DescriptionName
WhetherCisco UCS also searches LDAP groups when authenticating
andassigning user roles and locales to remote users. This can be one
ofthe following:
Disable—CiscoUCS does not accessany LDAP groups.
Enable—CiscoUCS searches all LDAP groups mapped in this
CiscoUCS domain. If theremote user isfound, CiscoUCS
assignsthe user roles and locales defined for thatLDAP group
inthe associatedLDAP group map.
Roleand locale assignment is cumulative. If a user is
includedin multiple groups, or has a role or locale specified
inthe LDAP attribute,Cisco UCS assigns that user all the
rolesand locales mapped to any of those groups or attributes.
Note
GroupAuthorization field
WhetherCisco UCS searches both the mapped groups and their parent
groups.This can be one of the following:
NonRecursive—Cisco UCS searches only the groups mapped
inthis Cisco UCS domain. If none of the groups containing the
userexplicitly set the user's authorization properties, Cisco UCS
usesthe defaultsettings.
Recursive—CiscoUCS searches each mapped group andall
itsparent groupsfor theuser's authorizationproperties. These
propertiesare cumulative,so for eachgroup CiscoUCS finds
withexplicit authorization property settings,it applies those
settingsto the current user. Otherwise it uses the default settings.
GroupRecursion field
Theattribute Cisco UCS uses to determine group membership in the
LDAPdatabase.
Thesupported string length is 63 characters.The default string is
memberOf.
TargetAttribute field
b) Click Finish.
What to Do Next
Forimplementations involving a single LDAP database, select LDAP as the authentication service.
Forimplementations involving multiple LDAP databases, configure an LDAP provider group.
Cisco UCS Manager GUI Configuration Guide, Release 2.0
138 OL-25712-04
Configuring LDAP Providers