to add to the group, and then click
Add Selected.
b. Continue searching for, and adding, members. After you have finished
adding members to this group, in the Users and Groups Associations box,
click Close.
4. If you want to add a member to the list of groups that this group,
<group_name>@<partition_name>, is a “member of”, on the
<group_name>@<partition_name> page, click the Member Of tab:
c. Continue searching for, and adding, members. After you have finished
adding members, in the Users and Groups Associations box, click Close.
5. Optional If you want to remove a user from the group:
Note: When you remove a member of a group, you do not delete the
member.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
3. Select the group that you want to edit, or use the Search box to find the group.
4. Click the Actions link next to the group whose administrators you want to edit.
From the Actions menu, click Edit Administrators.
5. On the <group_name>@<partition_name> page, click Add Administrator.
6. Use the Search box to find users or groups to add to the administrators. From
the search results box, select the users or groups you want to designate as
administrators, and then click Add Selected.
Tip: You can also, from the web administration menu, click Partitions and
then select View Members from the user partition's Actions menu. In the
center of the page, select the Groups tab.
4. Click Actions next to the group you want to consolidate. From the Actions
menu, click Consolidate.
6. Click Consolidate to consolidate user data for the selected existing group across
all selected resources.
If you know of a group who should be present in OTDS but is not listed, you can
consolidate that missing group as follows:
4. Click OK.
Tip: You can also, from the web administration menu, click Partitions and
then, from the non-synchronized user partition's Actions menu, select
View Members. Select the Groups tab.
3. Select the group that you want to delete, or use the Search box to find the
group.
4. Select the box to the left of the group you want to delete. Next, from the button
bar, click Delete.
Note: When you delete a group, you do not delete the users.
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose organizational
unit you want to edit.
3. Select the Organizational Units tab. Select the Actions link next to the
organizational unit you want to edit. From the Actions menu, click Properties.
4. Optional From the Actions menu associated with any organizational unit you
want to edit, do the following:
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose administrators
you want to edit.
2. From the non-synchronized user partition's Actions menu, select View
Members.
3. Click the Organizational Units tab, and then click the Actions link next to the
organizational unit you want to edit. From the Actions menu, click Edit
Administrators.
4. Click Add Administrator. In the Users and Groups Associations box, use the
Search box to find users or groups to add to the administrators. From the search
results box, select the users or groups you want to designate as administrators,
and then click Add Selected.
5. Optional If you want to remove a user or group from the administrators listed in
the Administrators area:
a. Select the user or group you want to remove, and then click Remove
Administrator.
b. Click Delete to confirm that you want to remove this administrator.
1. From the web administration menu, click Partitions, and then click the Actions
link associated with the non-synchronized user partition whose organizational
unit you want to delete.
4. Confirm that you want to delete this organizational unit by clicking OK.
Caution
When you delete an organizational unit, all users and groups in the
organizational unit will be deleted and removed from the resources
with which they are associated.
After an application role is created, you can assign it users, groups, and application
roles. The role is an opportunity to identify rights, responsibilities, and permissions
for those users and groups assigned to that role. The rights, responsibilities, and
permissions are defined and managed in the OpenText application. The application,
for example Process Suite, will create and manage the roles it requires. You can only
assign users, groups, or roles to a role from within OTDS.
You can consult your OpenText application's documentation for information about
whether that application supports creating and defining application roles in OTDS.
Your application's documentation will also provide the specific information about
the application roles it creates as well as their definition and impact.
Access roles are created by the OTDS administrator. They define a partition, user,
group, or organizational unit's access to a particular resource. For more information,
see “Access Roles“ on page 237.
Attribute Meaning
cn Group Name
description Description
displayName Display Name
notes Notes
Attribute Meaning
oTExternalID1 <rolename>
oTExternalID2 <rolename>@<user_partition>
oTExternalID3 <rolename>@<user_partition>
oTExternalID4 <rolename>@<user_partition>
Note: Although you can create application roles yourself, OpenText does
not advise you to do so unless directed by your OpenText application or
by OpenText support. For more information, see “To create an application
role” on page 273.
2. From the Actions menu of the application role you want to edit, click
Properties.
a. In the Role Name box, make any changes to the role's name. The Role
Name box is mandatory.
b. Optional In the Display Name box, you can optionally type the string that
will be displayed in the UI for this application role.
c. Optional In the Description box, you can optionally type a description of this
application role.
d. Optional In the Notes box, you can optionally type reference notes relating to
this application role.
e. The UUID box cannot be edited. This box contains a string that is the
internal ID of this application role.
f. On the button bar, click Next.
a. You can choose to specify any additional role attribute values. For
information about role attributes, see “Defining application role attributes”
on page 268.
b. On the button bar, click Next.
5. Optional On the Custom Attributes page, you can choose to specify any
additional custom attribute values, or edit existing custom attributes.
i. In the Type box, enter the type of custom attribute you are defining.
ii. In the Name box, enter a unique name for this custom attribute.
iii. In the Value box, if you require it, enter a value for your custom
attribute.
iv. Click Save to the right of your custom attribute.
b. To remove one or all custom attributes:
Caution
There is no confirmation step. After you click either Delete
Selected Attributes or Clear all Attributes, one specific, or all,
custom attributes in this tab will be removed, depending on which
remove action you selected. This action cannot be undone.
i. If you want to remove one custom attribute, select the check box to the
left of the custom attribute you want to remove, and then click Delete
Selected Attributes.
ii. If you want to remove all custom attributes, click Clear all Attributes.
• If you want to first find the user, group, or application role you want to assign,
follow this procedure: “To find a user, group, or application role to assign to an
application role:“ on page 270.
• If you want to first find the application role and then add member(s) to it, follow
this procedure: “To find an application role and then assign it members:
“ on page 271.
If you want to remove a user, group, or application role from an application role, see
“To remove a user, group, or application role from an application role“ on page 271.
a. If you want to find a user or group, click Users & Groups. Next click either
the Users or Groups tab and scroll or use the search option to find the
member you want.
2. From the Actions menu of the entity you want you want to add to an
application role, click Edit Application Roles.
3. On the Roles tab, click the selection box to the left of the application role you
want assigned to the user, group, or application role. Next, on the button bar,
click Assign Roles.
4. In the Member Selection box, click all role(s) selection boxes to select all role(s)
you want to add to this member.
2. From the Actions menu of the application role to which you want to add a user
or group, click Edit Application Roles, and then do any of the following:
a. If you want to assign a user or a group to this application role, click the
Members tab, and then do the following:
2. From the Actions menu of the application role from which you want to remove
a user or group or application role, click Edit Application Roles.
3. If you want to remove a user or group, click the Members tab, and then do the
following:
a. Click the box to the left of the user or group name that you want to remove,
and then, on the button bar, click Remove from Members.
b. Confirm that you want to remove these user(s) and/or group(s) from the
application role, and then click Delete.
4. If you want to remove an application role, click the Roles tab, and then do the
following:
a. Click the box to the left of the role name that you want to remove, and then,
on the button bar, click Unassign Roles.
b. Confirm that you want to remove these role(s) from the application role,
and then click Delete.
1. Find the user, group, or application role for which you wish to view effective
roles.
3. If you have finished viewing this application role's recursive items, on the
button bar click Back.
2. From the Actions menu of the application role whose administrators you want
to edit, click Edit Administrators.
a. Click the box to the left of each user or group name that you want to
remove, and then, on the button bar, click Remove Administrator.
b. Confirm that you want to remove these members from the application role,
and then click Delete.
5. When you have finished adding or removing all members, on the button bar
click Back.
2. From the Actions menu of the application role whose administrators you want
to edit, click Two Factor Auth Settings.
3. In the Two Factor Authentication Settings - <item_name> box, from the Two
Factor Authentication Settings list, select either Inherit settings or Define
settings, and then, do the following:
a. If you select Inherit settings, and two-factor authentication has not been
enabled for the parent object or in the global settings box, two-factor
authentication will not be enabled.
The Two Factor Authentication Settings box will display, dimmed, the
inherited settings that will be applied. If these are not the settings you want
applied, change your selection above to Define settings to make changes.
b. If you select Define settings, select any of the options to apply two-factor
authentication settings. For more information, see “Configuring two-factor
authentication” on page 245.
c. Click OK.
2. From the Actions menu of the non-synchronized user partition for which you
want to create an application role, click View Members.
3. On the button bar, from the Add menu, click New Role.
4. Next, follow the information found in “Editing an application role” on page 269.
2. Click the box to the left of each application role that you want to remove, and
then, on the button bar, click Delete.
3. Confirm that you want to remove these members from the application role, and
then click OK.
The Recycle Bin page displays all deleted users and deleted groups across all
partitions. You can view details such as the user partition of a deleted user or group.
You can also view the location, in OTDS, of the deleted user or group. The search
function allows you to display a specific number of either deleted users or deleted
groups that match your search criteria.
You can configure automatic delete for the users and groups stored in recycle bin to
ensure they are ultimately deleted, and to manage the amount of storage being used.
For more information, see “Recycle bin settings” on page 277. You can also manually
delete users and groups on the Recycle Bin page.
Note: Directory Services searches only attributes related to the user's identifier
and name.
You can manually select that user or group to be restored to their original partition
from the Recycle Bin page. After that member has been restored, and the original
problem that caused their deletion from the identity provider is corrected, you can
consolidate to bring the member back to their current state with the identity
provider. For more information about consolidation, see “Consolidating users and
groups in Partitions” on page 142.
However, if a user or group is manually restored from recycle bin by the OTDS
administrator, without any commensurate change on the identity provider,
that user or group will, again, be removed from the partition the next time a
consolidation on that partition is performed.
• If you want to view the users that have been deleted from OTDS and are
now stored in recycle bin, click the Users tab.
• If you want to view the groups that have been deleted from OTDS and are
now stored in recycle bin, click the Groups tab.
• If you want to view the roles that have been deleted from OTDS and are
now stored in recycle bin, click the Roles tab.
3. Optional On the button bar, you can click Refresh, to refresh the list on the
Recycle Bin page.
4. Optional You can use the search area to filter the results displayed. You can
choose to enter values to any one or all of the following text boxes to narrow the
search criteria:
2. On the Recycle Bin page, on the button bar, click Recycle Bin Properties.
a. Optional If you want OTDS to move users and groups deleted from
synchronized partitions automatically to recycle bin, select Recycle
members deleted in sync partitions.
b. Optional If you want OTDS to move users and groups deleted from non-
synchronized partitions automatically to recycle bin, select Recycle
members deleted in non-sync partitions.
c. Optional If, when a user or group is selected to be restored from recycle bin,
and OTDS sees an existing, identical user or group in that partition, you
want the existing user or group over-written, select Replace existing
members on restore.
If you do not want OTDS to over-write existing users and groups when
restoring from recycle bin, leave this check box cleared.
d. Optional If you want OTDS to automatically delete users and groups stored
in recycle bin, select Automatically delete recycled members. If you choose
to select auto delete, you must set the following:
ii. In the Deletion interval (hours) text box, type a positive integer
representing the number of hours that will elapse between
maintenance activity on the recycle bin.
iii. Click OK.
2. On the Recycle Bin page, if you want to restore users from recycle bin, click the
Users tab. If you want to restore groups from recycle bin, click the Groups tab.
If you want to restore access roles from recycle bin, click the Roles tab.
• If you want to restore a few objects, find the objects that you want to restore
to OTDS.
Click the select box to the left of each user, group, or role you want to
restore, and then, on the button bar, click Restore Selected.
• If you want to restore many objects, use the search bar and type or click any
of the search parameters to list those users, groups, or roles. You can select
from Start Date, End Date, Partitions, Starts with, or Contains.
After you click Search, the users, groups, or roles matching your search
query will be displayed. On the button bar, do one of the following:
– If you want to restore all objects that match the search criteria you input
above, click Restore by Search Criteria.
– If you want to restore selected objects from the search display, click to
select each object you want to restore, and then click Restore Selected.
5. Optional If you want to consolidate, then on the web administration menu, click
Partitions. On the Partitions page:
a. Find the partition to which you have just restored the user or group.
Note: If you do not want to consolidate the entire partition, you can
choose to consolidate specific users or groups. For more information,
see “Consolidating users” on page 251 or “Consolidating groups”
on page 262.
b. From the Actions menu of the partition to which you have just restored the
user or group, click Consolidate.
c. In the Consolidate <partition_name> dialog box, click Consolidate.
d. Wait until the consolidate operation has completed. You can view the
progress of the consolidate operation on the “Jobs“ on page 363 page.
Next, on the Partitions page, from the Actions menu of the partition you
have just consolidated, click View Members.
Examine the Users tab and the Groups tab to confirm that the user or
group you restored has been recreated in the partition.
2. On the Recycle Bin page, if you want to delete users from recycle bin, click the
Users tab. If you want to delete groups from recycle bin, click the Groups tab.
• If you want to delete a few users or groups, find the users or groups that you
want to delete from Recycle Bin.
Click the select box to the left of each user or group you want to delete, and
then, on the button bar, click Delete Selected.
• If you want to delete many users or groups, use the search bar and type or
click any of the search parameters to list those users or groups. You can
select from Start Date, End Date, Partitions, Starts with, or Contains.
After you click Search, the users or groups matching your search query will
be displayed. On the button bar, do one of the following:
– If you want to delete all users or groups that match the search criteria
you input above, click Delete by Search Criteria to delete all users or
groups in the search display.
– If you want to delete selected users or groups from the search display,
click to select each user or group you want to delete, and then click
Delete Selected.
Note: You do not need to consolidate to propagate the deletion. After you
click OK these users or groups are removed from recycle bin. Further,
provided the Delete users and groups option was enabled when the
resource was created, these users or groups will now be deleted from any
resources, for example from Content Server, with which those users or
groups were synchronized.
OAuth Clients
This section describes registering OAuth clients in OTDS for the purpose of using an
OAuth 2.0-based integration with OTDS. When creating an OAuth client:
• You need to set the valid, registered URLs associated with the OAuth client.
You can specify a Regular Expression, regex, in the Redirect URL text box. If not
using a regular expression, the configured value is treated as a prefix for string
comparison. You can see examples of the types of entries you can make to this
text box in “Customizing trusted referrals” on page 330.
