Once you have added required users to the repository used for Sybase Control Center authentication, you can use that directory to authenticate administration login requests.
Each line of the LDAP server module of the properties file must begin with "CSI.loginModule." followed by a module number. The module number in this sample is 5. The module number must be unique in the properties file, and you must use the same number in every line of the module.
=================================================== ## LDAP login module for SCC CSI.loginModule.5.options.AuthenticationSearchBase=ou=users,dc=example,dc=com CSI.loginModule.5.options.BindDN=cn=Directory Manager CSI.loginModule.5.options.BindPassword=secret CSI.loginModule.5.options.DefaultSearchBase=dc=example,dc=com CSI.loginModule.5.options.ProviderURL=ldap://localhost:10389 CSI.loginModule.5.options.RoleSearchBase=ou=groups,dc=example,dc=com CSI.loginModule.5.options.ServerType=AD CSI.loginModule.5.options.moduleName=SUP LDAP Login Module CSI.loginModule.5.provider=com.sybase.ua.services.security.ldap.LDAPWithRoleLoginModule CSI.loginModule.5.controlFlag=sufficient =====================================================
# Anonymous Login Module CSI.loginModule.0.provider=com.sybase.ua.services.security.anonymous.AnonymousLoginModule CSI.loginModule.0.controlFlag=sufficient CSI.loginModule.0.options.moduleName=Anonymous Login Module CSI.loginModule.0.options.roles=uaAnonymousAdding this anonymous login module does not relax or allow anonymous access to the Sybase Control Center. Authentication and authorization checks are still enforced..
keytool -import -keystore <SUP_installdir>\shared\JRE-<version>\bin\keytool\lib\security\cacerts -file <your cert file and path> -alias ldapcert -storepass changeit