The create-initial-config tool provides limited support for configuring SCIM and the user store configuration needed to connect the SCIM subsystem to a set of LDAP directory servers.
- An LDAP store adapter named
- A load-balancing algorithm named
User Store LBA
- One or more LDAP external servers
- (Optional) A SCIM resource type named
- (Optional) SCIM schema, attributes, and attribute mappings for the
If run interactively, create-initial-config walks you through the configuration process. You should be prepared to provide connection information for your directory servers.
You can also run create-initial-config noninteractively, which is useful when performing a scripted deployment. For an example, see Configuring the PingAuthorize user store.
The following table describes a key subset of the tool's command-line options.
|The bind DN for a user account that PingAuthorize Server will use to access backend LDAP servers. Create this account using the prepare-external-store tool.
|The password for the above account.
|The host, LDAP / LDAPS port, and optional location of a backend LDAP server. You can specify this option once per each backend server.
|The base DN under which entries are stored.
|The structural LDAP object class of entries for the SCIM
subsystem to handle if
--initialSchema has the
The SCIM schema and resource type configuration to use. Supports the following values:
For more information about running create-initial-config, see its help by running the following command:
When using create-initial-config noninteractively, you should also run prepare-external-store for each backend LDAP server. This tool creates a privileged user account on the LDAP server for use by PingAuthorize Server and configures a set of global access control instructions (ACIs) needed by this account.