IBM Information Server USER AND GROUP ROLE ASSIGNMENTS ARE NOT PRESERVED AFTER CONVERTING FROM STAND-ALONE LDAP TO FEDERATED USER REGISTRY
Error description
When converting Information Server from a stand-alone LDAP configuration to a Federated user registry that includes the same LDAP registry, the Information Server security roles previously assigned to LDAP users and groups are no longer seen by Information Server for the same users and groups. Likewise, any Business Glossary asset permissions or Steward assignments no longer work. In addition, errors occur in the Information Server Web Console when opening Users or Groups. Additional problems occur if a user or group previously assigned a role no longer exists in the configured LDAP registry.
Local fix
Some of the issues are caused by a known WAS issue and require a WAS iFix (PM89827) to be installed. This iFix also requires a configuration change to WAS to enable it. However, this only addresses the issues caused when a user or group no longer exists in the external LDAP registry and only fixes the issue when attributes are not mapped. So installation of this iFix alone does little to address the complete list of problems and thus should wait to be installed along with the complete solution to this APAR.
Problem summary
Information Server security roles assigned to LDAP users and groups, as well as Steward and access permissions configured in Business Glossary, when the system is configured for a stand-alone LDAP user registry, are saved in the Information Server local repository and assigned to the LDAP full distinguished name (DN) of the user or group. Once the user registry is converted to Federated and this LDAP registry is configured as one of the Federated repositories, by default queries to the Federated registry expect short (RDN) user and group names and return the names as short (RDN) names. For the existing assigned roles in the Information Server local repository to be properly associated with the LDAP entities, the names must match with what the Federated registry returns. To continue using the existing role assignments, the Federated configuration must be changed to expect and return long (DN) names. This is done by changing the Federated User repository attribute mapping configuration in the WebSphere Integrated Solutions Console (WAS Admin Console). 1) login to the WAS Admin Console with valid WAS administrator credentials 2) modify your configured Federated repository settings by Selecting Security > Global security > select Federated repositories in the Available realm definitions under User account repository > click Configure... 3) click "User repository attribute mapping" under Additional Properties 4) select groupSecurityName and userSecurityName and click Edit 5) for groupSecurityName, set Property for Input and Property for Output values to uniqueName 6) for userSecurityName, set Property for Input value to principalName and set Property for Output value to uniqueName 7) click Apply and then Save directly to the master configuration 8) assuming you have already completed the rest of the Federated configuration restart WebSphere for the changes to take affect.