Both of the options in the previous post will work.
Boring explanation best read by only those who need to know or are
stubbornly curious....
To create an EIM domain on a system, you have to use the LDAP admin userID
and password or use a profile with qsecofr like privileges. You do not
need to use the Admin ID and password to JOIN an existing EIM domain. But
the wizard only has two options: 1) Create AND join a new domain; or 2)
Join an existing domain.
When you run the EIM wizard and choose to create a new and join EIM domain
on a system that has never been configured to host an EIM domain before,
you get asked for credentials twice. The first time is because the wizard
needs to make changes to the LDAP server on the system you are configuring
before it can create the new domain. These credentials are used by wizard
itself to do wizard stuff. The second time you are asked for credentials
is because the wizard, in addition to creating an EIM domain, also
configures the system to JOIN the new domain. Joining an EIM domain means
that a system is configured to use that domain whenever it needs to do
identity mapping. In order to use an EIM domain, the system needs to
authenticate to the EIM domain (in reality you are authenticating to the
LDAP server). These credentials are not used by the wizard -- they are
stored in the system's EIM configuration. These credentials do not have
to -- in fact, really shouldn't -- be the LDAP admin credentials. They
can be any of a couple of different types of credentials you want,
including a regular old LDAP userID (which you have to create), or i5/OS
user profile credentials, or Kerberos credetials (e.g. Windows domain
userIDs and passwords). If you use credentials other than the LDAP admin
or QSECOFR user profile (which you also should not use either), then you
have to use the access control menu optin to grant that the userID you
choose at least "Identity Lookup Operations" privilege. You could also
give it privilege to the EIM registry definition that represents the
system being configured, or even EIM admin. These privileges allow these
credentials to only muck with the EIM tree in the LDAP server.
Why not use the LDAP admin credentials? Primarily because it violates the
security principle of least privilege (i.e. use least amount of authority
that is sufficient to perform the required operation).
Patrick Botz
Vice President, Security Consulting
Group8 Security, Inc
Business : 1-775-852-8887
Home/Office: 1-507-285-9048
Mobile : 1-507-250-5644
http://www.group8security.com
mailto:Pat.Botz@xxxxxxxxxxxxxxxxxx
___________________________
CONFIDENTIALITY NOTICE: This email message and any attachment to this email message contain information that may be privileged and confidential. This email and any attachments are intended solely for the use of the individual or entity named above (the recipient) and may not be forwarded to or shared with any third party. If you are not the intended recipient and have received this email in error, please notify us by return e-mail or by telephone at 775-852-8887 and delete this message. This notice is automatically appended to each email message leaving Group8 Security, Inc. Thank You.
ALopez@xxxxxxxxxx wrote:
I actually had to go into TCPIP servers into the Directory Server
option properties and from there I could change the password
I thought you wanted to blow the original configuration away and start
from scratch. If you use the wizard you should be able to change the
administrator password, and even if you can't, you can change the user
type to [iSeries] User Profile and password. You can then just run the
wizard as QSECOFR......
As an Amazon Associate we earn from qualifying purchases.