TDGSS LdapClientUseTLS Property | Teradata Vantage - LdapClientUseTLS - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢

The LdapClientUseTls property specifies whether TLS protection is enabled. Teradata strongly recommends TLS protection when you use simple binds, including service binds.

This property must be set to yes to enable use of advanced TLS capabilities, such as certificate chain verification or mutual authentication.

Valid Settings

Setting Description
yes TLS protection is enabled
no (default) TLS protection is not enabled

Editing Guidelines

  • To set a value, you must manually add this property to the TDGSS configuration file for the needed mechanism(s). See About Editing Configuration Files.
  • Set the LdapClientUseTls property to yes to protect passwords on systems that use simple binds, including service binds. For information on binding, see LDAP Binding Options.
    Teradata recommends that you set the LdapClientUseTls property to yes on systems that use simple binds, even if the LdapServerName property specifies SSL protection, to maintain protection in the event someone later modifies the LdapServerName property to contain an non-SSL URL.
  • If you decide to use TLS protection, edit this property for all mechanisms that have the AuthorizationSupported property set to yes.
  • Edit this property on the database and on Unity, if used. Also see Coordinating Mechanism Property Values for Unity.

For detailed procedures on configuring TLS options, see SSL/TLS Protection Options.