16.10 - Example: Using ldapsearch to Authenticate an Active Directory, ADAM, or AD LDS User - Teradata Database

Teradata Database Security Administration

Teradata Database
June 2017

This example demonstrates the command to cause the Administrator user on a Windows network to be authenticated with Active Directory, ADAM, or AD LDS. For demonstration purposes, the example uses a -u option to name the user, and shows an attempt to obtain the RootDSE object as an authenticated user. However, the example input only asks for the namingContext attribute rather than all attributes as shown in other examples, such as Example: Using ldapsearch to Find the RootDSE in Active Directory, ADAM, or AD LDS.

If this command is run from a Windows machine, a -d option, which names the Windows domain where the authentication is to occur, can be included in the options.

If the command is successful it indicates that you can setup the directory and the TDGSS configuration files for directory authentication and authorization of database users.

If the command fails, refer to Common Errors with Active Directory, ADAM, or AD LDS, to debug the problem.

$ ldapsearch -H ldap://esroot -b "" -s base -x -D  user_dn  -W namingContexts
Enter LDAP password:
namingContexts: DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Configuration,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: CN=Schema,CN=Configuration,DC=esrootdom,DC=esdev,
namingContexts: DC=DomainDnsZones,DC=esrootdom,DC=esdev,DC=tdat
namingContexts: DC=ForestDnsZones,DC=esrootdom,DC=esdev,DC=tdat
You can alternately use DIGEST-MD5 binding with the following ldapsearch command:
$ ldapsearch -H ldap://esroot -b "" -s base -Y DIGEST-MD5 -U user_dn  -W namingContexts