rgupta_

Untitled

Mar 27th, 2019
394
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.67 KB | None | 0 0
  1. On a fresh system where LDAP Configuration doesn't exist
  2. 1) Ran the redfish validator : PASS
  3.  
  4. 2) Get request on account service when there is no LDAP/AD Configuration
  5. ========================================================================
  6. curl -k -H "X-Auth-Token: $bmc_token" -X GET https://${BMC_IP}/redfish/v1/AccountService/
  7. {
  8. "@odata.context": "/redfish/v1/$metadata#AccountService.AccountService",
  9. "@odata.id": "/redfish/v1/AccountService",
  10. "@odata.type": "#AccountService.v1_3_1.AccountService",
  11. "AccountLockoutDuration": 0,
  12. "AccountLockoutThreshold": 0,
  13. "Accounts": {
  14. "@odata.id": "/redfish/v1/AccountService/Accounts"
  15. },
  16. "ActiveDirectory": {
  17. "AccountProviderType": "ActiveDirectoryService",
  18. "AccountProviderType@Redfish.AllowableValues": [
  19. "ActiveDirectoryService"
  20. ],
  21. "Authentication": {
  22. "AuthenticationType": "UsernameAndPassword",
  23. "AuthenticationType@Redfish.AllowableValues": [
  24. "UsernameAndPassword"
  25. ],
  26. "Password": null,
  27. "Username": ""
  28. },
  29. "LDAPService": {
  30. "SearchSettings": {
  31. "BaseDistinguishedNames": [
  32. ""
  33. ],
  34. "GroupsAttribute": "",
  35. "UsernameAttribute": ""
  36. }
  37. },
  38. "ServiceAddresses": [
  39. ""
  40. ],
  41. "ServiceEnabled": false
  42. },
  43. "Description": "Account Service",
  44. "Id": "AccountService",
  45. "LDAP": {
  46. "AccountProviderType": "LDAPService",
  47. "AccountProviderType@Redfish.AllowableValues": [
  48. "LDAPService"
  49. ],
  50. "Authentication": {
  51. "AuthenticationType": "UsernameAndPassword",
  52. "AuthenticationType@Redfish.AllowableValues": [
  53. "UsernameAndPassword"
  54. ],
  55. "Password": null,
  56. "Username": ""
  57. },
  58. "LDAPService": {
  59. "SearchSettings": {
  60. "BaseDistinguishedNames": [
  61. ""
  62. ],
  63. "GroupsAttribute": "",
  64. "UsernameAttribute": ""
  65. }
  66. },
  67. "ServiceAddresses": [
  68. ""
  69. ],
  70. "ServiceEnabled": false
  71. },
  72. "MaxPasswordLength": 20,
  73. "MinPasswordLength": 8,
  74. "Name": "Account Service",
  75. "Roles": {
  76. "@odata.id": "/redfish/v1/AccountService/Roles"
  77. },
  78. "ServiceEnabled": true
  79.  
  80. 3) Empty JSON
  81. =============
  82. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"Authentication": {}}}'
  83. {
  84. "error": {
  85. "@Message.ExtendedInfo": [
  86. {
  87. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  88. "Message": "The request body submitted contained an empty JSON object and the service is unable to process it.",
  89. "MessageArgs": [],
  90. "MessageId": "Base.1.4.0.EmptyJSON",
  91. "Resolution": "Add properties in the JSON object and resubmit the request.",
  92. "Severity": "Warning"
  93. }
  94. ],
  95. "code": "Base.1.4.0.EmptyJSON",
  96. "message": "The request body submitted contained an empty JSON object and the service is unable to process it."
  97. }
  98. }
  99.  
  100. 4) Update AccountProvider Type
  101. =============================
  102. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"AccountProviderType": "LDAPService"}}'
  103. {
  104. "AccountProviderType@Message.ExtendedInfo": [
  105. {
  106. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  107. "Message": "The property AccountProviderType is a read only property and cannot be assigned a value.",
  108. "MessageArgs": [
  109. "AccountProviderType"
  110. ],
  111. "MessageId": "Base.1.4.0.PropertyNotWritable",
  112. "Resolution": "Remove the property from the request body and resubmit the request if the operation failed.",
  113. "Severity": "Warning"
  114. }
  115. ]
  116. }
  117. 5) Update invalid authentication type
  118. ====================================
  119. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"Authentication": {"AuthenticationType": "abcdef"}}}'
  120. {
  121. "AuthenticationType@Message.ExtendedInfo": [
  122. {
  123. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  124. "Message": "The value abcdef for the property AuthenticationType is not in the list of acceptable values.",
  125. "MessageArgs": [
  126. "abcdef",
  127. "AuthenticationType"
  128. ],
  129. "MessageId": "Base.1.4.0.PropertyValueNotInList",
  130. "Resolution": "Choose a value from the enumeration list that the implementation can support and resubmit the request if the operation failed.",
  131. "Severity": "Warning"
  132. }
  133. ]
  134. }
  135.  