Note: The secret key for a confidential OAuth client is only revealed when the
OAuth client is created. To reset the secret key of a confidential client, do one
of the following:
2. From the button bar, click Add. The New OAuth client wizard will guide you
through the steps.
a. In the Client ID text box, type a unique name for your new OAuth client.
The client ID text box is mandatory.
b. Optional In the Description text box, you can type a description of this
OAuth client.
c. Optional You can select Confidential to create a confidential client. A
confidential client must be able to securely maintain a client secret.
d. Optional In the Sign out URL text box, if you want to implement OTDS'
single sign out functionality, you must enter a value in this text box and the
next text box.
The value you type to this text box is supplied in the documentation for the
product for which this OAuth client is being created.
e. Optional From the Sign out Method list, if you want to implement OTDS'
single sign out functionality, you must enter a value in this text box and the
previous text box.
The value you type to this text box is supplied in the documentation for the
product for which this OAuth client is being created.
f. If you have finished creating your OAuth client, click Save, otherwise, click
Next.
a. You can choose to restrict authentication through this new OAuth client to
users within a specific user paritition. To do this, select User Partition, and
then type the name of the user partition whose users will be allowed to
authenticate through this OAuth client.
When you begin typing, an alphabetical list of user partitions that begin
with the first letter you type will appear, and you can select the user
partition from that list.
b. If you select Global, no restrictions will be applied.
c. If you have finished creating your OAuth client, click Save, otherwise, click
Next.
5. Optional On the Advanced page, do the following:
a. If you want to allow this OAuth client to be able to obtain a refresh token,
select Grant refresh token (when protocol permits).
b. If you selected the Grant refresh token box, you can also choose to force
the lifetime of the refresh token to be limited to the lifetime of the session
that OTDS establishes with the browser used by the user to authenticate, by
selecting Use session lifetime as refresh token lifetime.
i. Click the select box to the left of the redirect URL you want to delete.
ii. On the Redirect URL button bar, click Delete.
2. From the Actions menu of the OAuth client you want to edit, click Properties.
3. You can view descriptions of the text boxes you can edit in the “Creating an
OAuth client” on page 282 procedure.
4. Click Save.
Note: You can edit impersonation settings for a resource or for an OAuth
client.
Caution
Deleting an OAuth client cannot be undone.
2. Click the select box to the left of the OAuth client you want to delete, and then,
on the button bar, click Delete.
3. In the Delete dialog box, click OK to confirm or click Cancel to keep the OAuth
client.
Directory Services provides the External Import tab in OTDS to create and configure
external import.
To view the External Import tab in OTDS, you must enable the external import
system attribute. For more information, see “Enabling the external import tab”
on page 289.
You can choose to create an import unit that reads and imports from a database or
an import unit that reads and imports from an XML file.
<migration-data>
<users-info>
<user-data>
<cn>jamesgrey</cn>
<first_name>James</first_name>
<last_name>Grey</last_name>
<email>[email protected]</email>
<full_name>James Grey</full_name>
<userpwd>!jamesgrey!</userpwd>
</user-data>
<user-data>
<cn>jacquesgris</cn>
<first_name>Jacques</first_name>
<last_name>Gris</last_name>
<email>[email protected]</email>
<full_name>Jacques Gris</full_name>
<userpwd>@jacquesgris@</userpwd>
</user-data>
<user-data>
<cn>hamishglas</cn>
<first_name>Hamish</first_name>
<last_name>Glas</last_name>
<email>[email protected]</email>
<full_name>Hamish Glas</full_name>
</user-data>
</users-info>
<group-info>
<group-data>
<groupcn>Arran</groupcn>
<groupname>Arran</groupname>
</group-data>
<group-data>
<groupcn>Bute</groupcn>
<groupname>Bute</groupname>
</group-data>
<group-data>
<groupcn>Cava</groupcn>
<groupname>Cava</groupname>
</group-data>
</group-info>
<children-info>
<member CHILDID="jamesgrey" ID="Arran"/>
<member CHILDID="jacquesgris" ID="Bute"/>
<member CHILDID="hamishglas" ID="Cava"/>
<member CHILDID="Arran" ID="Bute" GROUP="true"/>
</children-info>
</migration-data>
1. From the web administration menu, select the System Attributes tab.
2. Click the directory.config.EnableImportSource system attribute, and then type
true in the Value box.
3. Click Save.
4. Refresh your browser page. You can now see the External Import tab in the
Setup menu.
a. In the Name box, type a unique name for your new external import. The
Name box is mandatory.
b. Optional In the Description box, you can optionally type a description of this
external import.
c. From the Import Source list, select either Import from Database or Import
from XML File.
d. From the Target Partition list, select the partition to which you will be
importing.
e. Optional Select Start importing... if you want to begin importing users and
groups immediately. To import the data at a later date, see “Beginning an
external import” on page 291.
f. Click Next.
4. Depending on the selection you made from the Import Source list on the
previous page, when you click Next you will either see the Database
Information or the XML Information page.
iv. In the Database Username box, type the name of the user with
administrative access to the database.
v. In the Database Password box, type the password for the user with
administrative access to the database.
vi. In the Database Name box, type the name of the database from which
you will be importing.
If you selected “Oracle” from the Server Type list, then you need to
enter the Oracle server SID or service name in this box.
vii. Optional If you want to test that you have entered the data correctly on
the Database Information page, click Test Database Connection.
b. If you selected Import from XML, then on the XML Information page:
i. In the XML File Path on Server box, type the full path name and file
name of the XML file. “C:\xml_import\xml_testfile.xml” is an
example of a valid path name and file name. For an example of a valid
XML file, see “XML file example” on page 288.
ii. You can optionally choose to have OTDS run a test on the XML file by
clicking Test XML Configuration. After the test completes, read the
information message then close it. If any configuration issues were
discovered, you will need to fix them in your XML file before
continuing.
c. If you have finished creating your external import, click Save, otherwise,
click Next.
5. On the User Mappings page, do the following:
a. If you are in the process of creating an external import from database, you
will see the Select Users SQL box. In this box you must type the SQL
statement for the users' import. After you have correctly typed your SQL
statement, click Populate Columns.
If you are in the process of creating an external import from an XML file,
OTDS populates the columns automatically.
b. You will see a table called Mandatory OTDS Attribute. Each attribute in
this table must be mapped.
c. You can optionally map any other OTDS attribute listed in the Optional
OTDS Attribute table.
d. If you have finished creating your external import, click Save, otherwise,
click Next.
6. On the Group Mappings page, do the following:
a. If you are in the process of creating an external import from database, you
will see the Select Groups SQL box. In this box you must type the SQL
statement for the groups import. After you have correctly typed your SQL
statement, click Populate Columns.
If you are in the process of creating an external import from an XML file,
OTDS populates the columns automatically.
b. You will see a table called Mandatory OTDS Attribute. Each attribute in
this table must be mapped.
c. You can optionally map any other OTDS attribute listed in the Optional
OTDS Attribute table.
d. If you have finished creating your external import, click Save, otherwise,
click Next.
a. If you are in the process of creating an external import from database, you
will see the Select Membership Mappings SQL box. In this box you must
type the SQL statement for the membership import. After you have
correctly typed your SQL statement, click Populate Columns.
If you are in the process of creating an external import from an XML file,
OTDS populates the columns automatically.
b. You will see a table called Mandatory OTDS Attribute. Each attribute in
this table must be mapped.
8. Click Save.
2. From the Actions menu of the import you want to edit, click Properties. The
Edit Import wizard will guide you through the steps to edit an existing
authentication handler.
3. You can view descriptions of the boxes you can edit in the “Creating an external
import” on page 289.
4. Click Save.
2. From the Actions menu of the import you want to start, click Import to
Partition. This may take some time. Wait until the information message
appears, read it, then close it.
Caution
Deleting an external import cannot be undone.
2. Select the box to the left of the import you want to delete, and then, on the
button bar, click Delete.
3. In the Delete box, click OK to confirm or click Cancel to keep the import.
The System Config menu option allows the administrator to configure the settings
for SMTP, OTDS notifications, and system attributes. You can configure notifications
for OTDS specific information and for license-key specific information. There are
three tabs on which you need to enter information:
The System Config menu option allows the administrator to configure the settings
for system attributes. There is one tab on which you need to enter information:
• “System Attributes” on page 294: where you set the OTDS system attributes.
Prior to the 16.2.2 release, the system attributes were available from the Setup
menu.
• “SMTP Settings” on page 321: where you set the server information for the SMTP
server that OTDS will use to send the notifications. In addition to notifications,
these SMTP settings will be used for OTDS emails related to account sign-up and
password reset.
• “Audit/Reporting Settings” on page 322: where you can choose to enable
auditing of OTDS operations in order to generate reports.
• “Notifications Settings” on page 323: where you can choose to enable OTDS-
specific notifications and/or license key-specific notifications, and enter the email
addresses to be notified. On this page you also choose the type and level of event
that generates a notification email, as well as the frequency of the email
notifications and the default language.
The System Attributes page displays a list of default OTDS attributes that ship with
the product. You can edit these attributes and add new attributes.
Caution
OpenText recommends that you use extreme caution when modifying the
system attributes. Improper or inaccurate changes to these attributes can
negatively impact your entire OTDS environment.
The system attributes located on the System Attributes tab apply to all partitions in
the system. You can also create custom, partition attributes that only affect the
behavior for users and groups in one partition. For more information, see “Partition
attributes” on page 145.
If you are patching a previous version of OTDS, system attributes that are new in
that patch will not display by default.
• Name: directory.system.AccountCreationNotificationEnabled
• Description: set this system attribute on a non-synchronized partition to
true if you want OTDS to send an email to a user when an account is created
for them in that non-synchronized user partition. This attribute needs to be
set as a partition system attribute, for more information see, “System
attributes” on page 145.
• Default Value: false
• Name: directory.auth.SignupAttributes
• Description: a list of user attributes that define additional information you
can collect on the Sign up page. These attributes contain the mappings
between attribute display names and their associated OTDS attributes. For
these attributes to appear, you must first have configured Enable Self-
Provisioning of Accounts on page 305.
The format is the following: attribute1=Display_Name_1|attribute2=
Display_Name_2|attribute3=Display_Name_3*
Example:
1. initials=Middle Initial(s)|gender=Gender*|birthDate=Date of Birth
3. title=Position|oTDepartment=Department|oTCompany=Organization*|
oTIndustry=Industry
4. physicalDeliveryOfficeName=Office|street=Street
5. l=City|st=State/Province|postalCode=ZIP/Postal Code*|co=Country*
6. preferredLanguage=Language*
• Name: directory.auth.AllowNonAdminUIAccess
When this attribute is set to true, all users will be able to access the OTDS
web administration page. Users who are not members of otadmin,
otdsreadonlyadmins, or otdsbusinessadmins will have a restricted view
of the administration page that only shows the Users & Groups page. When
these non-admin users have this access, they cannot see any other OTDS
object and they cannot modify users or groups.
• Name: directory.auth.AllowedEmailDomains
• Name: otds.as.spn
• Description: the Kerberos service principal name that OTDS will use. By
default, this is determined dynamically and does not need to be configured.
The value is automatically determined by OTDS. You only need to set this if
users are connecting to a load balancer in front of multiple OTDS instances.
For more information, see “Single sign on issues” on page 403.
• Name: directory.auth.AutoProvisionedAccountsPartition
• Name: directory.auth.AutoProvisionedDefaultGroup
• Description: specifies the name of the group to which the auto-provisioned
user will be added automatically.
• Default Value: null
• Requirements: you must first enable the Enable Auto-Provisioning of
Accounts on page 302 system attribute.
• Name: directory.system.BlockedReadOnlyAccess
• Description: if set to “true”, users who are not administrators in OTDS, or
who are not members of the otds.admin partition, cannot access any of the
OTDS APIs.
Non-admin users will only be able to query themselves, they will not have
access to any other users' information.
• Default Value: false
• Requirements: this system attribute is mutually exclusive with the Restricted
Read-Only Access on page 312 system attribute. You must first disable the
Restricted Read-Only Access on page 312 system attribute.
• Name: directory.auth.CaptchaIncorrectPasswordCount
• Description: the number of incorrect password attempts that will trigger the
display of a CAPTCHA. This box takes either zero or a positive integer.
• Default Value: null
• Requirements: you must have configured reCAPTCHA Private Key
on page 311 and reCAPTCHA Public Key on page 311 in order for the
CAPTCHA to be displayed.
• Name: directory.auth.CaptchaIncorrectPasswordTimespan
• Description: the time interval, in seconds, within which the number of
incorrect password attempts, as defined by CAPTCHA Incorrect Password
Count on page 297, must occur before a CAPTCHA is triggered.
The default value is null, meaning not configured. This is the equivalent of
setting zero, which sets an infinite interval. This box takes either zero or a
positive integer.
• Default Value: null
• Name: directory.auth.CommonPasswordURL
• Description: either a file reference or a URL referencing user passwords that
will be disallowed. This file or URL will be used in addition to the OWASP
list. For more information, see “Password policy for non-synchronized user
partitions” on page 138.
The default value is null, meaning no additional disallowed passwords have
been set. Any file or URL specified in this system attribute is a supplement to
the default OWASP list. OpenText recommends that, if using a custom file, it
be less than 1MB in size.
• Default Value: null
• Name: directory.auth.DefaultPartition
• Description: the name of the partition to assume as default in case of user
name conflict. By default, when a user attempts to log in using a user name
that resolves to two or more users in different partitions, OTDS will disallow
the login. This attribute allows you to set the partition name that OTDS
should assume to be the default and allow such logins to succeed.
• Default Value: null
• Requirements: this system attribute does not appear in the System
Attributes list by default, it must be manually added. For more information,
see “Adding a system attribute” on page 319.
• Name: otds.ticket.cookie.domain
• Description: the DNS domain in which OTDS tickets should be transferred.
This is only used when passing OTDS tickets to resources through a domain-
level cookie rather than having the browser POST the ticket. By default, this
is determined dynamically and does not need to be configured. The value is
automatically determined by OTDS. For more information, see “Resource
configuration issues” on page 400.
