This is an archive of the Maximo Yahoo Community. The content of this pages may be a sometimes obsolete so please check post dates.
Thanks to the community owner Christopher Wanko for providing the content.
Well, at one client they created some test user IDs (onr for each profile) on the server, using server-side security so they can control the passwords there.
Shannon
Sent from my BlackBerry - the most secure mobile device.
Original Message
From:MAXIMO@yahoogroups.com
Sent:August 19, 2016 10:31 AM
To:MAXIMO@yahoogroups.com
Reply-to:MAXIMO@yahoogroups.com
Subject:[MAXIMO List] Okay, another good one.
Your Maximo site is setup with LDAP. Groovy.
So how do you test a userid if you don't know their AD password? In short, how do you impersonate users when testing or developing if LDAP (AD) is controlling things?
-C
While I cannot explain the technical side of how it was done we created a PKI front end with an admin page. The users log in using a CAC validation and specific users are directed to an admin page that allows them to log in as any user or select a specific node to log into.
It works well when we are trying to resolve issues by testing to see if it is related to the user profile or a larger issue.
V/R
Kevin
From: MAXIMO@yahoogroups.com [mailto:MAXIMO@yahoogroups.com]
Sent: Friday, August 19, 2016 2:36 PM
To: Maximo NewsGroup
Subject: [External] Re: [MAXIMO List] Okay, another good one.
Well, at one client they created some test user IDs (onr for each profile) on the server, using server-side security so they can control the passwords there.
Shannon
Sent from my BlackBerry - the most secure mobile device.
Original Message
From:MAXIMO@yahoogroups.com
Sent:August 19, 2016 10:31 AM
To:MAXIMO@yahoogroups.com
Reply-to:MAXIMO@yahoogroups.com
Subject:[MAXIMO List] Okay, another good one.
Your Maximo site is setup with LDAP. Groovy.
So how do you test a userid if you don't know their AD password? In short, how do you impersonate users when testing or developing if LDAP (AD) is controlling things?
-C
---In MAXIMO@yahoogroups.com, <egolf_kevin@ne.bah.com> wrote :
While I cannot explain the technical side of how it was done we created a PKI front end with an admin page. The users log in using a CAC validation and specific users are directed to an admin page that allows them to log in as any user or select a specific node to log into.
That sounds like a Cadillac solution! If you can get us more info on how it was done I'd love to read about it.
-C