  136.  
  137. 6) Update the service address with empty list
  138. ==============================================
  139.  
  140. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"ServiceAddresses": []}}'
  141. {
  142. "error": {
  143. "@Message.ExtendedInfo": [
  144. {
  145. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  146. "Message": "The request failed due to an internal service error. The service is still operational.",
  147. "MessageArgs": [],
  148. "MessageId": "Base.1.4.0.InternalError",
  149. "Resolution": "Resubmit the request. If the problem persists, consider resetting the service.",
  150. "Severity": "Critical"
  151. }
  152. ],
  153. "code": "Base.1.4.0.InternalError",
  154. "message": "The request failed due to an internal service error. The service is still operational."
  155. }
  156.  
  157. 9) Let's PATCH the LDAP Property.
  158. ===============================
  159. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"ServiceEnabled":false, "ServiceAddresses": ["ldap://9.126.172.69/"],"Authentication": {"AuthenticationType":"UsernameAndPassword","Username": "uid=sivasjxp,dc=ldap,dc=com","Password": "india@123"}, "LDAPService": {"SearchSettings": {"BaseDistinguishedNames": ["dc=ldap,dc=com"]}}}}'
  160. {
  161. "LDAP": {
  162. "AccountProviderType": "LDAPService",
  163. "AccountProviderType@Redfish.AllowableValues": [
  164. "LDAPService"
  165. ],
  166. "Authentication": {
  167. "AuthenticationType": "UsernameAndPassword",
  168. "AuthenticationType@Redfish.AllowableValues": [
  169. "UsernameAndPassword"
  170. ],
  171. "Password": "",
  172. "Username": "uid=sivasjxp,dc=ldap,dc=com"
  173. },
  174. "LDAPService": {
  175. "SearchSettings": {
  176. "BaseDistinguishedNames": [
  177. "dc=ldap,dc=com"
  178. ],
  179. "GroupsAttribute": "gidNumber",
  180. "UsernameAttribute": "cn"
  181. }
  182. },
  183. "ServiceAddresses": [
  184. "ldap://9.126.172.69/"
  185. ],
  186. "ServiceEnabled": false
  187. }
  188. }
  189. 10) Do the GET request after Patching the LDAP Configuration.
  190. =============================================================
  191. curl -k -H "X-Auth-Token: $bmc_token" -X GET https://${BMC_IP}/redfish/v1/AccountService/
  192. {
  193. "@odata.context": "/redfish/v1/$metadata#AccountService.AccountService",
  194. "@odata.id": "/redfish/v1/AccountService",
  195. "@odata.type": "#AccountService.v1_3_1.AccountService",
  196. "AccountLockoutDuration": 0,
  197. "AccountLockoutThreshold": 0,
  198. "Accounts": {
  199. "@odata.id": "/redfish/v1/AccountService/Accounts"
  200. },
  201. "ActiveDirectory": {
  202. "AccountProviderType": "ActiveDirectoryService",
  203. "AccountProviderType@Redfish.AllowableValues": [
  204. "ActiveDirectoryService"
  205. ],
  206. "Authentication": {
  207. "AuthenticationType": "UsernameAndPassword",
  208. "AuthenticationType@Redfish.AllowableValues": [
  209. "UsernameAndPassword"
  210. ],
  211. "Password": null,
  212. "Username": ""
  213. },
  214. "LDAPService": {
  215. "SearchSettings": {
  216. "BaseDistinguishedNames": [
  217. ""
  218. ],
  219. "GroupsAttribute": "",
  220. "UsernameAttribute": ""
  221. }
  222. },
  223. "ServiceAddresses": [
  224. ""
  225. ],
  226. "ServiceEnabled": false
  227. },
  228. "Description": "Account Service",
  229. "Id": "AccountService",
  230. "LDAP": {
  231. "AccountProviderType": "LDAPService",
  232. "AccountProviderType@Redfish.AllowableValues": [
  233. "LDAPService"
  234. ],
  235. "Authentication": {
  236. "AuthenticationType": "UsernameAndPassword",
  237. "AuthenticationType@Redfish.AllowableValues": [
  238. "UsernameAndPassword"
  239. ],
  240. "Password": null,
  241. "Username": "uid=sivasjxp,dc=ldap,dc=com"
  242. },
  243. "LDAPService": {
  244. "SearchSettings": {
  245. "BaseDistinguishedNames": [
  246. "dc=ldap,dc=com"
  247. ],
  248. "GroupsAttribute": "gidNumber",
  249. "UsernameAttribute": "cn"
  250. }
  251. },
  252. "ServiceAddresses": [
  253. "ldap://9.126.172.69/"
  254. ],
  255. "ServiceEnabled": false
  256. },
  257. "MaxPasswordLength": 20,
  258. "MinPasswordLength": 8,
  259. "Name": "Account Service",
  260. "Roles": {
  261. "@odata.id": "/redfish/v1/AccountService/Roles"
  262. },
  263. "ServiceEnabled": true
  264.  