• Default Value: null
• Name: directory.system.DisableResourceNameFormatting
• Name: directory.system.DisableResourceNameMapping
• Description: setting this attribute to “true” forces OTDS to use the user name
of the user, the user's cn attribute, instead of the attribute specified on the __
NAME__ attribute mapping on resources for users and groups within the
partition on which the system attribute is set. For more information about __
NAME__, see “Using resource attribute mappings” on page 189 and
__NAME__ on page 209.
• Name: directory.auth.BaseURL
• Description: sets the URL through which the OTDS login page can be
accessed. This setting will override the value automatically detected by
OTDS. This setting can be useful in situations where users access OTDS
through a reverse proxy or load balancer. For example: https://
mycompany.domain.com:8443/otdsws/login
This setting affects links returned to end users, for example:
• Name: directory.auth.DisallowedEmailDomains
• Description: a comma separated list of email domains that will not be
accepted for self-provisioning of accounts. All email domains are accepted by
default.
• Default Value: null
duo.akey
• Name: duo.akey
• Description: this attribute's value is generated by OTDS. You should not
manually edit this value.
• Requirements: this system attribute does not appear in the System
Attributes list by default, it must be manually added. For more information,
see “Adding a system attribute” on page 319 and “References to external
websites” on page 384.
duo.host
• Name: duo.host
• Description: this attribute's value is provided to you by the third-party two-
factor authentication provider. For more information see “References to
external websites” on page 384. The value you enter to this attribute is the
DUO API hostname. For more information, see “Duo Security and two-factor
authentication” on page 247.
• Default Value: null
• Requirements: this system attribute does not appear in the System
Attributes list by default, it must be manually added. For more information,
see “Adding a system attribute” on page 319.
duo.ikey
• Name: duo.ikey
• Description: this attribute's value is provided to you by the third-party two-
factor authentication provider. For more information see “References to
external websites” on page 384. The value you enter to this attribute is the
DUO integration key. For more information, see “Duo Security and two-
factor authentication” on page 247.
• Default Value: null
duo.skey
• Name: duo.skey
• Description: this attribute's value is provided to you by the third-party two-
factor authentication provider. For more information see “References to
external websites” on page 384. The value you enter to this attribute is the
DUO secret key. For more information, see “Duo Security and two-factor
authentication” on page 247.
• Default Value: null
• Requirements: this system attribute does not appear in the System
Attributes list by default, it must be manually added. For more information,
see “Adding a system attribute” on page 319.
• Name: directory.auth.Enable2FactorSuspend
• Description: when set to true, a link will display on the native two-factor
authentication page. The link will read: “I lost my device”. When a user
clicks that link, they will be able to enter their email address or user name to
receive an email which will then allow that user to temporarily suspend two-
factor authentication on their account.
• Default Value: false
• Requirements:
1. This system attribute does not appear in the System Attributes list by
default, it must be manually added. For more information, see “Adding a
system attribute” on page 319.
2. You must configure your SMTP server information in order for 2 factor
suspend to work. For more information, see “SMTP Settings”
on page 321. Each of the following SMTP server attributes must be
configured:
– From (email)
– SMTP Host
– SMTP Password
– SMTP Port
– Use SSL
– SMTP User Name
3. For the user to receive the email, the userid account must have a valid
email address configured.
4. For general information about two-factor authentication configuration in
OTDS, see “OTDS Two-Factor Authentication” on page 84, “Enabling
• Name: otds.es.EnableAutoConsolidationOnConnectionChange
• Description: set this attribute to “true” if you want to implement automatic
consolidation whenever any AD connection is changed. It is used to enable
or disable automatic consolidation for AD connection change. For more
information, see “Connection Information” in “Defining a synchronized user
partition” on page 89.
This attribute can be set to “true” in either a specific user partition or at the
global level in a system attribute:
• Name: directory.auth.AutoProvisionAccounts
• Description: for use with OAuth, OpenID and or SAML. This attribute controls
the behavior of the system when users sign in with external accounts that do
not have a corresponding account in OTDS.
When this attribute is set to false, the first time a user signs in with an OAuth
or OpenID provider, such as Facebook or Twitter, they will be prompted to
link that external account to an existing account in OTDS.
Users link their accounts by providing their OTDS account credentials. This
means that users must either create an account or have an existing account in
OTDS before they can sign in with these services. However, some
deployments of OTDS may prefer to create separate accounts in OTDS for
users that sign in with external accounts, so that no sign up process is
required.
To accomplish this, you must set this attribute to true. When enabled, all
logins with OAuth or OpenID that are not associated with an existing account
in OTDS will have a new account created in the partition called “Auto-
Provisioned Accounts”. This means that when a user signs in with Twitter
one day and Facebook another day, they will be signing in with a different
account into OTDS each time. This may or may not be desirable, and largely
depends on the application for which OTDS is ultimately being used.
• Default Value: false
• Requirements:
1. The user partition “Auto-Provisioned Accounts” must be manually
added by the administrator to the access roles that will grant these
provisioned users permission to access the desired resources.
2. The OAuth or OpenID authentication handler needs to be enabled. For
information about how to enable sign in with OAuth or OpenID providers,
see “List of authentication handlers” on page 150.
• Name: directory.auth.EnableEmailOnPasswordChange
• Description: when you set this attribute's value to “true”, and a user changes
their password on the OTDS sign in page, an email is sent to the user to
confirm that their password has been changed.
• Default Value: false
• Requirements: you must have enabled Enable Password Reset on page 304.
• Name: directory.system.EnableExpiredUserDeletion
Note: Some features are only available if you are using OTDS version
20.4.2 or higher.
• Description: this attribute, set on a partition, can be set to “true” if you want
to enable the deletion of expired user IDs after a set retention period. If you
want to change the default of fifteen days, see Expired User Retention Period
on page 305.
This attribute must be set as a partition attribute, for more information, see
“System attributes” on page 145.
• Default Value: false
• Requirements: you must first set Enable Maintenance on page 304 to “true”.
• Name: directory.config.EnableImportSource
• Description: when you set this attribute's value to “true”, the External
Import menu option will be displayed on the main menu.
• Default Value: false
• Requirements: you may need to refresh your browser window to see this
menu option.
Enable Maintenance
• Name: directory.system.EnableMaintenance
Note: Some features are only available if you are using OTDS version
20.4.2 or higher.
• Description: set this attribute's value to “true” if you want to allow
maintenance tasks at the system level.
For more information about the maintenance tasks you can set, see Enable
Expired User Deletion on page 303 and Expired User Retention Period
on page 305.
• Default Value: false
• Requirements: you must restart OTDS after you change the default setting of
this attribute for your change to take effect.
• Name: directory.auth.EnablePasswordReset
• Description: set this attribute to “false” to disable the Password Reset option
on the OTDS sign in page. By default, password reset is enabled and users at
the OTDS sign in page can select either forgot password or reset it here to
receive an email that provides them with a password reset so that they can
sign in.
The setting of the Validation Token Lifetime on page 317 system attribute has
an impact on this attribute.
• Default Value: true
• Requirements:
1. You must configure your SMTP server information in order for password
reset to work. For more information, see “SMTP Settings” on page 321.
Each of the following SMTP server attributes must be configured:
– From (email)
– SMTP Host
– SMTP Password
– SMTP Port
– Use SSL
– SMTP User Name
2. For the user to receive the email, the userid account must have a valid
email address configured.
• Name: directory.auth.SelfProvisionAccounts
• Description: after you enable this attribute, users will see a Sign up option
on the OTDS login page. Users must go through the process of validating
their email address before they can sign in to OTDS. Self-provisioned
accounts are assigned a GUID for the user identifier, and users are expected to
sign in with their email address. To accomplish this, you must set this
attribute to true. Self-provisioned accounts are created in the user partition
“Self-Provisioned Accounts”.
The user attributes collected on the Sign up page can be configured using the
Additional Signup Attributes system attribute. See Additional Signup
Attributes on page 294 for more information.
• Default Value: false
• Requirements:
1. You must configure your SMTP server information in order for self-
provisioning to work. For more information, see “SMTP Settings”
on page 321. Each of the following SMTP server attributes must be
configured:
– From (email)
– SMTP Host
– SMTP Password
– SMTP Port
– Use SSL
– SMTP User Name
2. The user partition “Self-Provisioned Accounts” must be manually added
by the administrator to the access roles that will grant these provisioned
users permission to access the desired resources.
3. When enabling self-provisioning, OTDS must be configured to allow
login through email address. Verify that the Login User Name Attributes
on page 310 system attribute has “mail” in the list of allowed attributes.
For example, the default value for Login User Name Attributes is
“oTExternalID1|oTExternalID3|oTExternalID4|mail”. However, in a
migrated or non-default configuration, the default value may have
changed. If you are enabling self-provisioning, make sure that “mail” is
included in the list of allowed attributes for Login User Name
Attributes.
• Name: directory.system.ExpiredUserRetentionPeriod
Note: Some features are only available if you are using OTDS version
20.4.2 or higher.
• Description: this attribute, set on a partition, can be set to the number of
days after which a user ID is deleted from OTDS once that user ID has
expired.
This attribute must be set as a partition attribute, for more information, see
“System attributes” on page 145.
• Default Value: 15
• Requirements: you must first set Enable Maintenance on page 304 to “true”
and then set Enable Expired User Deletion on page 303.
help.config.HelpTenant
• Name: help.config.HelpTenant
• Description: a help session identifier. Do not modify this attribute unless
instructed by OpenText.
• Default Value: 1
help.config.HelpType
• Name: help.config.HelpType
• Description: a help type identifier. Do not modify this attribute unless
instructed by OpenText. If you modify this attribute incorrectly, you may
cause the online help system to stop working.
• Default Value: ofh1
help.config.HelpURL
• Name: help.config.HelpURL
• Description: the help system base URL. Only modify this attribute if you are
configuring the OpenText Private Help Server. For more information, see
“About the Directory Services online help” on page 382.
• Default Value: http://docsapi.opentext.com/mapperpi
• Name: directory.auth.ClientCertProxyHeader
• Description: the name of the HTTP header set by an upstream proxy server
that contains the client certificate used to establish the HTTPS connection.
This is only required when using the client-certificate based two-factor
authentication feature alongside a web server and proxy in front of OTDS.
For more information, see “Require a client certificate” in the Define
Settings options in “Configuring two-factor authentication” on page 245.
directory.security.HttpProxyPassword
• Name: directory.security.HttpProxyPassword
• Description: sets the password to be sent to a proxy for outgoing HTTP
requests from Directory Services.
• Default Value: null
directory.security.HttpProxyUser
• Name: directory.security.HttpProxyUser
• Description: sets the username to be sent to a proxy for outgoing HTTP
requests from Directory Services.
• Default Value: null
• Name: otds.es.ConnectionsRetryDelay
• Description: if you have created and set the LDAP Retry Number
on page 308 attribute, you can choose to set a delay, in seconds, before
retrying to connect to the LDAP server.
When you create this attribute, type a positive integer in the Value box to set
the number of seconds before retrying the connection. For more information,
see “Connection Information” in “Defining a synchronized user partition”
on page 89.
This attribute is used to control the retry of a connection, if that connection
becomes temporarily unavailable.
This attribute can be set in either a specific user partition or at the global
level in a system attribute:
• Name: otds.es.ConnectionsRetryNum
• Description: type a positive integer in the Value box to set the maximum
retry attempts permitted when connecting to the LDAP server. For more
information, see “Connection Information” in “Defining a synchronized user
partition” on page 89.
This attribute is used to control the retry of a connection, if that connection
becomes temporarily unavailable.
This attribute can be set in either a specific user partition or at the global
level in a system attribute:
otds.es.LDAPSyncMethod
• Name: otds.es.LDAPSyncMethod
• Description: this system attribute is only applicable to synchronized user
partitions that have the Import users only from matched groups option
selected and that have the USN query monitoring type.
It controls the import and consolidation method. For example, if you are
intending to import and consolidate a sub-section of a large data set of users
and groups, you can choose to set this system attribute to “TRAVERSAL” to
optimize the performance of the import and consolidation. There are two
valid values: FULL and TRAVERSAL. The default setting is “FULL”.
This system attribute can be set to apply to all synchronized partitions that
have the required settings, or can apply to a specific synchronized partition:
• Name: directory.auth.LoginScreenMessage
• Description: you can choose to include HTML content to show on the OTDS
login page.
If you do not require multilingual support, in the Value box, enter the HTML
content that you want to show on the OTDS login page.
If you need multilingual support, do the following:
1. In the Value box, type “prompt.loginmessage” without the quote marks.
2. For each language you want to support, create a login_
custom_<xy>.properties file in the <OTDS_home>/otdsws/WEB-INF/
classes directory, where <xy> is two letters representing the language.
For example, when implementing support for German, create a login_
custom_de.properties file.
When creating the login_custom_<xy>.properties file, follow the
same file name conventions as for the OTDS login.properties file
found in the same directory.
3. For each file you create, type:
prompt.loginmessage=<desired_HTML_content>
• Name: directory.auth.UserNameAttributes
• Description: the set of attributes that OTDS uses to search for a user name
provided on the login form. For more information, see “Customizing the
login user name format” on page 349.
• Default Value: oTExternalID1|oTExternalID3|oTExternalID4|mail
otds.as.intranetSubnets
• Name: otds.as.intranetSubnets
• Description: if you have enabled Enable only for requests originating from
Extranet IP addresses on page 246 two-factor authentication, this system
attribute allows you to define a private IP range. Intranet subnets that are not
within standard private IP ranges can be configured in this system attribute.
• Default Value: null.
• Example: otds.as.intranetSubnets = 149.235.0.0/16, 149.234.0.0/
16
otds.as.trustedProxies
• Name: otds.as.trustedProxies
• Description: if you have enabled Enable only for requests originating from
Extranet IP addresses on page 246 two-factor authentication, this system
attribute allows you to list all proxies that should be trusted.
• Default Value: null.
• Example: otds.as.trustedProxies = 23.45.67.89, 9.9.9.9
• Name: otds.log.level
• Description: the level of logging written to the otds.log file. Valid values
are:
• Name: directory.auth.PasswordResetURL
• Description: a URL to which synchronized users will be redirected in order
to reset their password.
