To use IBM Cognos product documentation, you must enable JavaScript in your browser.

Configuring IBM Cognos 8 Components to Use LDAP

You can configure IBM Cognos 8 components to use an LDAP namespace as the authentication provider. You can use an LDAP namespace for users that are stored in an LDAP user directory, Active Directory Server, IBM Directory Server, Novell Directory Server, or Sun Java System Directory Server.

You can also use LDAP authentication with DB2 and Essbase OLAP data sources by specifying the LDAP namespace when you set up the data source connection. For more information, see the Administration and Security Guide.

You also have the option of making custom user properties from the LDAP namespace available to IBM Cognos 8 components.

To bind a user to the LDAP server, the LDAP authentication provider must construct the distinguished name (DN). If the Use external identity property is set to True, it uses the External identity mapping property to try to resolve the user's DN. If it cannot find the environment variable or the DN in the LDAP server, it attempts to use the User lookup property to construct the DN.

If users are stored hierarchically within the directory server, you can configure the User lookup and External identity mapping properties to use search filters. When the LDAP authentication provider performs these searches, it uses the filters you specify for the User lookup and External identity mapping properties. It also binds to the directory server using the value you specify for the Bind user DN and password property or using anonymous if no value is specified.

When an LDAP namespace has been configured to use the External identity mapping property for authentication, the LDAP provider binds to the directory server using the Bind user DN and password or using anonymous if no value is specified. All users who log on to IBM Cognos 8 using external identity mapping see the same users, groups, and folders as the Bind user.

If you do not use external identity mapping, you can specify whether to use bind credentials to search the LDAP directory server by configuring the Use bind credentials for search property. When the property is enabled, searches are performed using the bind user credentials or using anonymous if no value is specified. When the property is disabled, which is the default setting, searches are performed using the credentials of the logged-on user. The benefit of using bind credentials is that instead of changing administrative rights for multiple users, you can change the administrative rights for the bind user only.

Important: If you use a DN syntax, such as uid=${userID}, ou=mycompany.com, for the properties User lookup, External identity mapping, or Bind user DN and password, you must escape all special characters that are used in the DN. If you use a search syntax, such as (uid=${userID}), for the properties User lookup or External identity mapping, you must not escape special characters that are used in the DN.

To use an LDAP namespace and set up single signon, do the following:

      

Configure IBM Cognos 8 components to use an LDAP namespace

      

Make custom user properties available to IBM Cognos 8 components, if required

      

Enable secure communication to the LDAP server, if required

      

Enable single signon between LDAP and IBM Cognos 8 components, if required

Configure an LDAP Namespace 

You can configure IBM Cognos 8 components to use an LDAP namespace when the users are stored in an LDAP user directory. The LDAP user directory may be accessed from within another server environment, such as Active Directory Server or eTrust SiteMinder.

If you are configuring an LDAP namespace for a directory server other than LDAP, see the appropriate section:

You can also use LDAP authentication with DB2 and Essbase OLAP data sources by specifying the LDAP namespace when you set up the data source connection. For more information, see the Administration and Security Guide.

Steps
  1. On every computer where you installed Content Manager, open IBM Cognos Configuration.

  2. In the Explorer window, under Security, right-click Authentication, and then click New resource, Namespace.

  3. In the Name box, type a name for your authentication namespace.

  4. In the Type list, click the appropriate namespace and then click OK.

    The new authentication provider resource appears in the Explorer window, under the Authentication component.

  5. In the Properties window, for the Namespace ID property, specify a unique identifier for the namespace.

  6. Specify the values for all other required properties to ensure that IBM Cognos 8 components can locate and use your existing authentication provider.

  7. If you want the LDAP authentication provider to bind to the directory server using a specific Bind user DN and password when performing searches, then specify these values.

    If no values are specified, the LDAP authentication provider binds as anonymous.

    If external identity mapping is enabled, Bind user DN and password are used for all LDAP access. If external identity mapping is not enabled, Bind user DN and password are used only when a search filter is specified for the User lookup property. In that case, when the user DN is established, subsequent requests to the LDAP server are executed under the authentication context of the end user.

