IBM Security Directory Server
The JSA DSM for IBM Security Directory Server collects event logs from your IBM Security Directory Server.
To integrate IBM Security Directory Server with JSA, complete the following steps:
If automatic updates are not enabled, download and install the most recent versions of the following RPMs from the Juniper Downloads onto your JSA Console:
DSMCommon RPM
IBM Security Directory Server DSM RPM
Configure each IBM Security Directory Server system in your network to enable communication with JSA.
If JSA does not automatically detect the log source, add a log source on the JSA Console.
IBM Security Directory Server DSM Specifications
When you configure the IBM Security Directory Server DSM, understanding the specifications for the IBM Security Directory Server DSM can help ensure a successful integration. For example, knowing what protocol to use before you begin can help reduce frustration during the configuration process.
The following table identifies the specifications for the IBM Security Directory Server DSM:
Specification |
Value |
---|---|
Manufacturer |
IBM |
DSM |
IBM Security Directory Server |
RPM file name |
DSM-IBMSecurityDirectoryServer-build_number .noarch.rpm |
Supported version |
6.3.1 and later |
Protocol |
Syslog (LEEF) |
JSA recorded events |
All relevant events |
Automatically discovered |
Yes |
Includes identity |
Yes |
For more information |
Configuring IBM Security Directory Server to Communicate with JSA
JSA can collect LEEF formatted audit events from your IBM Security Directory Server.
To configure IBM Security Directory Server to send logs to JSA, you must use the IBM Security Directory Server command line to add an auxiliary object class and then set values for the JSA log management attributes.
Create a file (file_name) on the IBM Security Director Server with the following content:
dn: cn=Audit, cn=Log Management, cn=Configuration changetype: modify add: objectclass objectclass: ibm-slapdQRadarConfig
To add the auxiliary object class
ibm-slapdQRadarConfig
for JSA configuration attributes to cn=Audit,cn=Log Management,cn=Configuration, run the following command:# idsldapmodify -h host_name -p portnumber -D cn=RDN_value -w password -f file_name
Create a new file (new_file) with the following content:
dn: cn= specific_log_name, cn=Log Management, cn=configuration changetype: modify add:ibm-slapdLogEventQRadarEnabled ibm-slapdLogEventQRadarEnabled: true - add:ibm-slapdLogEventQRadarHostName ibm-slapdLogEventQRadarHostName: host_name_of_qradar_instance - add: ibm-slapdLogEventQRadarPort ibm-slapdLogEventQRadarPort: port_of_qradar_instance - add: ibm-slapdLogEventQRadarMapFilesLocation ibm-slapdLogEventQRadarMapFilesLocation: directory_location_of_qradar_mapfiles
Replace the following values in the new_file content:
Replace
host_name_of_qradar_instance
with the destination JSA Event Collector hostname or IP address.Replace
port_of_qradar_instance
with 514.If IBM Security Directory Server V6.3.1 is installed, replace directory_location_of_qradar_mapfiles with /opt/ibm/ldap/V6.3.1/idstools/ idslogmgmt/.
If IBM Security Directory Server V6.4 is installed, replace directory_location_of_qradar_mapfiles with /opt/ibm/ldap/V6.4/idstools/ idslogmgmt/.
For example:
dn: cn= specific_log_name, cn=Log Management, cn=configuration changetype: modify add:ibm-slapdLogEventQRadarEnabled ibm-slapdLogEventQRadarEnabled: true - add:ibm-slapdLogEventQRadarHostName ibm-slapdLogEventQRadarHostName: qradar-collector.example.com - add: ibm-slapdLogEventQRadarPort ibm-slapdLogEventQRadarPort: 514 - add: ibm-slapdLogEventQRadarMapFilesLocation ibm-slapdLogEventQRadarMapFilesLocation: /opt/ibm/ldap/V6.3.1/idstools/idslogmgmt/
To set the attribute values for JSA integration, run the following command:
# idsldapmodify -h host_name -p portnumber -D cn=RDN_value -w password -f new_file
To start an instance, run the following command
# ibmslapd -I <instance_name> -n
Optional: To start log management locally, run the following command:
# idslogmgmt -I <instance_name>
To start, get status, and stop log management remotely, run the following commands:
ibmdirctl -D <adminDN> -w <password> -h <host_name> -p <administration server port number> startlogmgmt# ibmdirctl -D <adminDN> -w <password> -h <host_name> -p <administration server port number> statuslogmgmt# ibmdirctl -D <adminDN> -w <password> -h <host_name> -p <administration server port number> stoplogmgmt
Syslog Log Source Parameters for IBM Security Directory Server
If JSA does not automatically detect the log source, add an IBM Security Directory Server log source on the JSA Console by using the Syslog protocol.
When using the syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Syslog events from IBM Security Directory Server:
Parameter |
Value |
---|---|
Log Source type |
IBM Security Directory Server |
Protocol Configuration |
Syslog |