Configuring LDAP Authentication For OBIEE 11g
Configuring LDAP Authentication For OBIEE 11g
This blog shows an example of how to configure LDAP authentication for OBIEE 11g (11.1.1.6) using
Active Directory. Configuring LDAP authenticaton is a complex process, so below simply shows the steps
I went through - additional steps may be required, espeically if using an LDAP other than AD.
Rather then modify the existing default 'myrealm' security realm in Weblogic, these instructions show the
setting up of a new realm - this enables the original realm to be reinstated easily should problems occur.
Hence why this is a somewhat lengthy posting.
Click on Security Realms in the Domain Structure panel on the left hand side
We do not want to alter the default ‘myrealm’ security realm as this is our back-out route should anything
go wrong – as we are dealing with security a mistake could prevent the weblogic user from being able to
login, so we’ll retain the ability to revert back to the default realm.
Before we can make changes we have to lock the session. Click the Lock & Edit button in the top left
corner:
In the Realms list, the New button is now available, so click it.
In the Create a New Realm screen enter a name for the Realm, leave the ‘Ignore Deploy Credential
Mapping’ check box un-ticked and click ok.
This may generate some errors because the new Realm isn’t setup properly. If you get these, click the
Cancel button and the Realm will still be created.
The first thing we need to do is setup the new Realm in exactly the same way as the default ‘myrealm’.
Unfortunately there isn’t a copy option.
Click on the new Realm name.
In the settings screen, click on the Providers tab then the Authentication sub-tab
Enter the name of DefaultAuthenticator (must match exact case and spelling) and select the type
DefaultAuthenticator from the drop down box. Click Ok.
You can now see this new provider. Click on the provider name to edit its settings.
In the common tab, change the Control Flag to REQUIRED. Click save.
In the Provider Specific tab, check the ‘Use Retrieved User Name As Principal’, leave the other check
boxes unchecked and set the final three options to 8, unlimited and 0 respectively. Click Save.
To return to the Providers list, click the ‘Providers’ link in the breadcrumb trail at the top of the screen:
This time enter the name DefaultIdentityAsserter (must match exact case and spelling) and select
DefaultIdentityAsserter from the drop down list. Click Ok.
Now click on DefaultIdentityAsserter.
In the common tab select the Authenticateduser option from the list of Active Types and click the icon
to move it to the chosen window. Click Save.
Now still under the Providers tab, click the Password Validation sub-tab
Click New.
Enter the name of SystemPasswordValidator (must match exact case and spelling) and select the type
SystemPasswordValidator from the drop down box. Click Ok.
Now click the ‘providers’ list in the breadcrumb trail again. Then select the Authorization sub-tab:
Click New.
Enter the name of XACMLAuthorizer (must match exact case and spelling) and select the type
XACMLAuthorizer from the drop down box. Click Ok.
Click New.
Enter the name of DefaultAdjudicator (must match exact case and spelling) and select the
type DefaultAdjudicator from the drop down box. Click Ok.
Click New.
Enter the name of XACMLRoleMapper (must match exact case and spelling) and select the
type XACMLRoleMapper from the drop down box. Click Ok.
There are no configuration settings required for the Role Mapping Provider.
Now select the Credential Mapping sub-tab.
Click New.
Enter the name of DefaultCredentialMapper (must match exact case and spelling) and select the
type DefaultCredentialMapper from the drop down box. Click Ok.
There are no configuration settings required for the Credential Mapping Provider.
Now select the Certification Path sub-tab.
Click New.
Select WebLogicCertPathProvider from the drop down pick-list. Click Next.
In the Common tab, check the ‘Current Builder’ check box. Click Save.
We now need to restart the weblogic service. Logout of the console and perform a full shutdown and
restart of OBIEE and Weblogic.
Then log back into the Weblogic Console.
We now have a duplicate realm setup, but there are no users in it. Later on we’ll be setting up a third
provider to connect to the Active Directory server, but before then there are a few internal users required.
Click on the Security Realm link in the Domain Structure window again.
Click on myrealm.
Click on the Migration tab, then the Export sub-tab. Create a directory to store the realm export files, enter
it into the ‘Export Directory on Server:’ field and check the ‘Overwrite’ option .
Now click on the Security Realms link in the Domain Structure window again. This time click on the new
LDAP_Realm. Again go to the Migration tab, but this time select the Import sub-tab.