  8. If you do not use external identity mapping, use bind credentials for searching the LDAP directory server by doing the following:

    If you do not specify a user ID and password, and anonymous access is enabled, the search is done using anonymous.

  9. Check the mapping settings for required objects and attributes.

    Depending on the LDAP configuration, you may have to change some default values to ensure successful communication between IBM Cognos 8 components and the LDAP server.

    LDAP attributes that are mapped to the Name property in Folder mappings, Group mappings, and Account mappings must be accessible to all authenticated users. In addition, the Name property must not be blank.

  10. From the File menu, click Save.

  11. Test the connection to a new namespace. In the Explorer window, under Authentication, right-click the new authentication resource and click Test.

IBM Cognos 8 loads, initializes, and configures the provider libraries for the namespace.

Configure an LDAP Namespace for Active Directory Server  

If you configure a new LDAP namespace for use with an Active Directory Server, you must modify the necessary settings and change the values for all properties of the Active Directory objects.

Steps
  1. On every computer where you installed Content Manager, open IBM Cognos Configuration.

  2. In the Explorer window, under Security, right-click Authentication, and then click New resource, Namespace.

  3. In the Name box, type a name for your authentication namespace.

  4. In the Type list, click the appropriate namespace and then click OK.

    The new authentication provider resource appears in the Explorer window, under the Authentication component.

  5. In the Properties window, for the NamespaceID property, specify a unique identifier for the namespace.

    Tip: Do not use colons (:) in the Namespace ID property.

  6. Specify the values for all other required properties to ensure that IBM Cognos 8 components can locate and use your existing authentication provider.

    The following settings are examples:

  7. If you want the LDAP authentication provider to bind to the directory server using a specific Bind user DN and password when performing searches, then specify these values.

    If no values are specified, the LDAP authentication provider binds as anonymous.

  8. If you do not use external identity mapping, use bind credentials for searching the LDAP directory server by doing the following:

  9. To configure the LDAP advanced mapping properties for use with the Active Directory Server objects, use the values specified in the following table.

    LDAP attributes that are mapped to the Name property in Folder mappings, Group mappings, and Account mappings must be accessible to all authenticated users. In addition, the Name property must not be blank.

    Mappings

    LDAP property

    LDAP value

    Folder

    Object class

    organizationalUnit,organization,container

     

    Description

    description

     

    Name

    ou,o,cn

    Group

    Object class

    group

     

    Description

    description

     

    Member

    member

     

    Name

    cn

    Account

    Object class

    user

     

    Business phone

    telephonenumber

     

    Content locale

    (leave blank)

     

    Description

    description

     

    Email

    mail

     

    Fax/Phone

    facsimiletelephonenumber

     

    Given name

    givenname

     

    Home phone

    homephone

     

    Mobile phone

    mobile

     

    Name

    displayName

     

    Pager phone

    pager

     

    Password

    unicodePwd

     

    Postal address

    postaladdress

     

    Product locale

    (leave blank)

     

    Surname

    sn

     

    Username

    sAMAccountName

    These mapping properties represent changes based on a default Active Directory Server installation. If you have modified the schema, you may have to make additional mapping changes.

  10. From the File menu, click Save.

  11. Test the connection to a new namespace. In the Explorer window, under Authentication, right-click the new authentication resource and click Test.

IBM Cognos 8 loads, initializes, and configures the provider libraries for the namespace.

Configure an LDAP Namespace for IBM Directory Server  

If you configure a new LDAP namespace for use with an IBM Directory Server, you must modify the necessary settings and change the values for all properties of the IBM Directory objects.

Steps
  1. In each location where you installed Content Manager, open Cognos Configuration.

  2. In the Explorer window, under Security, right-click Authentication, and then click New resource, Namespace.

  3. In the Name box, type a name for your authentication namespace.

  4. In the Type list, click LDAP, and then click OK.

    The new authentication namespace resource appears in the Explorer window, under the Authentication component.

