Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Created by Guest
Created on Nov 19, 2015

Enhance LDAP Support in hmc

We want to be able to manage hmc users in specific groups and not as single users.
Clarification based on the fact that:
1) Users belonging to a group has the role and auhorization define for this group.
2) if for example, user "xxxx" belongs to Group "ADMIN", user "xxxx" should have the right given to the group "ADMIN".
3) Belonging to one of the groups, define the needed user role (Admin,operator,...).
4) it should work similar to RACF
5) we do not want to add extra attribute in the AD schema too.
.
Extract from mail's exchanges:
The HMC does not know which AD groups a user is in, or which one of a user's groups (possibly many) should control the user's authorities.
No, it is not possible with the current LDAP support in the HMC to do exactly what the customer wants. The approach I described is the best way the HMC has to give many users the same authority based on information in an LDAP directory. I know that it does require an extra step on the LDAP side; the customer must define a new attribute in the AD schema and put the appropriate template name in that attribute for each user.
--> Allowing the customer to do it, the way they have suggested would require new functionality in the HMC.
.
Workaround proposed to the system engineer and not agreed:
'Depending on what support AD provides and how the schema is defined, it is possible to do what the customer wants, but it will require some work in their AD schema, as well as some setup on the HMC. The basic approach is as follows:
1. Create an LDAP Server Definitionon the HMC
o It must point to the AD server
o Depending on the specific attributes in the AD schema, set the Distinguished Name (DN) Pattern, or the Search DN Tree and Search Filter, so it will locate a user's AD account using the HMC userid (or associated AD account name)
§ The HMC userid (or associated AD account name) is substituted for "{0}" in the DN Pattern or the Search Filter
2. For each AD group, create a User Template on the HMC
o It must point to the LDAP Server Definition created above
o Give it the desired task/object permissions
o For example, create templates named "Oper", "Admin" and "System Programmer"
3. Create a User Pattern
o The pattern must match all of the HMC userids for the users in all of the AD groups to be included in this plan
§ That might require a glob-likepattern of *
o It must point to some User Template with very little or no privileges; this will be the default
o The additional LDAP-based lookup and validation settings must be:
§ The LDAP Server Definition created above
§ The name of an attribute in the AD schema for a user object.
§ The value of this attribute will be the name of one of the User Templates created above.
§ This is used to name the User Template that contains the appropriate permissions for the users
4. Define an attribute in the AD schema for a user object.
o A good name for this attribute is something like: HMCUserTemplateName
o For each AD user, set this attribute to the name of the User Template that contains the appropriate permissions for that user
§ For example, "Oper", "Admin", or "System Programmer"
During HMC logon, the processing goes something like this:
1. The user enters his HMC userid (or associated AD user account name) and password on the HMC logon panel
2. The HMC matches that userid/name against all specific HMC userids; no match
3. The HMC matches that userid/name against the User Patterns; it matches the User Pattern created above
4. The HMC contacts the AD server (identified by the LDAP Server Definition identified in the User Pattern)
5. The AD server uses the DN/Subtree/Filter in the LDAP Server Definition to find the AD account.
6. The AD server validates the password; if successful, it returns the value of the HMCUserTemplateName attribute for that AD user (for example "Oper").
7. The HMC uses the HMCUserTemplateName value to get the User Template to use for the HMC user permissions (For example, the "Oper" User Template created above).
8. HMC logon completes; the user has the permissions specified in the appropriate User Template (the "Oper" User Template, in this example).

Idea priority High
  • Guest
    Reply
    |
    Jun 23, 2021

    Delivered with BCPii V2 released in z15 GA 1.5

  • Guest
    Reply
    |
    Mar 16, 2016

    Thanks for submitting this request. We will take it into consideration for the future.

  • Guest
    Reply
    |
    Nov 25, 2015

    Creating a new RFE based on Community RFE #80573 in product z Systems Hardware.