• Default Value: null
• Name: directory.auth.RecaptchaPrivateKey
• Description: when using account self-provisioning, the OTDS sign up page
can be configured with a CAPTCHA using Google reCAPTCHA for use
cases where OTDS is internet accessible. For the reCAPTCHA Private Key
on page 311 attribute, enter your reCAPTCHA secret.
• Default Value: null
• Requirements:
1. You need to create a reCAPTCHA integration on Google, using your
Google account. See “Google's reCAPTCHA” website for information
about setting up your reCAPTCHA integration. For more information
see “References to external websites” on page 384.
2. After you set up your reCAPTCHA integration, you need to set two
OTDS system attributes: reCAPTCHA Private Key on page 311 and
reCAPTCHA Public Key on page 311.
• Name: directory.auth.RecaptchaPublicKey
• Description: when using account self-provisioning, the OTDS sign up page
can be configured with a CAPTCHA using Google reCAPTCHA for use
cases where OTDS is internet accessible. For the reCAPTCHA Public Key
on page 311 attribute, enter your reCAPTCHA site key.
• Default Value: null
• Requirements:
1. You need to create a reCAPTCHA integration on Google, using your
Google account. See “Google's reCAPTCHA” website for information
• Name: directory.system.RestrictedReadOnlyAccess
• Description: if set to “true”, users who are not administrators in OTDS will
not be able to look up any information on partitions to which they are not a
member. They will also be restricted from looking up any information on any
users, groups, or organizational units that are not within their partition.
• Default Value: false
• Requirements: this system attribute is mutually exclusive with the Blocked
Read-Only Access on page 297 system attribute. You must first disable the
Blocked Read-Only Access on page 297 system attribute.
• Name: otds.as.SameSiteCookieVal
• Description: The SameSite attribute can prevent the browser from sending a
cookie along with cross-site requests. This attribute allows you to set the
value for SameSite that OTDS should set on its cookies. The value can be any
one of:
– Lax: OTDS cookies will be sent if you are navigating within the website,
or if you're being redirected to the website. This is the default value set by
many browsers.
– None: OTDS cookies will be sent with requests crossing the website origin
bounds.
Note: The Strict option is not supported by OTDS because the OTDS
sign in page requires cookies in redirect scenarios from integrated
applications.
• Name: directory.auth.SelfProvisionedAccountsPartition
• Description: the name of the partition in which self-provisioned accounts are
created. If this partition does not already exist, OTDS will automatically
create it.
• Name: directory.auth.SelfProvisionedDefaultGroup
• Description: specifies the name of the group to which the self-provisioned
user will be added automatically.
• Default Value: null
• Requirements: You must first enable the Enable Self-Provisioning of
Accounts on page 305 system attribute.
• Name: directory.auth.ShowCustomAuthHandlersOnLoginPage
• Description: if set to “false”, any custom OAuth or SAML authentication
handlers will not be displayed on the OTDS login page. Custom OAuth or
SAML authentication handlers will be displayed on the OTDS login page by
default.
• Default Value: true
• Name: directory.auth.ShowErrorIfAccountNotExist
• Description: when you set this attribute to “true”, OTDS will display an
error on the sign in page if the user authenticated with SSO does not exist in
Directory Services.
• Default Value: false
• Name: directory.auth.ShowLoggedOutPage
• Description: when you set this attribute to “true”, OTDS will display a
Logged Out page when the user signs out of Directory Services.
• Default Value: false
• Name: directory.auth.ShowLoginButtonOnLoggedOutPage
• Description: if you set this attribute to “true”, OTDS will show a Go to Sign
In Page button on the OTDS logged out page. Clicking the button will bring
users to the OTDS login page. The default setting, “false”, does not display
this button.
• Default Value: false
• Name: directory.auth.ShowLangsOption
• Description: this attribute, when set to “true”, displays an option to select
the display language for the OTDS login page. By default, the OTDS login
page is displayed in the browser's selected language. In other words, as per
the Accept-Language HTTP header.
Note: This setting does not affect the display language in other
OpenText products.
• Default Value: false
• Requirements: this system attribute does not appear in the System
Attributes list by default, it must be manually added. For more information,
see “Adding a system attribute” on page 319.
• Name: directory.auth.ShowNativeLoginAfterLogout
• Description: if set to false, then when users sign back in, after signing out
through OTDS, the user's browser will be redirected to sign in using the
authentication mechanism configured through authentication handlers.
Examples of authentication handlers include SAML and Negotiate.
If this system attribute is set to true, then when users sign back in, after
signing out through OTDS, the user's browser will be shown the OTDS sign
in page. This allows an administrative user to log in using an admin account
rather than their personal SSO / desktop account.
• Default Value: true
• Name: otds.as.sso.ttl
• Description: the number of seconds for which an OTDS SSO ticket is valid.
• Default Value: 28200
symantec.appid
• Name: symantec.appid
• Description: if you are setting up the third-party authentication provider,
Symantec VIP, you need to add this system attribute. You will type your
account's VIP application ID as the value of the attribute. This information is
available in VIP manager. For more information, see “Adding a system
attribute” on page 319 and “Symantec VIP and two-factor authentication”
on page 247.
symantec.keystore
• Name: symantec.keystore
• Description: if you are setting up the third-party authentication provider,
Symantec VIP, you need to add this system attribute. You will type the URL
to the keystore OTDS should use to connect to VIP services. The keystore
must be accessible on all OTDS servers handling authentication. For more
information, see “Adding a system attribute” on page 319 and “Symantec
VIP and two-factor authentication” on page 247.
• Default Value: null
symantec.keystorepassword
• Name: symantec.keystorepassword
• Description: if you are setting up the third-party authentication provider,
Symantec VIP, you need to add this system attribute. You will type the
password used for the keystore. For more information, see “Adding a system
attribute” on page 319 and “Symantec VIP and two-factor authentication”
on page 247.
• Default Value: null
symantec.usernameattr
• Name: symantec.usernameattr
• Description: if you are setting up the third-party authentication provider,
Symantec VIP, you need to add this system attribute. You will type the
OTDS attribute name that contains the value corresponding to the users'
<username> in Symantec VIP. For more information, see “Adding a system
attribute” on page 319 and “Symantec VIP and two-factor authentication”
on page 247.
• Default Value: null
• Name: directory.bootstrap.MasterHost
• Description: defines the fully qualified domain name of the master host and
the port number used by the master host. Examples of valid values include:
myserver.mycompany.net:41616 and 10.4.33.29:41616
The JMS port must be opened on the synchronization master host. By
default, the JMS port is 41616. You can find the configured JMS port in the
<OTDS_installdir>\otdsws\WEB-INF\classes\otds.properties file.
You should only examine the information in this file, you must not make any
changes to the otds.properties file.
Important
The Synchronization Master Host system attribute must always
contain the fully qualified domain name of the server functioning as the
synchronization master host in your environment. Each OTDS
installation is looking for the value of Synchronization Master Host at
startup. If a value for the system attribute Synchronization Master
Host does not exist, the first OTDS installation in your Directory
Services environment will create and populate it, thereby becoming the
master host.
• Default Value: <fully_qualified_domain_name_of_server>:<port_
number>
• Requirements:
1. The Synchronization Master Host system attribute cannot be null. It must
always have a correct value.
2. If the server ever changes, or is renamed, you must update the
Synchronization Master Host system attribute with the new server
name.
• Name: directory.auth.ThirdPartyTwoFactorProvider
• Description: to enable third-party two-factor authentication with either
“Duo Security” or “Symantec VIP” authentication providers, set this system
attribute to:
– If you are configuring Duo security, set this system attribute to: “duo”.
– If you are configuring Symantec VIP, set this system attribute to:
“symantec”.
• Name: directory.auth.TOTPIssuerName
• Description: controls the name of the issuer in the secret key issued by OTDS
for native TOTP-based two-factor authentication.
• Default Value: OpenText
• Name: directory.security.ValidateLDAPSSLCerts
• Name: directory.security.ValidateSAMLSSLCerts
• Description: set this attribute to “true” in order to verify certificates for a
SAML identity provider.
If the SAML identity provider is configured with a certificate signed by an
unknown source, for example, a self-signed certificate, the certificate will
need to be imported to the Java truststore on every OTDS server.
• Default Value: true
• Name: directory.security.ValidateSMTPSSLCerts
• Description: set this attribute to “true” in order to verify certificates for an
SMTP server connection.
If the SMTP server connection is configured with a certificate signed by an
unknown source, for example, a self-signed certificate, the certificate will
need to be imported to the Java truststore on every OTDS server.
• Default Value: true
• Name: directory.auth.ValidationTokenLifetime
• Description: number of hours for which validation tokens related to account
self-provisioning are valid. This system attribute sets a time limit for all email
links sent by OTDS, including email address confirmation and Enable
Password Reset on page 304.
• Default Value: 24
• Name: otds.as.wantSecureCookies
• Description: when this attribute is set to “true”, cookies are marked as
Secure when used over SSL connections.
Tip: You may need to consult with your Active Directory system administrator
to identify those system attributes that are saved in deleted users and groups in
order to create your own filters.
To see these examples applied to one synchronized partition only, see “Examples
filtering one synchronized partition's deleted users and groups”. If any system
attribute is created on the “System Config“ page, and that system attribute is also
created on a single synchronized partition on the “Partition attributes” page, the
system attribute created on the Partition Attributes page will take precedence.
This example will filter deleted users. It will create a system attribute that
applies to all users in all synchronized partitions, system-wide.
This example will filter deleted groups. It will create a system attribute that
applies to all groups in all synchronized partitions, system-wide.
5. Click Save.
Caution
OpenText recommends that you use extreme caution when modifying the
system attributes. Improper or inaccurate changes to these attributes can
negatively impact your entire OTDS environment.
1. If you want to add a system attribute that applies across the entire OTDS
environment, from the web administration menu, select System Config.
Note: After you create your new attribute, you cannot edit its name.
6. In the Value box, type an allowed value for your new attribute. You can type a
custom filter in this field.
For more information, see “Examples filtering system-wide deleted users and
groups” on page 318.
7. Click Save.
1. If you want to add a system attribute that applies to one partition only, from the
web administration menu, select Partitions.
2. From the Actions menu of the partition to which you want to add a system
attribute, select Partition Attributes.
4. In the Name box, type the name of the system attribute. For a list of system
attribute names, see “List of supported system attributes” on page 294.
Note: After you create your new attribute, you cannot edit its name.
6. In the Value box, type an allowed value for the system attribute. For a list of
system attribute values, see “List of supported system attributes” on page 294.
7. Click Save.
Caution
OpenText recommends that you use extreme caution when modifying the
system attributes. Improper or inaccurate changes to these attributes can
negatively impact your entire OTDS environment.
3. In the list of system attributes, find the attribute you want to edit.
4. The Name box cannot be edited. The Display Name box cannot be edited.
5. Optional Click in the Value box associated with the system attribute you want to
edit. Type a value for this attribute.
6. Click Save.
Caution
Exercise extreme caution when deleting a system attribute as this action
cannot be undone.
3. Select the box to the left of the system attribute you want to delete.
The boxes you must configure include the host and port of the SMTP server. You
will also need to enter the email address from which the notification emails will be
sent. If required by the SMTP server, you may also need to enter a user name and
password for the connection to the SMTP server, Finally, you must select a time-out
value for the connection to the SMTP server when sending email.
The boxes that you can optionally configure include the name from which the
notification emails will be sent and whether you will use SSL. It may be the case that
SSL is a requirement for you, depending on the configuration of your SMTP server.
Important
You can only choose to test your SMTP settings when you first save them. If
you try to navigate to the page to test at a later date, that test will fail, even if
your settings are correct.
10. Optional In the From (name) box, type the name that will be used as the “From”
name in the email sent by OTDS.
11. After you have completed your entries to the boxes, on the button bar click
Save.
12. If you entered your SMTP settings for the first time, and after you save those
settings, you can click Test SMTP Connection.
However, if you previously saved your settings and then navigated away from
this page, clicking Test SMTP Connection will fail.
To view the reports generated when audit reporting is enabled in OTDS, see
OpenText Directory Services - Web Client Help (OTDS-H-AWC).
3. Optional If you want to enable audit reporting in OTDS, select Enable Audit/
Reporting.
4. Type a positive integer to represent the number of days that OTDS will store the
audit record.
5. From the Available Event IDs box, click to select each OTDS operation whose
audit record you want stored. Press and hold Ctrl to select multiple events.
After you have selected the events, click ADD.
These selected events will now move to the Selected Event IDs box. If you want
to remove any event, then click to select that event in the Selected Event IDs
box, and then click REMOVE.
Licensing events are always recorded and tracked.
6. If you have finished configuring your audit/reporting settings, on the button bar
click Save.
Tip: If you want to set your notification settings for license usage of your
resources, see “Editing notification settings for your resource”
on page 232.
1. In the General Notifications area of the Notifications Settings page, you must
have valid entries in each of the four boxes.
For more information, see General Notifications in “Notifications areas”
on page 323.
2. In the SMTP Host, SMTP Port, and From (email) boxes on the SMTP Settings
page, you must have valid entries.
For more information, see “SMTP Settings” on page 321.
3. If you intend to enable Password Expiry Notifications, you must have a valid
entry in the directory.auth.BaseURL box on the System Attributes page.
An example of a valid entry is: http://mymachine.opentext.net:8080/otdsws/login
For more information, see Directory Services Base URL on page 299.
– OTDS Notification Events: the OTDS events which, if they occur, will be
reported in the notification emails.
– Event Level: the OTDS reporting level at, or above which, events will be
included in the notification emails. The options are: INFO, WARN, ERROR.
This box is mandatory. The default value is INFO.
• License Key Notifications: before enabling license key notifications, you must
first complete the requirements listed in “Requirements before enabling
Notifications in OTDS” on page 323.
a. In the Notification Send Interval box, type a positive integer to set the
number of seconds that OTDS will wait between checks to see if a
notification email needs to be sent.
b. In the Max Retries box, type a positive integer to set the maximum number
of times that OTDS will attempt to send out a notification email. When the
number of times set here is reached without the notification email being
sent, OTDS will stop trying to send the email.
c. From the Default Language list, select the default language in which the
notification emails will be written. These language files are made available
by OTDS. You cannot add your own language or language files for
notification emails.
d. In the E-mail Addresses box, type a comma-separated list of the email
addresses to which you want the notifications sent.
