17.10 - Example: Using ldapsearch to Authenticate an Active Directory, ADAM, or AD LDS User - Advanced SQL Engine - Teradata Database

Teradata Vantage™ - Advanced SQL Engine Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.10
Release Date
July 2021
Content Type
Administration
Security
Publication ID
B035-1100-171K
Language
English (United States)

This example demonstrates the command to cause the Administrator user on a Windows network to be authenticated with Active Directory, ADAM, or AD LDS. For demonstration purposes, the example uses a -u option to name the user, and shows an attempt to obtain the RootDSE object as an authenticated user. However, the example input only asks for the namingContext attribute rather than all attributes as shown in other examples, such as Example: Using ldapsearch to Find the RootDSE in Active Directory, ADAM, or AD LDS.

If this command is run from a Windows machine, a -d option, which names the Windows domain where the authentication is to occur, can be included in the options.

If the command is successful it indicates that you can setup the directory and the TDGSS configuration files for directory authentication and authorization of database users.

If the command fails, refer to Common Errors with Active Directory, ADAM, or AD LDS, to debug the problem.

$ ldapsearch -H ldap://esroot -b "" -s base -x -D  user_dn  -W namingContexts
Enter LDAP password:
dn:
namingContexts: DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Configuration,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Schema,CN=Configuration,DC=esrootdom,DC=esdev,
DC=tdat
namingContexts: DC=DomainDnsZones,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: DC=ForestDnsZones,DC=esrootdom,DC=esdev,DC=tdat
$