  265. 11) Login with LDAP Credentials
  266. ==================================
  267. curl --insecure -X POST -D headers.txt https://${BMC_IP}/redfish/v1/SessionService/Sessions -d '{"UserName":"sivasjxp", "Password":"india@123"}'
  268. {
  269. "@odata.context": "/redfish/v1/$metadata#Session.Session",
  270. "@odata.id": "/redfish/v1/SessionService/Sessions/ZuZgsHAJLP",
  271. "@odata.type": "#Session.v1_0_2.Session",
  272. "Description": "Manager User Session",
  273. "Id": "ZuZgsHAJLP",
  274. "Name": "User Session",
  275. "UserName": "sivasjxp"
  276. }
  277. 12) Let's patch the AD configuration
  278. =====================================
  279. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"ActiveDirectory":{"ServiceEnabled":false, "ServiceAddresses": ["ldap://9.194.251.141/"],"Authentication": {"AuthenticationType":"UsernameAndPassword","Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com","Password": "india@123"}, "LDAPService": {"SearchSettings": {"BaseDistinguishedNames": ["dc=Corp,dc=ibm,dc=com"]}}}}'
  280. {
  281. "ActiveDirectory": {
  282. "AccountProviderType": "ActiveDirectoryService",
  283. "AccountProviderType@Redfish.AllowableValues": [
  284. "ActiveDirectoryService"
  285. ],
  286. "Authentication": {
  287. "AuthenticationType": "UsernameAndPassword",
  288. "AuthenticationType@Redfish.AllowableValues": [
  289. "UsernameAndPassword"
  290. ],
  291. "Password": "",
  292. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  293. },
  294. "LDAPService": {
  295. "SearchSettings": {
  296. "BaseDistinguishedNames": [
  297. "dc=Corp,dc=ibm,dc=com"
  298. ],
  299. "GroupsAttribute": "",
  300. "UsernameAttribute": ""
  301. }
  302. },
  303. "ServiceAddresses": [
  304. "ldap://9.194.251.141/"
  305. ],
  306. "ServiceEnabled": false
  307. }
  308. 13) Still Ldap is Enabled, so let's enable the AD
  309. ==================================================
  310. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"ActiveDirectory":{"erviceEnabled":true}}'
  311. {
  312. "ActiveDirectory": {
  313. "AccountProviderType": "ActiveDirectoryService",
  314. "AccountProviderType@Redfish.AllowableValues": [
  315. "ActiveDirectoryService"
  316. ],
  317. "Authentication": {
  318. "AuthenticationType": "UsernameAndPassword",
  319. "AuthenticationType@Redfish.AllowableValues": [
  320. "UsernameAndPassword"
  321. ],
  322. "Password": null,
  323. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  324. },
  325. "LDAPService": {
  326. "SearchSettings": {
  327. "BaseDistinguishedNames": [
  328. "dc=Corp,dc=ibm,dc=com"
  329. ],
  330. "GroupsAttribute": "primaryGroupID",
  331. "UsernameAttribute": "sAMAccountName"
  332. }
  333. },
  334. "ServiceAddresses": [
  335. "ldap://9.194.251.141/"
  336. ],
  337. "ServiceEnabled": false
  338. },
  339. "error": {
  340. "@Message.ExtendedInfo": [
  341. {
  342. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  343. "Message": "The request failed due to an internal service error. The service is still operational.",
  344. "MessageArgs": [],
  345. "MessageId": "Base.1.4.0.InternalError",
  346. "Resolution": "Resubmit the request. If the problem persists, consider resetting the service.",
  347. "Severity": "Critical"
  348. }
  349. ],
  350. "code": "Base.1.4.0.InternalError",
  351. "message": "The request failed due to an internal service error. The service is still operational."