4. In the Event Notifications area:
b. In the License Key Expiration box, type a positive integer to indicate the
number of days before a license key will expire that a notification email will
be sent.
If you type “0”, zero, your email notification will be sent the day that the
license key expires.
c. In the Expiration Notification Interval box, type a positive integer to
indicate the number of hours that OTDS will wait between checks to see if a
license key expiration notification needs to be sent.
Important
Replication is not available if your Directory Services installation is an internal
OTDS installation. In other words, if OTDS was installed during a Content
Server installation, you cannot access replication.
1. From the web administration menu, select System Config. On the System
Config page, select the System Attributes tab.
2. On the System Attributes page, find the Synchronization Master Host system
attribute.
3. In the Value box, type the server name and port of your new master host in the
form <fully_qualified_server_name>:<master_host_port_number>. For
example, computer60.mycompany.net:41616
4. Click Save.
5. Restart the web application server, either Tomcat or WebSphere, on all replicas.
The Trusted Sites page allows you to specify a list of trusted addresses that
Directory Services will allow to refer to a forwarding address. During
authentication, if the referring URL contains a forwarding address, Directory
Services will redirect the user's browser to that address. This is necessary so that
Directory Services can point the user's browser back to the originating address. For
example, the user accesses Content Server and Content Server redirects to Directory
Services for authentication. After authenticating, Directory Services will redirect the
user's browser back to Content Server if the Content Server URL is a trusted
referring address.
You can specify a Regular Expression, regex, as a trusted site. If not using a regular
expression, the configured value is treated as a prefix for string comparison.
Important
A full URL is required when entering a trusted address. OTDS will ignore the
string “http” or “https”, if either is listed alone, without a hostname.
• http://mysafesite.domain.com/my-application
• http://mysafesite.domain.com/my-other-application
• http://unsafesite.domain.com/xyz
Example 14-2: If Directory Services should allow redirect to all https sites
on opentext.com, include the following Regular Expression (regex) to the
list of “Addresses Directory Services will redirect request to”:
https://[^/]+\.opentext\.com/.*
2. In the Trusted Sites page, from the button bar, click Add.
Note: A full URL is required. OTDS will ignore the string “http” or
“https”, if either is listed alone, without a hostname.
4. Click Save. You may need to refresh the page to see the trusted address in the
Addresses Directory Services will redirect requests to box.
5. Optional Repeat these steps until you have added all trusted addresses.
2. In the Trusted Sites page, select the box to the left of the trusted site you want
to delete.
3. From the button bar, click Delete. There is no confirmation step. After you click
Delete, the trusted site is removed.
4. Optional Repeat these steps until you have deleted all the trusted addresses you
want to remove.
License Keys
Directory Services provides the License Keys tab in OTDS to create, implement, and
manage all licenses for OpenText products. Some OpenText products require a
license to ensure that the full functionality of that product is available to users.
Examples of OpenText products that require a license include:
• Content Server
• WebReports
• Object Importer / Object Exporter
OpenText recommends that you install OTDS prior to installing the OpenText
product that you will be licensing. Provided you have installed the two products in
that order, your OpenText product, at installation, may create a partially completed
license in OTDS ready for you to edit and complete. This partially completed license
is referred to as a license stub.
After you complete a license in OTDS, you need to acquire a license file from
OpenText and then apply that license file to the License Key box in OTDS.
License Key
The secured content that enables specific features within an application. There
are two formats for license keys supported by OTDS:
stub reduces the possibility of errors in the license record creation. This is the
primary reason why it is recommended to install OTDS before installing the
product to be licensed. If you install the product to be licensed first, the product
will not be able to create the stub.
• Description: the unique name that was assigned when your license was
created. If the OpenText product you are licensing has supplied the name to
your license you cannot edit this box. If you are creating a license, you must
type a unique name. The license name is stored in LDAP.
• Default Status: displayed.
ID
• Description: this box cannot be edited. It will contain the unique name
entered in the License Key Name box.
An example of a license key ID: dc=unique_license_key_name,ou=
Licenses,dc=identity,dc=opentext,dc=net
• Default Status: not displayed.
Description
Resource ID
Application Fingerprint
• Description: if you have a license stub, this box will have been pre-
populated during the stub creation, otherwise, you should populate it with
the appropriate value from your application. The value in this box will be
added to the license key file that is generated. You can edit this box.
You will need to copy the string from this box and enter it into the License
Fingerprint box on the OpenText Product Activation form to send to
OpenText support. After you send the string to OpenText support, they will
provide you with a license key.
License Fingerprint
• Description: this box cannot be edited. It is populated from the license file.
Product
Version
Model
• Description: this box cannot be edited. It describes the nature of the license.
It will be populated from the license file that you apply to the license.
Possible values include: TRANSACTION_BASED, USER_BASED, and
VOLUME_BASED.
• Default Status: not displayed.
Creation Date
• Description: the date that this license was created. This date is coded in the
License File that OpenText support sends you.
Expiry Date
• Description: the date that your license will expire. This date is coded in the
License File that OpenText support sends you.
• Description: the date of the last time that your license was used. This date is
coded in the License File that OpenText support sends you.
• Default Status: not displayed.
• Description: this box cannot be edited. It will be populated from the License
File that you apply to the license. Possible values include:
NON_PRODUCTION, PRODUCTION, and TEMPORARY.
• Default Status: not displayed.
Unit of Measurement
• Description: this box contains either a unit of time or “never”. It indicates the
frequency of the reset for recurring usage allocations. Examples include
“10GB per Month” and “1000000 Transactions per Year”. This information is
coded in the License File that OpenText support sends you.
• Default Status: not displayed.
• Description: the total number of users permitted by this license to access the
product to which it relates.
• Default Status: not displayed as its own field, but total users can be viewed
in License Key Usage.
Current Users
• Description: the usage statistics for the main product of your license. The
format is: <current_users>/<total_users>. If you want to see usage statistics for
separately licensed features of your product, see “Licensees and counters”
on page 340.
• Default Status: displayed.
Status
• Description: you cannot edit this box. It displays the current status of your
license. Possible values include: VALID, INVALIDFP, or EXPIRED.
INVALIDFP indicates that the application fingerprint does not match the
license's content. It is intended to indicate if an incorrect license file has been
loaded into an incompatible license record. If this happens, the license will
still be served to the application, but it will most likely fail to load. If you see
a status of INVALIDFP, update the application fingerprint to match the
actual installation, or load a difference license file.
• Default Status: not displayed.
• Different users accessing and using the product, or feature of the product, with
their individual userID.
• Different locations accessing and using the product, or features of the product,
with their individual access fingerprints. Your product implementation
determines the fingerprint format. Two examples of fingerprint format include:
computer IP address, or the location of the installed product.
• Use of the product, or features of the product, transactionally. Each transaction
will be tracked by OTDS.
For more information, see “Allocate to license” on page 255 and “Viewing licensees”
on page 344.
Counters
Note: Some features are only available if you are using OTDS version 20.4.2 or
higher.
The use of the product is tracked by counters. A counter might refer to a product or
to a feature of a product. These counters can be viewed on the License Keys page.
Counters track the usage of the features of the product you licensed.
For example, a product might be licensed for usage in its entirety, and it might also
be licensed at the level of each individually defined feature of that product. If your
product can be licensed at multiple levels, you can view the individual license
options by selecting View Counters from the license's Actions menu. The top listed
counter tracks the usage or transaction for the main level of the product.
If your product is licensed at the main level only, selecting View Counters from the
license's Actions menu will display only one counter for that main license.
If a user, group, or partition is allocated to the main level of the product, then that
user, group, or partition is allocated to all individually defined features of that
product.
Reserving occurs when the product or feature is used. Reserving does not apply
when the usage of the product, or feature of the product, is of usage type
“Transactions”. Users can be reserved to the product, or to features of the product,
when the usage of the product is of usage type “Users”. Any user can reserve,
provided that user, or the group or partition to which they belong, have first been
allocated.
Once a user makes use of that allocation, that use is called reserving a count in the
license count. In other words, using their allocation, reserves one of the available
counts in the product, or feature of the product. This action is tracked by OTDS.
When the administrator examines the reserved seats for any license, each reserved
seat represents a specific userID accessing the product or feature of the product.
For more information, see “Allocate to license” on page 255, “Viewing licensees”
on page 344, and “Reviewing reserved seats” on page 343.
On the License Keys page, select View Counters from any license's Actions menu.
On this page you will see:
Counter name
The name of the licensed product appears in the first position. If your Counters
page contains multiple entries, the subsequent entries are the individually
licensed features of that product.
Unit name
The type of licensing used for this product and its features. This may be:
Unit count
The total number of available users, seats, or transactions.
Unit usage
The number of users, seats, or transactions in the license that are currently in
use.
Actions
The menu that allows you to View Licensees and to View Reserved Seats. For
more information, see “Viewing licensees” on page 344 and “Reviewing
reserved seats” on page 343.
• The product you want to license may have created a partial license stub that
you will see on this page. Do one of the following:
a. The License Key Name box is mandatory. In the License Key Name box,
choose one of the following:
• If you are completing a partial license stub, the License Key Name box
cannot be edited.
• If you are creating your license, type a unique name for this license. You
will not be able to edit this name later, and a license cannot be deleted
after usage. OpenText recommends that you type a name that references
the product you are licensing. Two examples of possible license key
names:
• If you are completing a partial license stub, the OpenText product you
are licensing has applied the resource ID, and you cannot edit this box.
• If you are creating your license, you must have first created a resource
in Directory Services for this OpenText product. For information about
resources, see “Resources“ on page 181.
Select the resource ID corresponding to the OpenText product that you
will be licensing. The Resource ID box cannot, later, be edited.
e. In the Application Fingerprint box, if you are licensing Content Server,
and if you are directed by the Content Server licensing process, type the
source to be used to generate the license. The Application Fingerprint box
will generate an encrypted string in the License Fingerprint box.
If you are not licensing Content Server, this box is not applicable.
a. On the main support page, from the Accounts menu, select Activations/
Keys.
b. On the Product Activation page, find the product that you will be
licensing. Under the Actions heading, click Produce License Key.
c. In the Activations box, paste the text that you copied from the License
Fingerprint box.
5. You will receive a License File from OpenText. Back in the OTDS user interface,
select the License Key tab.
6. On the License Key page, you can type, paste, or upload the license file that
was provided to you by OpenText. To browse your system, click Get License
File. The License Key box is mandatory.
7. Click Save.
2. From the Actions menu of the license you want to edit, click Properties.
The Edit License wizard will guide you through the steps to edit an existing
license.
3. On the General page, there are only two boxes that can be edited: Description
and Application Fingerprint. Do the following:
4. On the License Key page, enter the new license file that has been provided to
you by OpenText. Putting a new license file into this box will only update the
license key. Your usage units for this license will not be affected.
You can click Get License File to browse to select your license key file and
apply it.
Note: Some features are only available if you are using OTDS version 20.4.2 or
higher.
Note: View reserved seats to view actual usage of the license. If, instead,
you want to view users allocated to a license, see “Viewing licensees”
on page 344.
2. From the Actions menu associated with the license whose licensees usage you
want to view, click View Counters.
Note: If the license you chose showed a Unit Usage of zero, “0”, then the
View Reserved Seats page will be blank, because no allocated resource
used that license.
3. On the Counters page, from the Actions menu of the counter whose licensees
you want to view, click View Reserved Seats. This only applies to counters
with a Unit Name of “Users”.
Important
Caution
Deleting a license key cannot be undone.
2. Select the box to the left of the license you want to delete, and then, on the
button bar, click Delete.
Note: Any license that has licensees, who generate usage records, cannot
be deleted, as usage records cannot be deleted.
3. In the Delete box, click OK to confirm or click Cancel to keep the license.
Note: This page displays users allocated to a license. If, instead, you want
to view actual usage of the license, see “Reviewing reserved seats”
on page 343.
2. From the Actions menu associated with the license whose licensees you want to
view, click View Counters.
3. On the Counters page, from the Actions menu of the counter whose licensees
you want to view, click View Licensees.
4. Review the information provided. You can select the Users, Groups, or
Partitions tab to view the licensees by users, group, or partition.
All users who are members of a group or partition will not be displayed. Only
those users who have been directly allocated to the license.
The information includes:
Important
OpenText recommends that you do not select the de-allocate option
unless you have advanced knowledge of licensing for your product.
2. From the Actions menu associated with the license whose report you want to
generate, click Generate Report.
• Start Date: from the list boxes, select the month and year that will be the
start date for the data this report will generate.
• End Date: from the list boxes, select the month and year that will be the end
date for the data this report will generate.
• Report: from the list boxes, select the type of report that you want to
generate. Reports can be generated for a single license record or for multiple
license records. Your options are:
4. If you want to generate the report on the page, click Generate Report. If you
want to save the report to your system, click Download Report.
5. Click OK.
3. The columns on the main License Keys page have now changed to show the
data for the OpenText certificate associated with each license. The columns now
displayed are: Certificate Name, Expiry Date, Actions.
4. After you have examined the license certificates information, click Show
License Keys to return to the main licenses box display.
You can audit licensing events on the Audit Reports page. The licensing events you
can review on this page include:
This section describes password interactions with single sign on; provides some
background and direction on the service principal name system attribute; describes
customizing the login user name format; describes some common single sign on
scenarios; and explains single sign out.
When a user from a synchronized user partition tries to sign in with an expired
password, they will be rejected. Error conditions will be sent back from the LDAP
provider to indicate why the user's password was rejected. In this scenario, the user
will not be able to sign in through the Directory Services web interface until they
have obtained a valid password from their resource.
The Directory Services web-based sign-in page may be customized to match your
local interface standards. To customize the sign-in page, you can edit the .jsp files
found in <OTDS_installdir>\otdsws\WEB-INF\jsp. You can also add product
specific banners in <OTDS_installdir>\otdsws. See “Customizing Directory
Services“ on page 355 for information about how to perform these edits.
