tdspolicy for a Directory Principal not Mapped to a Teradata User - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.10
Published
July 2021
Language
English (United States)
Last Update
2022-02-15
dita:mapPath
ppz1593203596223.ditamap
dita:ditavalPath
wrg1590696035526.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantage™

For directory principals not mapped to a Teradata user, specify -u as the directory principal user name, along with the IP address and any mapped profile.

$ tdspolicy -u uid=drct01,ou=principals,dc=domain1,dc=com –p profile01
 –s  local_service_DN  –i 141.206.3.219
Querying policy using the following parameters:

        External user: uid=drct01,ou=principals,dc=domain1,dc=com
    Teradata profile: profile01
          IP address: 141.206.3.219

          Mechanisms: krb5, ldap
Confidentiality QoPs: low, high

where the directory principal specified by -u:

  • Can use only the KRB5, SPNEGO, or LDAP mechanism to log on.
  • Must use confidentiality with high QOP for LDAP logons. Confidentiality is also enforced for KRB5 and SPNEGO logons, but the QOP strength is determined by Kerberos.