  352. }
  353. }
  354. 14) Disable the LDAP first
  355. ==========================
  356. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"LDAP":{"ServiceEnabled":false}}'
  357. {
  358. "LDAP": {
  359. "AccountProviderType": "LDAPService",
  360. "AccountProviderType@Redfish.AllowableValues": [
  361. "LDAPService"
  362. ],
  363. "Authentication": {
  364. "AuthenticationType": "UsernameAndPassword",
  365. "AuthenticationType@Redfish.AllowableValues": [
  366. "UsernameAndPassword"
  367. ],
  368. "Password": null,
  369. "Username": "uid=sivasjxp,dc=ldap,dc=com"
  370. },
  371. "LDAPService": {
  372. "SearchSettings": {
  373. "BaseDistinguishedNames": [
  374. "dc=ldap,dc=com"
  375. ],
  376. "GroupsAttribute": "gidNumber",
  377. "UsernameAttribute": "cn"
  378. }
  379. },
  380. "ServiceAddresses": [
  381. "ldap://9.126.172.69/"
  382. ],
  383. "ServiceEnabled": false
  384. }
  385. }
  386. 15) Enable the AD now
  387. =====================
  388. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{ActiveDirectory":{"ServiceEnabled":true}}'
  389. {
  390. "ActiveDirectory": {
  391. "AccountProviderType": "ActiveDirectoryService",
  392. "AccountProviderType@Redfish.AllowableValues": [
  393. "ActiveDirectoryService"
  394. ],
  395. "Authentication": {
  396. "AuthenticationType": "UsernameAndPassword",
  397. "AuthenticationType@Redfish.AllowableValues": [
  398. "UsernameAndPassword"
  399. ],
  400. "Password": null,
  401. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  402. },
  403. "LDAPService": {
  404. "SearchSettings": {
  405. "BaseDistinguishedNames": [
  406. "dc=Corp,dc=ibm,dc=com"
  407. ],
  408. "GroupsAttribute": "primaryGroupID",
  409. "UsernameAttribute": "sAMAccountName"
  410. }
  411. },
  412. "ServiceAddresses": [
  413. "ldap://9.194.251.141/"
  414. ],
  415. "ServiceEnabled": true
  416. }
  417. }
  418. 16) Login with LDAP credentails
  419. ================================
  420. curl --insecure -X POST -D headers.txt https://${BMC_IP}/redfish/v1/SessionService/Sessions -d '{"UserName":"sivasjxp", "Password":"india@123"}'
  421. {
  422. "error": {
  423. "@Message.ExtendedInfo": [
  424. {
  425. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  426. "Message": "While accessing the resource at /redfish/v1/SessionService/Sessions, the service received an authorization error Invalid username or password.",
  427. "MessageArgs": [
  428. "/redfish/v1/SessionService/Sessions",
  429. "Invalid username or password"
  430. ],
  431. "MessageId": "Base.1.4.0.ResourceAtUriUnauthorized",
  432. "Resolution": "Ensure that the appropriate access is provided for the service in order for it to access the URI.",
  433. "Severity": "Critical"
  434. }
  435. ],
  436. "code": "Base.1.4.0.ResourceAtUriUnauthorized",
  437. "message": "While accessing the resource at /redfish/v1/SessionService/Sessions, the service received an authorization error Invalid username or password."