• oTExternalID1 = franz
• oTExternalID3 = [email protected]
• oTExternalID4 = OPENTEXT\franz
Users can use any of these formats to sign in. To change this behavior, and allow
users to sign in with a value corresponding to a different attribute, for example mail,
modify the Login User Name Attributes property value. See Login User Name
Attributes on page 310 for more information.
Note: If more than one account is found using the login name entered, the user
will not be able to sign in. A corresponding message with the string MULTIPLE_
IDENTITIES_FOR_USER_NAME will be logged in the file directory-access.
log. In this condition, no actual authentication attempt is performed against
the LDAP server in order to prevent locking out accounts. See How do I
resolve “MULTIPLE_IDENTITIES_FOR_USER_NAME” errors when different
users are registered with the same email account in OTDS? on page 407 for
more information.
1. The user signs in to the Portal Application which is not aware of Directory
Services.
2. A custom HTTP authentication handler for the Portal Application user ticket is
invoked.
3. The user is signed in silently to the embedded resources.
OTDS will now support single sign out across all OpenText products, after those
products have also implemented this support. OTDS will inform all applications that
are part of the user's sign-in session that the user wants to sign out. The applications
will sign the user out and clear their authentication token or cookie. OTDS will also
clear its authentication token or cookie.
The administrator needs to configure this option for users by applying the necessary
information to either the resource or the OAuth client. For more information, see the
Sign out URL and Sign out Method boxes in “OAuth Clients“ on page 281 or
“Resources“ on page 181.
or cookie. Under those circumstances, OTDS will not clear its authentication token
or cookie. The OpenText product effects this direction using the Sign out URL and
Sign out Method boxes. That OpenText product's documentation will supply the
necessary information. For more information, see the Sign out URL and Sign out
Method boxes in “OAuth Clients“ on page 281 or “Resources“ on page 181.
Generally, the OpenText product's resource in OTDS will need its Sign out URL box
set to:
<product_URL>/?func=otdsintegration.logout
This will direct the user to a product-specific sign out page to ensure that the user
only signs out of that product. The user will remain signed in to OTDS.
This section describes how to customize the OTDS sign-in page and the emails that
OTDS sends to your users. It also describes how to customize the user and group
attribute mappings that you can define between OTDS and your resource, for
example Content Server.
• On Windows: C:\OTDS\otdsws\WEB-INF\email
• On UNIX or Linux: /usr/local/OTDS20/otdsws/WEB-INF/email
For more information, see “Customizing the sign-in page” on page 356 and
“Customizing OTDS emails” on page 357.
Important
OpenText recommends that you use extreme caution when modifying the
template files. Improper or inaccurate changes to these template files can
negatively impact your Directory Services environment.
For more information, see “Customizing Directory Services mappings” on page 359 .
1. You can customize the user interface version on the resource through the Sign in
UI Version box. This box determines whether your users will see the traditional
OTDS sign-in page, called “login1”, or the new OTDS sign-in page, called
“login2”. The files for each of these sign-in pages are found in the otdsws
directory.
2. You can customize the sign-in graphic on the resource through the Sign in UI
Style box:
a. First, create and save your customized graphic:
• If you are using the traditional OTDS sign-in page, place your
customized graphic in the <OTDS_install_path>/otdsws/login1
directory.
• If you are using the new OTDS sign-in page, place your customized
graphic in the <OTDS_install_path>/otdsws/login2 directory.
b. Next, when creating your resource, on the General tab, in the Sign in UI
Style box, type the file name with extension of your customized graphic.
For more information, see the General tab information in “Creating a non-
synchronized resource” on page 183 or “Creating a synchronized resource”
on page 213.
3. You can customize the <OTDS_install_path>/otdsws/login2/login2_
custom.js file to change the colors displayed on the OTDS sign-in page. For
example, if you add the following lines to the login2_custom.js file, your sign-
in page will change from blue themed colors to green themed colors:
var otds_customization_enabled = true;
var otds_custom_dark_color = "#146634";
var otds_custom_medium_color = "#8cc53e";
var otds_custom_light_color = "#e7f1d9";
4. You can enable the password reset option on the OTDS sign-in page. After you
enable the password reset option, from the OTDS sign-in page, users can select
either Forgot Password or reset it here to receive an email that provides them
with a password reset so that they can sign in.
The password reset option is controlled by the system attribute Enable Password
Reset on page 304. By default, this attribute is enabled. To remove the password
reset option from the OTDS sign-in page, set the Enable Password Reset
on page 304 attribute to “false”.
To enable this option, you must configure your SMTP server information. For
more information, see “SMTP Settings” on page 321.
5. You can choose to use a custom third-party image for your authentication
handlers. Currently, OTDS provides the following built-in third-party handlers
images:
• third_party_facebook*
• third_party_google*
• third_party_linkedin*
• third_party_microsoft*
• third_party_twitter*
• third_party_yahoo*
Note: For the user to receive the email, the userid account must have a valid
email address configured.
Important
OpenText recommends that you never edit the original files located in the
<OTDS_install_dir>/otdsws/WEB-INF/email directory.
2. After you have created your email-custom directory, you can edit any of the
files located in that custom directory as you wish. For descriptions of the files
you can edit, see “The email files you can edit” on page 357.
Note: If, at a future date, you upgrade your OTDS installation, the
customizations you implemented to your email-custom directory will not
be over-written. However, any updates that OTDS writes to the email
directory will not be applied to your email-custom directory.
After an upgrade, if you want the latest email updates applied, you will
need to follow these directions again.
1. Make sure that you copied the email directory as stated in the first step. All
further steps in this section refer to the files found in the new <OTDS_install_
dir>/otdsws/WEB-INF/email-custom/ directory.
All emails that an OTDS German UI sends will now pick up your custom
German text.
Where:
• mapping: is the tag within which one pre-defined user attribute mapping or
one group attribute mapping is defined.
• source: is the tag within which the mapped value in the resource is defined.
Only those mappings that have been pre-defined will have source.
• value: is the mapped value. Only those mappings that have been pre-
defined will have value.
• target: is the Directory Services parameter name being mapped. All
mappings have target.
Caution
OpenText strongly recommends that you do not edit target.
• format: is the definition of the format for the mapping. All mappings have
format. For more information about format, see “Applying user partition
attribute mappings” on page 98.
After you modify any of these template files, when you create a new synchronized
user partition, Directory Services will access the values that you saved to the
template. Those values will appear in the assistant. You will still have the option of
editing the values in the assistant during the creation or editing process.
You can add a new mapping to your template file, however, if you provide an
attribute that does not exist in OpenDJ, Directory Services will try to add that
mapping. Your results may not be as expected. OpenText recommends that you do
not add a new mapping.
Note: Only SCIM 2.0 is supported. OTDS does not support SCIM 1.1.
To synchronize users to OTDS through SCIM, you must have OTDS version
16.2.0 or later installed.
OTDS uses OAuth2 access tokens to secure its SCIM API. The SCIM client must use
an OAuth2 grant in order to obtain an access token.
3. In the General tab, in the Client ID box, type a descriptive name for OAuth
client. For example, type: SCIM-Client
4. In the Description box, type a more detailed description for this OAuth client.
For example, type: OAuth client to allow SCIM support.
Important
After you click Save, OTDS will display a Secret Key box. You must make
note of this generated client secret key. OTDS only displays this key once.
If you lose it, you will either need to delete this OAuth client and re-create
it, or edit it to remove the confidential setting, save it, and then reapply the
confidential setting. For more information, see “OAuth
Clients“ on page 281.
7. Because the third-party service you have selected, for example Microsoft Azure
AD, will be synchronizing into OTDS, you need to create a non-synchronized
partition:
c. In the Name box, type a descriptive name for this partition. For example,
type: SCIM-partition
d. In the Description box, type a more detailed description for this partition.
For example, type: Non-synchronized partition to allow SCIM support.
e. Under the Actions column, click Save.
8. Ensure that the OAuth client you created in Step 1 is added as an administrator
of the non-synchronized user partition you created in Step 7:
9. You will now need to configure the service, such as Microsoft Azure AD, that
you will be using to enable SCIM support in OTDS.
10. After you have completed all configuration steps listed here, you can access the
base URL for SCIM. The form of this URL is: https://otdsserver/otdsws/scim/
<partition_name>
Using the example provided in Step 7, the URL is: https://otdsserver/otdsws/
scim/SCIM-partition
Directory Services provides the Jobs tab in OTDS to monitor the progress of user-
initiated jobs and system jobs running as asynchronous background operations on
the server. The following is a partial list of the jobs that OTDS will track on the Jobs
tab:
• Import
• Consolidate
• Monitoring
• Scheduled Sync
• The Name of the OTDS function that is running a job that the Jobs tab is
tracking.
• The Target of the job that is running. For example, if the Recycle Bin has run a
job, and its target is Auto delete scheduler, this job is running the automatic
delete function that was scheduled in “Recycle bin settings” on page 277.
• The job's Start Time and Finish Time.
The times displayed depend on the system on which you are accessing the web
administration UI, not the system on which OTDS is installed.
• The number of Errors, Warnings, and Information Messages associated with the
job.
• The Status of the job can be one of: Running, Canceled, Failed, or Completed.
Jobs buttons
System jobs
There is only one SYSTEM job. It appears with a Name of “SYSTEM” and a Target of
“SYSTEM”. It is a placeholder for operations performed by OTDS in the background
that are not directly associated with a user-initiated job, or other jobs that are owned
by their component such as Enterprise Sync Monitoring, Scheduled Sync, or Recycle
Bin auto delete. Whether the system job can be canceled or not is dependent on the
operation being performed.
Recycle Bin's “auto delete” job cannot be canceled. To change the setting for Recycle
Bin's auto delete, see “Recycle bin settings” on page 277.
User-initiated jobs
Canceling a user-initiated job requires confirmation and does not undo any work
already completed. When a job has been canceled, the Status will show the text
Canceled. A canceled job cannot be restarted.
• Source: details the source of the information message. For example, if the source
is listed as Recycle Bin, then the recycle bin function has generated this
information message.
• Type: details the type of action that required the source to generate an
information message.
• Time: the time that the source generated the information message.
2. From the Actions menu associated with the job click View Errors, View
Warnings, or View Info Messages.
3. In the information box, you can read the Source, Type, Time, and Message.
There is no action you can take in this box.
4. After you have read the information you need, click Close.
1. From the web administration menu, select the Jobs tab. Whether or not you
have the option of canceling a job is dependent on the type of job.
2. From the Actions menu of the job you want to cancel, select Cancel Job.
3. In the Confirm Job Cancellation window, click Yes to confirm that you want to
cancel the job. Click No to allow the job to continue.
2. In the Jobs window, from the button bar, click Clear All Completed Jobs.
3. All jobs with a Status of “COMPLETED” will be removed from the Jobs tab
immediately.
2. You can now either manually select the box to the left of every job that you
want to clear, or you can use the search bar to narrow the jobs that appear on
the Jobs tab.
3. After you have selected the box to the left of every job that you want to clear, on
the button bar, click Clear Selected Job(s).
Directory Services provides reporting derived from audits of OTDS functions that
have occurred within a specified time frame. Examples of reports you can view on
the Audit Reports tab include:
You can set the auditing parameters in the Audit/Reporting Settings area of the
System Config page. You should also set the Notification Settings area of the
System Config page at the same time. See “Audit/Reporting Settings” on page 322
and “Notifications Settings” on page 323 for more information.
i. Optional You can choose to search by Starts with or Contains. Select one
of the radio buttons to define your search filter, and then type your
search query in the associated box.
ii. You can optionally choose to define the number of results that will
display per page. The default is 25 results per page. If the search
produces multiple pages of results, click Previous and Next to page
through the results.
iii. Optional You can optionally make a selection in any other attribute box:
• The Start Date and End Date boxes allow you to define dates
within which the audit report was generated.
• The Partition box allows you to restrict this search to one partition.
• You can further restrict the search parameters by making selections
from the Results and Sources lists.
• Finally, you can type text to either the Audit Object ID or Audit
user boxes to restrict your search to a specific object ID or user.
For a description of the attribute boxes available, see “An audit report's
details” on page 369.
iv. Click Search to apply this search filter. The results will appear in the
Audit Reports main page.
i. The only attribute box that is applicable when performing this type of
search is the Types box.
You must make a selection from the Types list to specify the type of
audit report you want to search.
iii. Read the count that is returned, then close the information bar.
ID
The unique identification number for this audit report. OTDS generates this
identification number for each audit report.
Description
The description of the nature of the audit report. Not every audit report will
have a description.
Time
The date and time on which the audit report was generated. The time appears in
the form: <YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
The time zone is UTC.
Event Type
The type of audit report. Examples of types include: group create, group modify,
user create. You can see the full list of possible event types in the Types box
under the search area on this page.
Result
Gives the status of the event. Possible values include: success, warning, failed,
unknown. You can see the full list of possible results in the Results box under
the search area on this page.
Audit User
The userid of the user who instigated the event.
Source
The name of the service responsible for the event. You can see the full list of
possible sources in the Sources box under the search area on this page.
Audit Object
Every entity, for example every user or every group, has a unique identification
number assigned by OTDS. You can run a search on this number to find all
audit reports that apply to this entity.
Partition Name
The name of the partition within which the event occurred. Not every audit
report will have a value in this box. For example, global actions will not have a
value in the partition box as a global action applies to all partitions.
Data
The specific attributes of the event.
2. From the Actions menu of the audit report whose details you want to view,
click Details.
3. Read the information presented in the Details box. For information about the
boxes on the Details dialog box, see “An audit report's details” on page 369.
4. Click Cancel.
2. From the Actions menu of the audit report whose object you want to view, click
Go to object.
3. You have now left the Audit Reports page. To view your precise location, see
the breadcrumb trail at the top.
4. Examine the report that you have been taken to view and make any changes
you need to make. If you make changes, on the button bar, click Save. To exit
this page without making any changes, click Cancel.
2. Near the top of the page, just under the search area, from the Results box,
optionally choose a result for this query. Your options are success, warning,
failed, unknown. To include all results options, leave this box blank.