  5. In the Properties window, for the NamespaceID property, specify a unique identifier for the namespace.

    Tip: Do not use colons (:) in the Namespace ID property.

  6. Specify the values for all other required properties to ensure that IBM Cognos 8 can locate and use your existing authentication namespace.

  7. If you want the LDAP authentication provider to bind to the directory server using a specific Bind user DN and password when performing searches, then specify these values.

    If no values are specified, the LDAP authentication namespace binds as anonymous.

  8. If you do not use external identity mapping, use bind credentials for searching the LDAP directory server by doing the following:

  9. To configure the LDAP advanced mapping properties for use with IBM Directory Server objects, use the values specified in the following table.

    LDAP attributes that are mapped to the Name property in Folder mappings, Group mappings, and Account mappings must be accessible to all authenticated users. In addition, the Name property must not be blank.

    Mappings

    LDAP property

    LDAP value

    Folder

    Object class

    organizationalunit,organization,container

     

    Description

    description

     

    Name

    ou,o,cn

    Group

    Object class

    groupofnames

     

    Description

    description

     

    Member

    member

     

    Name

    cn

    Account

    Object class

    inetorgperson

     

    Business phone

    telephonenumber

     

    Content locale

    (leave blank)

     

    Description

    description

     

    Email

    mail

     

    Fax/Phone

    facsimiletelephonenumber

     

    Given name

    givenname

     

    Home phone

    homephone

     

    Mobile phone

    mobile

     

    Name

    cn

     

    Pager phone

    pager

     

    Password

    userPassword

     

    Postal address

    postaladdress

     

    Product locale

    (leave blank)

     

    Surname

    sn

     

    Username

    uid

    These mapping properties represent changes based on a default IBM Directory Server installation. If you have modified the schema, you may have to make additional mapping changes.

  10. From the File menu, click Save.

Configure an LDAP Namespace for Novell Directory Server

If you configure a new LDAP namespace for use with a Novell Directory Server, you must modify the necessary settings and change the values for all properties of the Novell Directory objects.

Steps
  1. On every computer where you installed Content Manager, open IBM Cognos Configuration.

  2. In the Explorer window, under Security, right-click Authentication, and then click New resource, Namespace.

  3. In the Name box, type a name for your authentication namespace.

  4. In the Type list, click LDAP and then click OK.

    The new authentication namespace resource appears in the Explorer window, under the Authentication component.

  5. In the Properties window, for the NamespaceID property, specify a unique identifier for the namespace.

    Tip: Do not use colons (:) in the Namespace ID property.

  6. Specify the values for all other required properties to ensure that IBM Cognos 8 can locate and use your existing authentication namespace.

  7. If you want the LDAP authentication provider to bind to the directory server using a specific Bind user DN and password when performing searches, then specify these values.

    If no values are specified, the LDAP authentication namespace binds as anonymous.

  8. If you do not use external identity mapping, use bind credentials for searching the LDAP directory server by doing the following:

  9. To configure the LDAP advanced mapping properties for use with Novell Directory Server objects, use the values specified in the following table.

    LDAP attributes that are mapped to the Name property in Folder mappings, Group mappings, and Account mappings must be accessible to all authenticated users. In addition, the Name property must not be blank.

    For users to successfully log in to IBM Cognos Connection, they must have permission to read the ou and o attributes.

    Mappings

    LDAP property

    LDAP value

    Folder

    Object class

    organizationalunit,organization,container

     

    Description

    description

     

    Name

    ou,o,cn

    Group

    Object class

    groupofnames

     

    Description

    description

     

    Member

    member

     

    Name

    cn

    Account

    Object class

    inetOrgPerson

     

    Business phone

    telephonenumber

     

    Content locale

    Language

     

    Description

    description

     

    Email

    mail

     

    Fax/Phone

    facsimiletelephonenumber

     

    Given name

    givenname

     

    Home phone

    homephone

     

    Mobile phone

    mobile

     

    Name

    cn

     

    Pager phone

    pager

     

    Password

    (leave blank)

     

    Postal address

    postaladdress

     

    Product locale

    Language

     

    Surname

    sn

     

    Username

    uid

    These mapping properties represent changes based on a default Novell Directory Server installation. If you have modified the schema, you may have to make additional mapping changes.