  438. }
  439. }
  440. 17) login with AD credentials
  441. =============================
  442. curl --insecure -X POST -D headers.txt https://${BMC_IP}/redfish/v1/SessionService/Sessions -d '{"UserName":"dvtuser", "Password":"india@123"}'
  443. {
  444. "@odata.context": "/redfish/v1/$metadata#Session.Session",
  445. "@odata.id": "/redfish/v1/SessionService/Sessions/Cjr9YSMrxc",
  446. "@odata.type": "#Session.v1_0_2.Session",
  447. "Description": "Manager User Session",
  448. "Id": "Cjr9YSMrxc",
  449. "Name": "User Session",
  450. "UserName": "dvtuser"
  451. }
  452. 18) Add the Remote Role mapping for the AD
  453. ==========================================
  454. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup15","LocalRole": "User"},{"RemoteGroup": "Admingroup13","LocalRole": "Administrator"},{"RemoteGroup": "Admingroup14","LocalRole": "Operator"}]}}'
  455. {
  456. "@Message.ExtendedInfo": [
  457. {
  458. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  459. "Message": "Successfully Completed Request",
  460. "MessageArgs": [],
  461. "MessageId": "Base.1.4.0.Success",
  462. "Resolution": "None",
  463. "Severity": "OK"
  464. }
  465. ],
  466. "ActiveDirectory": {
  467. "AccountProviderType": "ActiveDirectoryService",
  468. "Authentication": {
  469. "AuthenticationType": "UsernameAndPassword",
  470. "Password": null,
  471. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  472. },
  473. "LDAPService": {
  474. "SearchSettings": {
  475. "BaseDistinguishedNames": [
  476. "dc=Corp,dc=ibm,dc=com"
  477. ],
  478. "GroupsAttribute": "",
  479. "UsernameAttribute": ""
  480. }
  481. },
  482. "RemoteRoleMapping": [
  483. {
  484. "LocalRole": "User",
  485. "RemoteGroup": "Admingroup15"
  486. },
  487. {
  488. "LocalRole": "Administrator",
  489. "RemoteGroup": "Admingroup13"
  490. },
  491. {
  492. "LocalRole": "Operator",
  493. "RemoteGroup": "Admingroup14"
  494. }
  495. ],
  496. "ServiceAddresses": [
  497. "ldap://9.194.251.141/"
  498. ],
  499. "ServiceEnabled": false
  500. }
  501. 19) Delete the second remote role mapping.
  502. ==========================================
  503. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"ActiveDirectory":{"RemoteRoleMapping": [{},null,{}]}}'
  504. {
  505. "@Message.ExtendedInfo": [
  506. {
  507. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  508. "Message": "Successfully Completed Request",
  509. "MessageArgs": [],
  510. "MessageId": "Base.1.4.0.Success",
  511. "Resolution": "None",
  512. "Severity": "OK"
  513. }
  514. ],
  515. "ActiveDirectory": {
  516. "AccountProviderType": "ActiveDirectoryService",
  517. "Authentication": {
  518. "AuthenticationType": "UsernameAndPassword",
  519. "Password": null,
  520. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  521. },
  522. "LDAPService": {
  523. "SearchSettings": {
  524. "BaseDistinguishedNames": [
  525. "dc=Corp,dc=ibm,dc=com"
  526. ],
  527. "GroupsAttribute": "",
  528. "UsernameAttribute": ""
  529. }
  530. },
  531. "RemoteRoleMapping": [
  532. {
  533. "LocalRole": "Administrator",
  534. "RemoteGroup": "Admingroup13"
  535. },
  536. null,
  537. {
  538. "LocalRole": "Operator",
  539. "RemoteGroup": "Admingroup14"
  540. }
  541. ],
  542. "ServiceAddresses": [
  543. "ldap://9.194.251.141/"
  544. ],
  545. "ServiceEnabled": false
  546. }
  547. 20) change the Remote group of first remote role mapping
  548. ========================================================
  549. curl -k -H "X-Auth-Token: $bmc_token" -X PATCH https://${BMC_IP}/redfish/v1/AccountService/ -D patch.txt -d '{"ActiveDirectory":{"RemoteRoleMapping": [{"RemoteGroup": "Admingroup25"},{}]}}'
  550. {
  551. "@Message.ExtendedInfo": [
  552. {
  553. "@odata.type": "/redfish/v1/$metadata#Message.v1_0_0.Message",
  554. "Message": "Successfully Completed Request",
  555. "MessageArgs": [],
  556. "MessageId": "Base.1.4.0.Success",
  557. "Resolution": "None",
  558. "Severity": "OK"
  559. }
  560. ],
  561. "ActiveDirectory": {
  562. "AccountProviderType": "ActiveDirectoryService",
  563. "Authentication": {
  564. "AuthenticationType": "UsernameAndPassword",
  565. "Password": null,
  566. "Username": "cn=dvtuser,cn=Users,dc=Corp,dc=ibm,dc=com"
  567. },
  568. "LDAPService": {
  569. "SearchSettings": {
  570. "BaseDistinguishedNames": [
  571. "dc=Corp,dc=ibm,dc=com"
  572. ],
  573. "GroupsAttribute": "",
  574. "UsernameAttribute": ""
  575. }
  576. },
  577. "RemoteRoleMapping": [
  578. {
  579. "LocalRole": "Administrator",
  580. "RemoteGroup": "Admingroup25"
  581. },
  582. {
  583. "LocalRole": "Operator",
  584. "RemoteGroup": "Admingroup14"
  585. }
  586. ],
  587. "ServiceAddresses": [
  588. "ldap://9.194.251.141/"
  589. ],
  590. "ServiceEnabled": false
  591. }
  592. }
Add Comment
Please, Sign In to add comment