@paulmibus We have opened a Support ticket. In the meanwhile, I could resolve by adding a uid=“admin” and assigning the admin user to the sysadmin group.
- Add admin to Openldap by using following command :
ldapadd -w ldappassword -D “cn=manager,dc=apigee,dc=com” -h localhost -p 10389 -f /tmp/admin.ldif
- Add the admin user as a roleOccupant in sysadmin:
ldapmodify -H ldap://localhost:10389 -W -x -D “cn=manager,dc=apigee,dc=com” -f ./addsysadmin.ldif
Sample “admin.ldif”:
dn: uid=admin,ou=users,ou=global,dc=apigee,dc=com
objectClass: inetOrgPerson
uid: admin
cn: admin sn:
admin mail: abc@example.com
userPassword:: encryptedPwd
Sample “addsysadmin.ldif”:
dn: cn=sysadmin,ou=userroles,ou=global,dc=apigee,dc=com
changetype: modify
add: roleOccupant
roleOccupant: uid=admin,ou=users,ou=global,dc=apigee,dc=com
Once the admin user got added, I could run the following Management API :
curl -u abc@example.com -X GET http://MS-IP:8080/v1/users/abc@example.com/userroles
Response :
{ “role”: [ { “name”: “sysadmin” } ] }
Once the sysadmin got recovered, I could reset the passwords for the orgadmin users.