  10. From the File menu, click Save.

Configure an LDAP Namespace for Sun Java System Directory Server

If you configure a new LDAP namespace for use with Sun Java System Directory Server, you must modify the necessary settings and change the values for all properties of the Sun Java System Directory objects.

Steps
  1. On every computer where you installed Content Manager, open IBM Cognos Configuration.

  2. In the Explorer window, under Security, right-click Authentication, and then click New resource, Namespace.

  3. In the Name box, type a name for your authentication namespace.

  4. In the Type list, click LDAP and then click OK.

    The new authentication namespace resource appears in the Explorer window, under the Authentication component.

  5. In the Properties window, for the NamespaceID property, specify a unique identifier for the namespace.

    Tip: Do not use colons (:) in the Namespace ID property.

  6. Specify the values for all other required properties to ensure that IBM Cognos 8 can locate and use your existing authentication namespace.

    The following settings are examples:

  7. If you want the LDAP authentication provider to bind to the directory server using a specific Bind user DN and password when performing searches, then specify these values.

    If no values are specified, the LDAP authentication namespace binds as anonymous.

  8. If you do not use external identity mapping, use bind credentials for searching the LDAP directory server by doing the following:

  9. To configure the LDAP advanced mapping properties for use with Sun Java System Directory Server objects, use the values specified in the following table.

    LDAP attributes that are mapped to the Name property in Folder mappings, Group mappings, and Account mappings must be accessible to all authenticated users. In addition, the Name property must not be blank.

    Mappings

    LDAP property

    LDAP value

    Folder

    Object class

    organizationalUnit,organization

     

    Description

    description

     

    Name

    ou,o

    Group

    Object class

    groupofuniquenames

     

    Description

    description

     

    Member

    uniquemember

     

    Name

    cn

    Account

    Object class

    inetorgperson

     

    Business phone

    telephonenumber

     

    Content locale

    preferredlanguage

     

    Description

    description

     

    Email

    mail

     

    Fax/Phone

    facsimiletelephonenumber

     

    Given name

    givenname

     

    Home phone

    homephone

     

    Mobile phone

    mobile

     

    Name

    cn

     

    Pager phone

    pager

     

    Password

    userPassword

     

    Postal address

    postaladdress

     

    Product locale

    preferredlanguage

     

    Surname

    sn

     

    Username

    uid

    These mapping properties represent changes based on a default Sun Java System Directory Server installation. If you have modified the schema, you may have to make additional mapping changes.

  10. From the File menu, click Save.

Make Custom User Properties for LDAP Available to IBM Cognos 8 Components

You can use arbitrary user attributes from your LDAP authentication provider in IBM Cognos 8 components. To configure this, you must add these attributes as custom properties for the LDAP namespace. The custom properties are available as session parameters through Framework Manager. For more information about session parameters, see the Framework Manager User Guide.

You can also use the custom properties inside command blocks to configure Oracle sessions and connections. You can use the command blocks with Oracle lightweight connections and virtual private databases. For more information, see the Administration and Security Guide.

Steps
  1. In each location where you installed Content Manager, open Cognos Configuration.

  2. In the Explorer window, under Security, Authentication, click the LDAP namespace.

  3. In the Properties window, click in the Value column for Custom properties, and click the edit button.

  4. In the Value - Custom properties window, click Add.

  5. Click the Name column, and type the name you want IBM Cognos 8 components to use for the session parameter.

  6. Click the Value column, and type the name of the account parameter in your LDAP authentication provider.

  7. Repeat the preceding two bulleted steps for each custom parameter.

  8. Click OK.

  9. From the File menu, click Save.

Enable Secure Communication to the LDAP Server

Secure LDAP protocol (LDAPS) encrypts the communication between the Access Manager component of Content Manager and the directory server. LDAPS prevents sensitive information in the directory server and the LDAP credentials from being sent as clear text.

