Lookup operation examples: Example 3

Use this example to learn how the search flow works for a lookup operation that returns a target user identity from a default registry policy association.

In Figure 13, an administrator wants to map all desktop workstation users in a Windows® Active Directory registry to a single i5/OS™ user profile named general_user in an i5/OS registry that he named System_A in Enterprise Identity Mapping (EIM). Kerberos is the authentication method that Windows uses and the name of the Windows Active Directory registry as the administrator defined it in EIM is Desktops. One of the user identities that the administrator wants to map from is a Kerberos principal named sajones.

The administrator creates a default registry policy association with the following information:

Figure 13: A lookup operation returns a target user identity from a default registry policy association.


Example 3. A lookup operation returns a target user identity from a default registry  policy association.

This configuration allows a mapping lookup operation to map all the Kerberos principals in the Desktops registry, including the sajones principal, to the i5/OS user profile named general_user as follows:
Source user identity and registry ---> Default registry policy association ---> Target user identity
sajones in Desktops registry ---> Default registry policy association ---> general_user (in System_A registry)

The lookup operation search flows in this manner:

  1. The user sajones logs on and authenticates to her Windows desktop by means of her Kerberos principal in the Desktops registry.
  2. The user opens iSeries™ Navigator to access data on System A.
  3. i5/OS uses an EIM API to perform an EIM lookup operation with a source user identity of sajones, a source registry of Desktops, and a target registry of System_A.
  4. The EIM lookup operation checks whether mapping lookups are enabled for the source registry Desktops and target registry System_A. They are.
  5. The lookup operation checks for a specific identifier source association that matches the supplied source user identity of sajones in a source registry of Desktops. It does not find a matching identifier association.
  6. The lookup operation checks whether the domain is enabled to use policy associations. It is.
  7. The lookup operation checks whether the target registry (System_A) is enabled to use policy associations. It is.
  8. The lookup operation checks whether the source registry (Desktops) is an X.509 registry. It is not.
  9. The lookup operation checks whether there is a default registry policy association that matches the source registry definition name (Desktops) and the target registry definition name (System_A).
  10. The lookup operation determines that there is one and returns general_user as the target user identity.

Sometimes an EIM lookup operation returns ambiguous results. This can happen, for example, when more than one target user identity matches the specified lookup operation criteria. Some EIM-enabled applications, including i5/OS applications and products are not designed to handle these ambiguous results and may fail or give unexpected results. You may need to take action to resolve this situation. For example, you may need to either change your EIM configuration or define lookup information for each target user identity to prevent multiple matching target user identities. Also, you can test a mapping to determine whether the changes you make work as expected.