Enter the export directory path again and click Save. You should see the following messages:
We are now ready to create the Authentication Provider to connect to the Active Directory server.
In the Common tab, change the Control Flag to SUFFICIENT. Click Save.
In the provider Specific tab enter the following details, adjusting them to suite your environment.
Field Value
Host localhost
Port 389
Principal CN=Administrator,CN=Users,DC=obiee,DC=local,DC=com
Credential & Confirm Credential Enter the password for the Administrator user in Active
Directory.
SSLEnabled No
User Base DN CN=Users,DC=obiee,DC=local,DC=com
All Users Filter (|(memberOf=CN=Users,DC=obiee,DC=local,DC=com))
User From Name Filter (&(uid=%u)(objectclass=user))
User Search Scope subtree
User Name Attribute cn
User Object Class User
Use Retrieved User Name as No
Principal
Group Base DN CN=Users,DC=obiee,DC=local,DC=com
All Groups Filter (&(uid=*)
Group From Name Filter (&(cn=%g)(objectclass=group))
Group Search Scope subtree
Group Membership Searching unlimited
Max Group Membership Search 0
Level
Ignore Duplicate Membership No
Static Group Name Attribute cn
Static Group Object Class group
Static Member DN Attribute member
Static Group DNs from Member DN (&(member=%M)(objectclass=group))
Filter
Dynamic Group Name Attribute Leave blank
Dynamic Group Object Class Leave blank
Dynamic Member URL Attribute Leave blank
User Dynamic Group DN Attribute Leave blank
Connection Pool Size 6
Connect Timeout 0
Connection Retry Limit 1
Parallel Connect Delay 0
Results Time Limit 0
Keep Alive Enabled No
Follow Referrals Yes
Bind Anonymously On Referrals No
Propagate Cause For Login No
Exception
Cache Enabled yes
Cache Size 32
Cache TTL 60
GUID Attribute Objectguid
Note: If you don’t know the DN details for your users and groups, with Active directory you can discover
these using the dsquery command from a command prompt.
We now need to change the order so that the MSAD_Provider is first in the list. Click the Reorder button.
Check the MSAD_Provider option and click the icon to put it top. Then click Ok.
The new Security Realm is now setup, but before we activate it we need to check it is working correctly.
Click the Activate Changes button to save all recent changes, then logout of the console and perform a
full restart of Weblogic and OBIEE again.
Click on ‘Customize this table’. In the Filter window that opens up, enter the name of a user in the Criteria
The user you entered should now appear in the user list. If it does not then something is not right with the
new provider details.
Return to the Providers tab, click on the MSAD_Provider, then the Provider Specific sub-tab and recheck
all of the details, especially the User Base DN, Group Base DN and Principal & Credential fields. You will
then need to restart weblogic again and perform this test again before continuing.
If the configuration is correct you will see the user and note that the Provider of the user MSAD_Provider.
You can use wild cards to see users, e.g. entering the Criteria of p* returns:
If you click on one of the users you see which groups they belong to, also picked up from the LDAP:
Similarly you can view the Groups being picked up from the LDAP:
If all is correct we now need to configure the domain to make this new realm the default one for Weblogic.
First click the Lock & Edit button. Then In the Domain Structure panel, click on the bifoundation_domain
link.
Go to the Security tab and change the Default Realm option to Realm. Then click Save.
Click the Activate Changes button again, then logout of the console and perform a full restart of Weblogic
and OBIEE again.
Now that Weblogic is configured to allow authentication to Active Directory, OBIEE itself needs to be
instructed to tell weblogic to use it.
Expand the Weblogic Domain, the right click on bifoundation_domain, select Security -> Security Provider
Configuration
If the Identity Security Store section is compressed, click the + icon to expand it:
Note, if the LDAP does not have a GUID (Global User ID field), then OBIEE need to be altered to use a
different field as the unique identifier. This is done by adding a fourth field into this screen:
The value is the entire string 'GUID=cn', where cn is the alternative attribute in the LDAP - it can be any
field, not just cn, however usually cn is the user-name and hence will be unique if no other specifically
unique field exists.
From the Business Intelligence Instance menu select Security -> Application Roles
Normally at this point you would assign the Active Directory groups to the BI Roles in this screen. For now
however we are simply going to allow any authenticated user to login as an Administrator.
Back in the Edit Application Role screen click OK to save the change.
Finally perform a full restart of Weblogic and OBIEE again.
You should be able to login to OBIEE with an LDAP user-id and password.