3. From the Sources box, optionally choose a source that will be searched for this
query. To include all sources, leave this box blank.
4. You must select a type from the Types box. The types listed here are the events
that OTDS tracks for audit reports.
5. After you have made your selections, on the button bar, click Event count. You
will see an information bar appear on the page with the number of events that
OTDS has recorded.
The System Status page lets you view an OTDS Configuration Report, version
information for the Directory Services product, and highlights Potential
Configuration Issues. Information on the System Status page can be refreshed.
• The Version Information area shows the product build date, build number,
product version, and hardware fingerprint.
Tips
For more information about the Potential Configuration Issues area of the System
Status page, see “Viewing potential configuration issues” on page 373.
1. From the web administration menu, under the Info heading, click System
Status.
3. In the Save As window, select the location to which this file will be downloaded
and then click Save. Accept the default name “otds_system_config_report.txt”
or type a new name.
1. From the web administration menu, under the Info heading, click System
Status.
2. On the System Status page, if configuration issues have been detected, they will
be displayed in the Potential Configuration Issues area.
If no configuration issues were detected, the message “No Configuration Issues
detected!” will be displayed below the button bar.
If configuration issues are displayed, you can click each issue in turn to be
directed to the solution to that issue.
3. You will be directed to the Directory Services object in which you can correct
the configuration issue.
To zip and download the log files, from the web administration menu click Log
Files, and then, from the button bar, click Zip and Download Log Files. When the
zip file is ready, choose to save it to a directory of your choice. This section describes
the information recorded to the log files about Directory Services.
22.1 otds.log
The otds.log file contains a record of actions, such as starting and stopping,
performed by Directory Services. The otds.log file can be accessed from the web
administration client. It is found in the Tomcat or WebSphere directory. If you
installed your application server to the default location, you will find the log file at
<app_srvr_installdir>\logs.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379. This log file is configured to have a maximum size of
50MB and permit ten archived versions before rolling over. To change these settings,
see “Configuring the Directory Services log files” on page 380.
22.2 directory-provenance.log
The directory-provenance.log file traces the lifecycle and relationships of objects
and events related to user and group synchronization. It will also write
consolidation messages.
Directory Services has stricter syntax checking than Active Directory for some types.
As a result, some user or group entries exist in Active Directory, but do not make it
to Directory Services. The directory-provenance.log will record these types of
import or synchronization failures.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379. This log file is configured to have a maximum size of
50MB and permit ten archived versions before rolling over. To change these settings,
see “Configuring the Directory Services log files” on page 380.
22.3 directory-access.log
The directory-access.log file contains entries relating to successful and
unsuccessful authentication attempts. This log file details userid sign in and sign out
attempts to and from OTDS.
For example, if multiple users exist with the same username across multiple
partitions, OTDS will attempt to resolve the username. If this is not possible, the
directory-access.log will contain a message, with the string MULTIPLE_
IDENTITIES_FOR_USER_NAME, to indicate that multiple identities for the given
username were found. See How do I resolve
“MULTIPLE_IDENTITIES_FOR_USER_NAME” errors when different users are
registered with the same email account in OTDS? on page 407 for more information.
This is also the log file that you should check to see whether the SAP user is mapped
correctly to OTDS and to Content Server.
The directory-access.log file can be accessed from the web administration client.
It is found in the Tomcat or WebSphere directory. If you installed your application
server to the default location, you will find the log file at <app_srvr_installdir>
\logs. This is a comma separated value (CSV) log. For information about reading
CSV log files, see How do I understand comma separated value (CSV) log entries?
on page 394.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379. This log file is configured to have a maximum size of
50MB and permit ten archived versions before rolling over. To change these settings,
see “Configuring the Directory Services log files” on page 380.
22.4 directory-audit.log
The directory-audit.log file records administrative actions and changes to
configuration performed in Directory Services.
The directory-audit.log file can be accessed from the web administration client.
It is found in the Tomcat or WebSphere directory. If you installed your application
server to the default location, you will find the log file at <app_srvr_installdir>
\logs. This is a CSV log. For information about reading CSV log files, see How do I
understand comma separated value (CSV) log entries? on page 394.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379. This log file is configured to have a maximum size of
50MB and permit ten archived versions before rolling over. To change these settings,
see “Configuring the Directory Services log files” on page 380.
22.5 otds-installer.log
The <otds-installer>.log file contains a record of install actions performed by
Directory Services. To create this log file, during installation you need to use the
following parameters:
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
22.6 otdsDeploy.log
The otdsDeploy.log file contains a record of install actions performed by Directory
Services.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
22.7 RejectedEntriesFile.txt
This file contains information about entries that failed to import during a new
installation, when OpenDJ is prepopulated with OTDS-specific LDAP data. It will
also contain information about entries that failed to import during a data migration
from OTDS 10.2.1, or OTDS 10.5.x, or OTDS 16.x, or OTDS 20.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
22.8 SkippedEntriesFile.txt
This file contains information about entries that failed to import during a new
installation, when OpenDJ is prepopulated with OTDS-specific LDAP data. It will
also contain information about entries that failed to import during a data migration
from OTDS 10.2.1 or OTDS 10.5.x, or OTDS 16.x, or OTDS 20.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
Instructions to view the OTDS log files can be found in “Viewing the Directory
Services log files” on page 379.
• otds.log
• directory-provenance.log
• directory-access.log
• directory-audit.log
do the following:
Note: Accessing these log files in the web administration UI will only
display the last section of that log file. To view the entirety of the log
files, from the button bar, choose Zip and Download Log Files. For
more information, see Step 1.d.
c. Optional By default, these log files display the text on the page unwrapped. If
you want the log text to wrap within the browser, from the button bar, click
Toggle Wrap. To reset the default display, from the button bar, click
Toggle Wrap.
d. Optional If you want to zip and download the log files, from the button bar,
click Zip and Download Log Files. As soon as the zip file is ready, choose
to save it to a directory of your choice.
2. If, when you installed OTDS, you created an installation log file, you will find
the <your_logfile_name>.log file in the directory in which you placed, and
from which you ran, the OTDS installer file.
• otdsDeploy.log
• RejectedEntriesFile.txt
• SkippedEntriesFile.txt
and you installed OTDS to the default location, you will find these log files at
the following locations:
• On Windows: C:\OTDS\install
• On UNIX or Linux: /usr/local/OTDS20/install
4. If you want to view any of the OpenDJ log files, for example the OTDS
replication log files, and you installed OTDS to the default location, you will
find the OpenDJ log files at the following locations:
• On Windows: C:\OTDS\opendj\logs
• On UNIX or Linux: /usr/local/OTDS20/opendj/logs
• otds.log
• directory-provenance.log
• directory-access.log
• directory-audit.log
3. Optional If you want to change the maximum file size permitted for these log
files, find the SizeBasedTriggeringPolicy setting for that log file and change the
value.
4. Optional If you want to change the log file rotation value for these log files, find
the DefaultRolloverStrategy setting for that log file and change the value.
There are many documents that can assist you with your Directory Services
environment and configuration. The main document is the OpenText Directory
Services - Installation and Administration Guide (OTDS-IWC). This section details, and
provides access to, the most helpful Directory Services documentation.
• http://localhost:8080/otdsws/v1
• http://localhost:8080/otdsws/rest
27085933/18982571/
Azure_AD_to_OpenText_Directory_Services_Provisioning.pdf?
nodeid=69725963)
1. OpenText Directory Services with the OTDS Web Client Installation and
Administration Guide 10.5.1 (https://knowledge.opentext.com/knowledge/
piroot/otds/v100500-01/otds-iwc/en/html/_manual.htm).
2. OpenText Directory Services Installation and Administration Guide 16.6.3
(https://knowledge.opentext.com/knowledge/piroot/otds/v160603/otds-iwc/
en/html/_manual.htm).
3. OpenText Directory Services Installation and Administration Guide 20.4.1
(https://knowledge.opentext.com/knowledge/piroot/otds/v200401/otds-iwc/
en/html/_manual.htm).
If your site does not have Internet access, or if you wish to opt out of using the
Global Help Server, you can redirect help requests to the OpenText Private Help
Server. The Private Help Server is a local help server utility that allows you to set up
a local help server within your network.
The OpenText Private Help Server is available in OpenText My Support. See the
Private Help Server Administration Guide (https://knowledge.opentext.com/
knowledge/cs.dll?func=ll&objId=74951271&objAction=browse&viewType=1) for
more information.
Notes
• The Private Help Server can support multiple OpenText products. If the
Private Help Server has already been installed within your organization to
support another OpenText product, you can add additional OpenText
product online helps to that installation.
• If you are replacing a previous PHS installation, see OpenText Help System -
Private Help Server Administration Guide (OTHS-AGD).
• If the server you want to use for the PHS installation cannot connect to the
Internet, see OpenText Help System - Private Help Server Administration Guide
(OTHS-AGD).
Once the PHS is installed or upgraded, you can use its Online Help Deployer to
download online helps from the GHS system by entering the help deployment codes
listed below. For more information about using the codes, see OpenText Help System -
Private Help Server Administration Guide (OTHS-AGD).
Code Product
OTDS210300-IWC OpenText™ Directory Services CE 21.3
1. From the web administration menu, select System Config, and then select the
System Attributes tab.
3. In the Attribute value box, type the fully qualified domain name and port
number of the local server to which you have downloaded and unzipped the
OTDS online help file.
This is the base URL that you typed in the Server URL box during the
installation of Private Help Server. For example, type: http://mymachine.
opentext.com:8080/OTHelpServer/mapperpi
4. Click Save.
• Oracle E-Business Suite Software Development Kit for Java reference: https://
support.oracle.com/epmos/faces/ui/km/DocumentDisplay.jspx?id=
974949.1
This section helps you resolve issues with your Directory Services configuration.
To troubleshoot any installer issues you should run the installer from the
command line with the installer log file parameter:
The silent install will create a log file, <your_logfile_name>.log in the same
directory that you placed, and ran, the OTDS installer file.
The following additional log files will be generated:
• RejectedEntriesFile.txt
• SkippedEntriesFile.txt
By inspecting these files you will be able to find the location of installation
failure.
Note: If you installed OTDS to the default location, you will find these log
files:
For more information about log files, see “Log Files“ on page 375.
The installer can encounter a problem, and not finish, when the embedded
LDAP directory cannot find a compatible Java installation.
To resolve this issue, ensure that a recommended version of Java is installed or
set the <OPENDJ_JAVA_HOME> environment variable to a compatible Java
installation. For more information on which Java versions are compatible, see
the OpenText Directory Services Release Notes in OpenText My Support (https://
knowledge.opentext.com).
3. Restart Tomcat.
Consider the following scenarios that can occur during an install of OTDS:
1. You provide the path to your web application server, either Tomcat or
WebSphere, but not the service name. Then, you fail to start the web
application server, and you proceed with the installation.
2. You install an OTDS replication server but you provide an incorrect
password for the replication server.
If either of these scenarios occurs, the installation of Directory Services will fail.
If an installation fails, for any reason, you need to perform some manual cleanup
of files before beginning the installation again.
• ot-authws.xml
• otds-admin.xml
• otdstenant.xml
• otds-usergroup.xml
• otds-v2.xml
• otdsws.xml
This error message appears when the Java path that you provided during the
installation of OTDS has changed since you installed. If you upgraded Java after
OTDS was installed, the OTDS installer does not have the correct Java path.
You should contact OpenText support for assistance to edit the OTDS registry
entry for JavaBinPath to ensure that the correct Java path is listed.
This error message appears when the Tomcat configuration did not include the
“-d64” option.
To fix this problem, see “Configuring Tomcat for OTDS” on page 14.
1. Stop the current installation of Tomcat and, if you want, uninstall it.
2. Install the new version of Tomcat. Make note of the installation path of this
new version of Tomcat.
4. Open a text editor and edit the otds-deploy.config file. Find the
applicationServerDirectory variable. It points to your current version of
Tomcat. Change the directory to point to your new version of Tomcat. Take
care to keep the same syntax and ensure that you pay close attention to the
slashes.
This will create the context files for OTDS in your new Tomcat directory.
6. If you are running on Windows, update any values in the following registry
key to point to the new Tomcat path or service name:
HKEY_LOCAL_MACHINE\SOFTWARE\OpenText\otds
1. During the installation of your new version of OTDS you will have
access to a fully automated path to perform the export from your old
installation and the import to your new installation.
2. Follow the instructions found in the Installation Type and OpenText
Directory Services Data Import pages of the installation.
For more information, see “Installing Directory Services on
Windows” on page 29 or “Installing Directory Services on UNIX or
Linux” on page 40.
Note: If you need to move your OTDS data from one machine
to another, you can perform a manual export of your OTDS
data as follows:
After you have collected the necessary files, move them to the
machine on which you intend to install your new version of
OTDS, and then follow the instructions during the installation
to import your OTDS data.
If you install OTDS 21 to a system with no previous version installed, OTDS will
install on Windows to C:\OTDS20 and on UNIX to /usr/local/OTDS20.
However, if you upgraded a previous version to the 21 version, the new version
will install to the path of the previous version.
On Unix, the installer will fail to load a required library unless you use the -d64
option to direct that the 64-bit version of Java must be used. For more
information, see “Configuring installation prerequisites” on page 14 and What is
the problem if I see the error “Unrecognized option: -d64” in my catalina.out
log file? on page 393.
The “-d64” option must be included with some Java versions and cannot be
included with others. For example, if you are using Java version 11, and you
attempt to start Tomcat with the “-d64” option, you will see the “Unrecognized
option” error. For more information, see “Configuring installation prerequisites”
on page 14.
If OTDS fails to deploy after an upgrade, you will see a message to contact
OpenText support. An error occurred during the upgrade process. OpenText
support will need to fix that error and then manually deploy the version 21
installation of OTDS.
On AIX, if the OTDS installation fails with an OpenDJ error, you may have
neglected to set a required environment variable.
See “OPENDJ_JAVA_ARGS” in “UNIX and Linux pre-requisites before
installing” on page 41 for more information.
You can generate logs by running the installer from the command prompt with
these options:
For directions on using the msiexec utility on Windows with the /l*v option,
see “Installing OTDS on Windows from the command line” on page 37.
