In this process we will start WAS and enable security
D.1.Start the DMGR and nodeagent
Start the DMGR by running: /opt/IBM/WebSphere/AppServer/profiles/Dmgr01/bin/startManager.sh
Start the nodeagent by running /opt/IBM/WebSphere/AppServer/profiles/AppSrv01/bin/startNode.sh
D.2.Enable security with an LDAP Directory
Open a browser to the DMGR Integrated Solutions Console (http://cpdocs2.swg.usma.ibm.com:9060/ibm/console) Because security is enabled, you will be redirected to the ssl port to login - if necessary accept the certificate and login with the user created during the WebSphere Application Server install
Select Federated Repositories from the Available realm definitions field, and then click Configure.
Click Add Base entry to Realm
and then, on the Repository reference page, click Add Repository - LDAP repository
On the New page, type a repository identifier, such as myFavoriteRepository (I used icldap AD into the Repository identifier field.
Specify the LDAP directory that you are using in the Directory type field.
Type the host name of the primary LDAP directory server in the Primary host name field. The host name is either an IP address or a domain name service (DNS) name.
If your directory does not allow LDAP attributes to be searched anonymously, provide values for the Bind distinguished name and Bind password fields.
Specify the login attribute or attributes that you want to use for authentication in the Login properties field. Separate multiple attributes with a semicolon. For example: uid;mail.
Click Apply
and then Save
Set the base entry fields, and click OK
NOTE: If this was Domino LDAP, set the first entry to root, and leave the second blank. 'root' is a special setting for WebSphere that tells it not to use a base. This will allow domino customer to find the user in the primary directory and all secondary directories, as well as all flat groups.
All other ldap directories, the entries to the base of your directory. My ldap directory is IBM Directory Server, so I set the base to dc=ibm,dc=com
and then Save
In the Repository Identifier column, click the link for the repository or repositories that you just added.
Make sure Group and Person Account are set to group and user.
If this was Domino, they would be set to DominoGroup or DominoPerson
IBM Directory server is typically groupOfUniqueNames and inetOrgPerson
Active Directory is group and user
If you are using AD, member with object class group is the typical config.
If you are using Domino, member with object class dominoGroup or groupOfNames is fine
If you are using IDS, make sure to include uniquemember with object class groupOfUniqueNames
In the Search by field, enter a user name that you know to be in the LDAP directory and click Search. If the search succeeds the user exists in your ldap directory.
Click on the user, then click the Groups tab, you should see a list of groups the user belongs to
Once the DMGR is finding users correctly from LDAP, restart the nodeagent to pick up the changes by running