To enable LDAPS, install a server certificate that is signed by a certificate authority in the directory server. Next, create a certificate database to contain the certificates. Finally, configure the directory server and the IBM Cognos 8 LDAP namespace to use LDAPS.

The server certificate must be a copy of either

The certificates must be Base64 encoded in ASCII (PEM) format. All certificates except the trusted root certificate must not be self-signed.

IBM Cognos 8 works with both the cert8.db and cert7.db versions of the client certificate database. You must use the certutil tool from Netscape OpenSource toolkit NSS_3_11_4_RTM to create the certificate database. IBM Cognos 8 does not accept other versions of cert8.db files, including those from the certutil tool that is provided with Microsoft Active Directory. The appropriate certutil tool is available from ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_11_4_RTM.

You must also use the NSPR library, which is available from ftp://ftp.mozilla.org/pub/mozilla.org/nspr/releases/v4.6.7.

Steps
  1. Create a directory for the certificate database.

  2. Create the certificate database by typing

    certutil -N -d certificate_directory

    where certificate_directory is the directory that you created in step 1.

    This command creates a cert8.db file and a key3.db file in the new directory.

  3. Add the certificate authority (CA) certificate or the directory server certificate to the certificate database by typing the appropriate command for the type of certificate:

    where certificate_name is an alias that you assign, such as the CA name or host name; and server_certificate is the prefix of the directory server certificate file.

  4. Copy the certificate database directory to the c8_location/configuration directory on every computer where Content Manager is installed.

  5. Configure the directory server to use LDAPS and restart the directory server.

    For more information, see the documentation for the directory server.

  6. In each Content Manager location where you configured the LDAP namespace to use the directory server, start Cognos Configuration.

  7. In the Explorer window, under Security, Authentication, click the LDAP namespace.

  8. In the Properties window, for the Host and port property, change the port to the secure LDAPS port.

    For the SSL certificate database property, specify the path to the cert7.db file.

  9. In the Explorer window, right-click the LDAP namespace and click Test.

    If the test fails, revise the properties, ensuring that the correct certificate is used.

  10. From the File menu, click Save.

  11. From the Actions menu, click Restart.

  12. Repeat steps 6 to 11 on every other computer where Content Manager is installed.

Enabling Single Signon Between LDAP and IBM Cognos 8 Components 

You achieve single signon to IBM Cognos 8 components by configuring the External Identity mapping property.

The External Identity mapping can refer to a CGI environment variable or an HTTP header variable. In the case of an application server gateway or dispatcher entry pointing to IBM Cognos 8 components, the External Identity mapping can refer to the userPrincipalName session variable. The resolved value of the External Identity mapping property at runtime must be a valid user DN.

When an LDAP namespace is configured to use the External Identity mapping property for authentication, the LDAP provider binds to the directory server using the Bind user DN and password or using anonymous if no value is specified. All users who log on to IBM Cognos 8 using external identity mapping see the same users, groups, and folders as the Bind user.

If you want IBM Cognos 8 components to work with applications that use Java or application server security, you can configure the External identity mapping property to obtain the user ID from the Java user principal. Include the token ${environment("USER_PRINCIPAL")} in the value for the property. For more information, see the online help for IBM Cognos Configuration.

You can apply limited expression editing to the External Identity mapping property using the replace operation.

Replace Operation

The replace operation returns a copy of the string with all occurrences of the old substring replaced by the new substring.

The following rules apply:

Syntax

${replace(str , old , new)}

Parameter

Description

str

The string to search.

old

The substring to be replaced by the new substring.

new

The substring that replaces the old substring.

Examples

${replace(${environment("REMOTE_USER")},"NAMERICA\\",)}

${replace(${environment("REMOTE_USER")},"NAMERICA\\","")}