For directions on using the setup script on UNIX with the -l option, see
“Installing OTDS on UNIX or Linux non-interactively” on page 50.
This will create a log file, otds-installer.log in the same directory as the msi
installer file on Windows or the tar installer file on UNIX.
The following additional log files will be generated:
• RejectedEntriesFile.txt
• SkippedEntriesFile.txt
Note: If you installed OTDS to the default location, you will find these log
files:
For more information about log files, see “Log Files“ on page 375.
Example:
2014-04-15 16:13:28.962 INFO - ,2014/04/15 16:13:28 EDT,0,0,
Configuration Service, Information, 37, Remove Access Role from
Resource, [email protected], opentext.ot.com, "Access
Role 'cn=psmith,ou=AccessRoles,dc=identity,dc=opentext,
dc=net' removed from Resource 'cn=opentext.ot.com,
ou=Resources,dc=identity,dc=opentext,dc=net'"
CSV information:
• Time, date, and type of event: In the example above, the time, date, and type
of event are: 2014-04-15 16:13:28.962 INFO - ,2014/04/15 16:13:28
EDT.
• Internal Job ID: This id can be used to link individual tasks together. This id
will be 0 (zero) if there is no associated job. In the example above, the internal
job ID is “0”.
• Internal Task ID: In the example above the internal task ID is “0”.
• Name of internal service that generated the entry: In the example above, the
name of the internal service is Configuration Service.
Example:
<?xml version="1.0" encoding="UTF-8" ?>
<log4j:configuration xmlns:log4j="http://jakarta.apache.org/log4j/">
<appender name="otds.c.library.console.appender"
class="org.apache.log4j.ConsoleAppender">
<param name="Target" value="System.out"/>
<layout class="org.apache.log4j.PatternLayout">
<param name="ConversionPattern" value="%-5p %c{3} - %m%n"/>
</layout>
</appender>
<!-- Output the log message to a log file named otds.c.library.log -->
<appender name="otds.c.library.normal.appender"
class="org.apache.log4j.FileAppender">
<param name="file" value="otds.c.library.log" />
<param name="append" value="true" />
<layout class="org.apache.log4j.PatternLayout">
<param name="ConversionPattern" value="%d %5p %c{3} - %m%n" />
</layout>
</appender>
<!-- the following appender creates a logfile in log4j XML format, suitable to
viewing with
XML log viewer such as Chainsaw (http://logging.apache.org/log4j/docs/
chainsaw.html) -->
<appender name="otds.c.library.xml.appender"
class="org.apache.log4j.RollingFileAppender">
<param name="file" value="otds.c.library.xml" />
<param name="append" value="true" />
<param name="ImmediateFlush" value="true" />
<layout class="org.apache.log4j.xml.XMLLayout" />
</appender>
<!-- Setup the logger category, add the appenders and set the default level
5 level of logging, ALL < DEBUG < INFO < WARN < ERROR < FATAL -->
<logger name="otds">
<level value="ALL" />
<appender-ref ref="otds.c.library.console.appender"/>
<appender-ref ref="otds.c.library.xml.appender"/>
<appender-ref ref="otds.c.library.normal.appender"/>
</logger>
</log4j:configuration>
You may want to stop monitoring your identity provider before making major
changes to your synchronized user partition. To stop monitoring changes, see
Step 12.
To resolve this issue, use a fully qualified domain name for the domain
controller.
Limited import / sync failures
Some user or group entries exist in Active Directory, but do not make it to
OTDS. This can occur because OTDS has stricter syntax checking than Active
Directory for some types, for example, telephoneNumber.
To resolve this issue, consult the “directory-provenance.log” on page 376 for
individual import or sync failure entries and correct the appropriate entry in
Active Directory. You can also choose to map the attribute that is not importing
to a string-valued OTDS attribute. If you choose this option, you will need to
consolidate after making mapping changes.
Password expiry
OTDS can use read-only accounts with which to sync. OTDS read-only accounts
tend to have passwords that expire.
• Domain Users
• Domain Local Groups
• Domain Global Groups
• Universal Groups
The default filter can be changed to include or exclude your desired object types.
The Domain Users group is not supported, and therefore is not imported.
You must ensure that your Directory Services CN user mapping is unique in
OU. Identify a unique user attribute that can be mapped, and then edit your
user mappings accordingly. For more information, see “Defining user
attributes” on page 85.
When trying to resolve difficulties with OTDS, always check the OTDS log files.
For more information, see “Log Files“ on page 375.
What does “Error validating a ticket. OTDS client library error code:
-11” mean?
This error indicates that the user is seeing a ticket mismatch between Content
Server and OTDS. There are three possible options to resolve this issue:
1. The first option is to deactivate the resource from the OTDS side, and then
reactivate from Content Server:
a. Sign in to Directory Services, and deactivated the resource.
b. Sign in to Content Server. On the Directory Services Integration
Administration page, change the integration information, and then
restart the Content Server admin servers.
c. In Content Server, change the Directory Services integration settings to
the correct settings and then restart the Content Server admin servers
again.
2. A second option to resolve this issue is to ensure that you set your
maxHttpHeaderSize to 65536. For more information, see “Configuring
Tomcat for OTDS” on page 14.
3. The final option to resolve this issue is to check to see if a client / server
mismatch has occurred:
• Content Server was using a resource ID that was activated with 10.5, and
then switched back to Content Server 10.0.
This error indicates that the user must deactivate the resource from the OTDS
side, and then reactivate from Content Server:
• The Admin user. The password must be maintained using Content Server.
What ports must the administrator ensure are open on OTDS and Content
Server?
• The port used by the web application server, either Tomcat or WebSphere,
needs to be open.
• If you are using replication, the replication port needs to be open, only
between the OTDS servers. The replication port is configured when you
install OTDS.
If you are running consolidation from a server that is not the master host, you
also need to ensure that the port that you defined in Synchronization Master
Host on page 315 is open.
• Make sure the Content Server access role in OTDS has been created correctly.
The Content Server Members partition needs to be added to the Content
Server access role.
• Make sure that the Include groups option has been selected on this Content
Server access role.
Directory Services may need to use a domain-level cookie to pass the user's
authentication token to resources, depending on the functionality implemented
by the resource. The resource must be configured with a fully qualified DNS
domain name for the Directory Services URL, and the browser must use a fully
qualified DNS domain name in order to access Directory Services. Moreover,
Directory Services and the resource must reside in the same top-level domain.
As an example, the cookie from Directory Services will make it to the resource if:
The cookie from Directory Services will not make it to the resource if:
In this case, Directory Services will display the error above. Ensure that both
OTDS and the resource are accessed using the same top level DNS domain. This
may require a DNS alias, a reverse proxy, or another network-level solution.
Directory Services will issue the cookie to the narrowest scope domain that
matches the Directory Services URL and the resource's URL. For example, if
Content Server is cs.dev.opentext.net and Directory Services is otds.dev.
opentext.net, Directory Services will issue the cookie to the .dev.opentext.
net domain.
However, the Directory Services configuration property Default HTTP Cookie
Domain can be used to force the cookie domain to a wider scope, for
example .opentext.net, if this is desired.
Content Server displays a message informing you that the request came
from a referring website that is not trusted
To resolve this issue, add the Directory Services URL to the Trusted Referring
Websites box.
To add the Directory Services URL to the Trusted Referring Websites box:
This occurs when Directory Services has successfully authenticated the user, but
Directory Services has not been configured to allow this user access to the
requested resource.
If you are certain the user should have access to the resource, perform the
following steps, stopping when you have resolution.
1. Double check all access roles for that resource, and ensure that there is a
route from the user to at least one access role where:
5. Verify that the user has a value for oTGroupOfResources for the resource in
question.
User jsmith@otag does not have access to resource <x>. Please contact
your administrator.
Could mean that the user has not yet been added to the access role. Check that
the user is in Content Server, and was created or pushed by OTDS. You also
need to ensure that user jsmith@otag is in the Content Server access role in
OTDS.
When you choose to consolidate your resource, you have the option of selecting
Delete users/groups that are not consolidated. The consolidation must first
succeed without errors in order for OTDS to begin deleting unknown users
and/or groups. You can check for consolidation errors in “otds.log” on page 375
and “directory-provenance.log” on page 376.
After you have set up a resource in OTDS, and if that resource is physically
located on a different system than OTDS, you need to add the URL that accesses
that resource to the trusted sites in OTDS. For more information, see “Trusted
Sites“ on page 329.
In general, you can use the Java Formatter syntax in addition to specific options
available in OTDS. For more information, see “OTDS resource Format options”
on page 189 and “Support for javascript and multi-valued javascript in the
Format column” on page 190. For more information, see the reference to the Java
Formatter document in “References to external websites” on page 384.
Important
Do not set SPN against multiple objects because this causes instability and
intermittent authentication faults.
For more information, see Authentication Service Principal Name on page 296.
Single sign on from desktop does not work with Firefox on Windows
This occurs because Firefox permits negotiated authentication only with named
servers.
1. Launch Firefox.
When your browser gets redirected to the ECM Suite sign in page, it displays a
login window from Internet Explorer.
This occurs because the Directory Services server may not be deployed on a site
trusted by your Internet Explorer, or Integrated Windows Authentication may
not be enabled on your Internet Explorer.
To resolve this issue, add your Directory Services server as a trusted site using
Tools > Internet Options > Security > Local Intranet > Sites > Advanced.
Alternately, make sure Integrated Windows Authentication is enabled using
Tools > Internet Options > Advanced > Security > Enable Integrated Windows
Authentication. This requires a restart.
Tip: This issue could apply to all recent versions of Windows (NT, 2000,
XP, Vista, and Win7). When in doubt, check to see what Internet Explorer
shows at the bottom status bar for the zone it has put the site in. If it is not
the Local Intranet then this may resolve your single sign on issue.
5. Click Sites.
7. Add the fully qualified name of the server in the format https://<server>
8. Click OK to close all the windows.
• network.automatic-ntlm-auth.trusted-uris
• network.negotiate-auth.delegation-uris
• network.negotiate-auth.trusted-uris
• /otds-usergroup*
• /ot-auth*
• /ot-authws*
• /otds-v2*
• /otds-system-configuration*
• /ot-universaladmin*
• /ot-trigger*
• /ot-transfer*
• /ot-reg*
These are web service URLs and, if they are blocked by an authentication
prompt, Content Server will not be able to reach Directory Services through web
service calls.
Important
The user running the search must have the proper rights to run an
unlimited search.
Your clock is not synchronized across the domain. The domain controller's clock
and your server's clock are more than ten minutes apart.
To resolve this issue, synchronize time throughout your entire network. For
more information, see the synchronize time reference in “References to external
websites” on page 384.
You can check for consolidation messages in “otds.log” on page 375 and
“directory-provenance.log” on page 376.
If you started a user partition consolidation you can get the information using
your favorite LDAP browser. Point your browser to:
DN: cn=PartitionInfo,ou=opentext.net,ou=IdentityProviders,dc=
identity,dc=opentext,dc=net
In the consolidation message you will find oTConsolidationStatus attributes
that will tell you what is going on.
If the SAPlogon ticket authentication does not work, check the following:
2. If you see an “Unsatisfied Link error” message in the otds.log file, it may
be because the SAPSSO libraries cannot be found by the application server.
To enable tracing of the SAPSSO library, see the information about the
environment variables SAP_EXT_TRC=mytracefile.txt and SAP_EXT_TRL=
3 in the SAP documentation.
3. Check to see if there are any SAP return value numbers, then check the SAP
documentation for an explanation of the return codes.
4. Check to see whether the SAP user is mapped correctly to OTDS and to
Content Server. To check, see the directory-access.log file.
5. Check to see whether the users are assigned to Content Server.
If you have more than one user sharing the Login User Name Attributes system
attribute, you need to change the configuration of this system attribute to
remove those attributes that cause the conflict.
For example, if multiple accounts can have the same email address, and users do
not sign in with their email address, you can remove “mail” from the Login
User Names Attributes system attribute.
For more information, see Login User Name Attributes on page 310.
There are three OTDS system attributes that need to be set correctly in order for
the Global Help Server URLs to resolve properly. If you cannot open the
OpenText Global Help Server:
• Ensure that the help.config.HelpURL on page 306 system attribute's value is:
http://docsapi.opentext.com/mapperpi
Note: Another, related, issue you may experience has do with your
browser's cache. For example, if you upgrade OTDS from 16.0.2 to 16.0.3
and then open the online help, you might see the 16.0.2 online help
appearing. If this happens, you will need to clear your browser's cache and
then open the online help.
You have the opportunity to customize the emails that OTDS sends out, as
documented in “Customizing OTDS emails” on page 357.
• If you are using OTDS 10.5 SP1 Patch 9 or previous, and, after customizing
OTDS emails, you applied an OTDS patch or update, that update overwrote
any customizations to the ot_email_header.png file, the XSLT stylesheet
files, and the variables stylesheet.
You will need to implement your email customizations again.
• If you are using OTDS 16.0.1 or previous, and, after customizing OTDS
emails, you applied an OTDS patch or update, that update overwrote any
customizations to the ot_email_header.png file, the XSLT stylesheet files,
and the variables stylesheet.
You will need to implement your email customizations again.
• If you are using OTDS 10.5 SP1 Patch 10 and forward, or version 16.0.2 and
forward, your email customizations will remain in place during subsequent
patches and updates.
If you do not want a certain language to be available in OTDS, you can delete
the corresponding login_<langcode>.properties translation file in the
<OTDS_install_dir>/otdsws/WEB-INF/classes directory.
Important
You must not delete the English language file, login.properties.
When migrating data from a previous version of OTDS to a later version, you
need to set up a number of files from your previous version of OTDS.
Information on these files can be found in “Importing data from previous
versions of Directory Services” on page 19.
The “bindPassword” is the account password in OpenDJ and it is set at the time
of OTDS installation to the password of [email protected]. However, this is
a distinct account with its own password.
The “bindPassword” can be reset using the otdstenant -resetpassword
command. This command is documented in the OpenText Directory Services -
Tenant Management Guide (OTDS-CCS).