Configuring remote authentication service with Security Services using the CLI

You can use the command-line interface (CLI) to configure the system to allow users of Lenovo Storage V series management applications, such as Spectrum Control, to authenticate to the clustered system by using IBM Security Services.

To configure the system to allow users to authenticate to it by using Security Services (referred to as TIP in the CLI), follow these steps:

  1. Configure the system with the location of the remote authentication server.
    Issue the chauthservice command to change system settings, and issue the lssystem command to view system settings.
    Remember: You can use either an http or https connection to the server. If you use http, the user, password, and SSH key information is transmitted as clear text over the IP network.
  2. Configure user groups (with roles) on the system by matching those that are used by the authentication service.
    For each group of interest that is known to the authentication service, a Lenovo Storage V series user group must be created with the same name and with the remote setting enabled. If members of a group that is called sysadmins, for example, require the Lenovo Storage V series Administrator (Administrator) role, issue the following command:
    mkusergrp -name sysadmins -remote -role Administrator

    If none of the groups for a user match any of the Lenovo Storage V series user groups, the user cannot access the system.

  3. Configure users who do not require Secure Shell (SSH) access.
    Lenovo Storage V series users who use the remote authentication service and do not require SSH access should be deleted from the system.
    Remember: A superuser password authority cannot be deleted from the system, and a person that uses the superuser ID cannot use the remote authentication service.
  4. Configure users who require SSH access.
    All Lenovo Storage V series users who use the remote authentication service and require SSH access must have remote settings that are enabled and the same password and an SSH key set both on the system and on the authentication service.
  5. Configure the system time.
    The current time of both the Lenovo Storage V series clustered system and the system that is running the remote authentication service must match.
    Important: Use the same Network Time Protocol (NTP) server for both systems.