Example: Using ldapsearch to Authenticate an Active Directory, ADAM, or AD LDS User - Analytics Database - Teradata Vantage

Security Administration

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
Language
English (United States)
Last Update
2023-11-02
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572
lifecycle
latest
Product Category
Teradata Vantage™

This example demonstrates the command to cause the Administrator user on a Windows network to be authenticated with Active Directory, ADAM, or AD LDS. For demonstration purposes, the example uses a -u option to name the user, and shows an attempt to obtain the RootDSE object as an authenticated user. However, the example input only asks for the namingContext attribute rather than all attributes as shown in other examples, such as Example: Using ldapsearch to Find the RootDSE in Active Directory, ADAM, or AD LDS.

If this command is run from a Windows machine, a -d option, which names the Windows domain where the authentication is to occur, can be included in the options.

If the command is successful it indicates that you can setup the directory and the TDGSS configuration files for directory authentication and authorization of database users.

If the command fails, refer to Common Errors with Active Directory, ADAM, or AD LDS, to debug the problem.

$ ldapsearch -H ldap://esroot -b "" -s base -x -D  user_dn  -W namingContexts
Enter LDAP password:
dn:
namingContexts: DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Configuration,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Schema,CN=Configuration,DC=esrootdom,DC=esdev,
DC=tdat
namingContexts: DC=DomainDnsZones,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: DC=ForestDnsZones,DC=esrootdom,DC=esdev,DC=tdat
$