Background
So recently I was asked to configure a small lab that would be using Red Hat Cloudforms with users from LDAP (IDM/FreeIPA). I had to look up a number of documents and ended up referring back to some old notes. To that end, I decided it would make sense to document it here with screenshots for anyone that may find it useful.
Architecture
Server configurations
For this, you’ll need 1 LDAP server (Red Hat IDM in my case), preconfigured with at least one user and group. You’ll also need one Cloudforms virtual appliance capable of connecting to the IDM server.
So the demo lab I’ll be doing this in is actually my home lab (yes I run IDM at home for my wife and kids).
User Configurations
I will create a single LDAP group called “cloudforms-super-users”. It will contain my user “matt”. I’ll configure it to be a super admin on cloudforms.
The “svc-cloudforms-ldap-auth” user will be used by the Cloudforms application to bind to IDM. It’s a service account with minimal privileges to allow querying for users and groups.
Preparing Cloudforms
Connect cloudforms to the LDAP server
We log into cloudforms as the default admin/smartvm user.
We now go to configuration
We configure cloudforms to use the LDAP server.
On the Authentication tab, set the mode to LDAP, and the user type to UID (this is for IDM/FreeIPA). Then
Create the new cloudforms LDAP -> CF Role group
We create a new group in cloudforms that maps to a role and LDAP group.
On the left hand panel, click on Access Control -> Groups.
Click “configure “Add a new group.”
You’ll then be prompted to add a new group.
Here we give the name of our new group, select a cloudforms role to map, and a tenant.
We also supply an LDAP user that is in the appropriate LDAP groups already.
The username is the bind name.
When that is complete, we are provided with a list of LDAP groups we can select to complete the mapping.
Test the new LDAP user.
Log out
Log in as our new LDAP user.
Check we have the correct role mapping.
Profit.