MicroStrategy ONE

Install and Configure the MicroStrategy Identity Agent for OpenLDAP

  1. Open and run the Identity Agent installation file as an administrator. The Identity Agent installation wizard opens. Do the following:
    1. Review the information on the Welcome screen, then click Next.
    2. Read and accept the license agreement, then click Next.
    3. The default installation location for Identity Agent is displayed. If you want to change the location, click Change, then browse to the new location.
    4. Click Next, then click Install.
    5. Click Finish to close the installation wizard. The Identity Agent setup tool opens.

      If the Identity Agent setup tool does not open automatically, you can open it by navigating to the file location. To navigate to the default file location, click Start > All Programs, and expand the Identity Agent for OpenLDAP folder. Then click Config Identity Agent for OpenLDAP GUI to open the setup tool.

  2. In the Identity Agent setup tool, select Register new agent, then click Next..
  3. From the Is the MicroStrategy Identity Network installation on-premises/secure cloud drop-down list, select Yes.
  4. To set up the communication between MicroStrategy Identity Server and the Identity Agent, under General Information, do the following:
    1. In the Organization ID field, type the Organization ID provided by MicroStrategy Identity Manager, as described in Create a Certificate Signing Request in OpenLDAP.
    2. In the Agent ID field, type the Application ID provided by MicroStrategy Identity Manager, as described in Create a Certificate Signing Request in OpenLDAP.
    3. Next to the Certificate path field, click Browse. Navigate to and select the signed certificate that you downloaded from MicroStrategy Identity Manager, as described in Create a Certificate Signing Request in OpenLDAP. Then click Open.
    4. Next to the Private key path field, click Browse. Navigate to and select the private key that you created, as described in Create a Certificate Signing Request in OpenLDAP. Then click Open.
  5. You can display a profile photo on each MicroStrategy Badge, as described in Including Profile Photos in OpenLDAP. From the Does your photo URL need authentication drop-down list, select whether credentials are required to access user photos. If credentials are required, type the User name and Password that are required to access user photos.
  6. For MicroStrategy Cloud implementations, under Internet Connection Setup, specify how your network is protected:
    • If your network is protected by a proxy server, select Proxy. Provide the following connection information for your proxy server:
      1. In the Proxy host address field, type the host address of your proxy server.
      2. In the Proxy port field, type the port number of your proxy server.
      3. If required by your proxy server, type the User name for your proxy server. Leave the field blank if a user name is not required
      4. If required by your proxy server, type the Password for your proxy server, then confirm the password. Leave the field blank if a password is not required.
      5. If your network is protected by a firewall, select Firewall.
  7. Under On-Premise/Secure Cloud Setup, provide the following information to create a secure connection:
    1. In the Gateway URL field, type the domain name and port number for the Agent Gateway, provided by MicroStrategy Identity Manager, as described in Create a Certificate Signing Request in OpenLDAP.
    2. By default, the signing Certificate Authority that you specified when you configured MicroStrategy Identity is included in the Identity Agent's list of trusted Certificate Authorities. If you specify an alternate signing Certificate Authority, do the following:
      1. From the Is signing CA included in the default trusted signing CA list drop-down list, select No.
      2. Type the Alias of your signing Certificate Authority.
      3. In the Certificate path field, type the file path to your signing Certificate Authority.
  8. You can specify the type of Agent you intended to install. If you choose OpenLDAP Agent, then also specify if your OpenLDAP server has the ppolicy overlay and usn overlay enabled.
  9. You can secure the communication between the Identity Agent and your OpenLDAP server using LDAP over SSL (LDAPS). To do this, from the LDAP over SSL (LDAPS) drop-down list under AD Setup, select Yes. Enter the file path to the Java KeyStore (.jks) file that stores the certificate, as described in the prerequisites.
  10. To set up the communication between the Identity Agent and your OpenLDAP server, under LDAP Setup, do the following:
    1. In the LDAP server address field, enter the IP address of your OpenLDAP server.
    2. In the Server port field, enter the port of your OpenLDAP server. The default port for LDAP communication is 389, and the default port for LDAPS communication is 636.
    3. Type the User name of an account that has access to your OpenLDAP server. Depending on your OpenLDAP configuration, type the user name in the format domainname\username.
    4. Enter the Password for the OpenLDAP account, then confirm the password.

      If you want to add a load balancer between the Identity Agent, make sure that the Identity Agent connects to the same OpenLDAP server persistently. If this is not done, the Identity Agent will not detect new users added to OpenLDAP.

    1. Click Submit. The connection is tested with your OpenLDAP server and completes the configuration of your Identity Agent.

Next, Add OpenLDAP Information to MicroStrategy Identity and Synchronize Users.