<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – LDAP bind methods</title>
    <link>/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/</link>
    <description>Recent content in LDAP bind methods on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Security-and-Authentication: Workflow for configuring LDAP bind</title>
      <link>/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/workflow-configuring-ldap-bind/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/workflow-configuring-ldap-bind/</guid>
      <description>
        
        
        &lt;p&gt;To configure your OpenText™ Analytics Database to authenticate clients using LDAP bind, follow these steps:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Obtain a service account. For information see the &lt;a href=&#34;https://msdn.microsoft.com/en-us/library/aa772152(v=vs.85).aspx&#34;&gt;LDAP product documentation&lt;/a&gt;.You cannot use the service account in the connection parameters for LDAP bind.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Compare the user&#39;s LDAP account name to their database username. For example, if John Smith&#39;s Active Directory (AD) sAMAccountName = jsmith, his database username must also be jsmith.&lt;/p&gt;
&lt;p&gt;However, the LDAP account does not have to match the database user name, as shown in the following example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE USER r1 IDENTIFIED BY &amp;#39;password&amp;#39;;
=&amp;gt; CREATE AUTHENTICATION ldap1  METHOD &amp;#39;ldap&amp;#39; HOST &amp;#39;172.16.65.177&amp;#39;;
=&amp;gt; ALTER AUTHENTICATION ldap1 SET HOST=
   &amp;#39;ldap://172.16.65.10&amp;#39;,basedn=&amp;#39;dc=dc,dc=com&amp;#39;,binddn_suffix=&amp;#39;,ou=unit2,dc=dc,dc=com&amp;#39;,binddn_prefix=&amp;#39;cn=use&amp;#39;;
=&amp;gt; GRANT AUTHENTICATION ldap1 TO r1;
\! ${TARGET}/bin/vsql -p $PGPORT -U r1 -w $LDAP_USER_PASSWD -h ${HOSTNAME} -c
   &amp;#34;select user_name, client_authentication_name from sessions;&amp;#34;
 user_name | client_authentication_name
-----------+----------------------------
 r1        | ldap
(1 row)
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Run &lt;code&gt;ldapsearch&lt;/code&gt; from a database node against your LDAP or AD server. Verify the connection to the server and identify the values of relevant fields. Running &lt;code&gt;ldapsearch&lt;/code&gt; helps you build the client authentication string needed to configure LDAP authentication.&lt;/p&gt;
&lt;p&gt;In the following example, &lt;code&gt;ldapsearch&lt;/code&gt; returns the CN, DN, and sAMAccountName fields (if they exist) for any user whose CN contains the username jsmith. This search succeeds only for LDAP servers that allow anonymous binding:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ ldapsearch -x -h 10.10.10.10 -b &amp;#34;ou=Vertica Users,dc=CompanyCorp,dc=com&amp;#34;
&amp;#39;(cn=jsmith*)&amp;#39; cn dn uid sAMAccountName
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;ldapsearch&lt;/code&gt; returns the following results. The relevant information for LDAP bind is in &lt;strong&gt;bold&lt;/strong&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# extended LDIF
#
# LDAPv3
# base &amp;lt;ou=Vertica Users,dc=CompanyCorp,dc=com&amp;gt; with scope subtree
# filter: (cn=jsmith*)
# requesting: cn dn uid sAMAccountName
#
# jsmith, Users, CompanyCorp.com
dn:&lt;span class=&#34;code-input&#34;&gt;cn=&lt;/span&gt;jsmith,ou=Vertica Users,dc=CompanyCorp,dc=com
cn: jsmith
uid: jsmith
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create a new authentication record based on the information from &lt;code&gt;ldapsearch&lt;/code&gt;. In the &lt;code&gt;ldapsearch&lt;/code&gt; entry, the CN is username jsmith, so you do not need to set it. The database automatically sets the CN to the username of the user who is trying to connect. The database uses that CN to bind against the LDAP server.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE AUTHENTICATION v_ldap_bind METHOD &amp;#39;ldap&amp;#39; HOST &amp;#39;0.0.0.0/0&amp;#39;;
=&amp;gt; GRANT AUTHENTICATION v_ldap_bind TO public;
=&amp;gt; ALTER AUTHENTICATION v_ldap_bind SET
host=&amp;#39;ldap://10.10.10.10/&amp;#39;,
basedn=&amp;#39;DC=CompanyCorp,DC=com&amp;#39;,
binddn_prefix=&amp;#39;&lt;span class=&#34;code-input&#34;&gt;cn=&lt;/span&gt;&amp;#39;,
binddn_suffix=&amp;#39;,&lt;span class=&#34;code-input&#34;&gt;OU=Vertica Users,DC=CompanyCorp,DC=com&lt;/span&gt;&amp;#39;;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more information see &lt;a href=&#34;../../../../../en/security-and-authentication/client-authentication/ldap-authentication/ldap-authentication-parameters/#LDAP Bin&#34;&gt;LDAP Bind Parameters&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Workflow for configuring LDAP search and bind</title>
      <link>/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/workflow-configuring-ldap-search-and-bind/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/ldap-authentication/ldap-bind-methods/workflow-configuring-ldap-search-and-bind/</guid>
      <description>
        
        
        &lt;p&gt;To configure your OpenText™ Analytics Database to authenticate clients using LDAP search and bind, follow these steps:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Obtain a service account. For information see the &lt;a href=&#34;https://msdn.microsoft.com/en-us/library/aa772152(v=vs.85).aspx&#34;&gt;LDAP product documentation&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;From a database node, run &lt;code&gt;ldapsearch&lt;/code&gt; against your LDAP or AD server. Verify the connection to the server, and identify the values of relevant fields. Running &lt;code&gt;ldapsearch&lt;/code&gt; helps you build the client authentication string needed to configure LDAP authentication.&lt;/p&gt;
&lt;p&gt;In the following example, &lt;code&gt;ldapsearch&lt;/code&gt; returns the CN, DN, and sAMAccountName fields (if they exist) for any user whose CN contains the username, John. This search succeeds only for LDAP servers that allow anonymous binding:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ ldapsearch -x -h 10.10.10.10 -b &amp;#39;OU=Vertica Users,DC=CompanyCorp,DC=com&amp;#39; -s sub -D
&amp;#39;CompanyCorp\jsmith&amp;#39; -W &amp;#39;(cn=John*)&amp;#39; cn dn uid sAMAccountName
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Review the results that &lt;code&gt;ldapsearch&lt;/code&gt; returns.The relevant information for search and bind is in bold:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# extended LDIF
#
# LDAPv3
# base &amp;lt;OU=Vertica Users,DC=CompanyCorp,DC=com&amp;gt; with scope subtree
# filter: (cn=John*)
# requesting: cn dn sAMAccountName
#
# John Smith, Vertica Users, CompanyCorp.com
dn: CN=jsmith,OU=Vertica Users,DC=CompanyCorp,DC=com
cn: Jsmith
sAMAccountName: jsmith
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create the client authentication record. The cn attribute contains the username you want—jsmith. Set your search attribute to the CN field so that the search finds the appropriate account.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE AUTHENTICATION v_ldap_bind_search METHOD &amp;#39;ldap&amp;#39; HOST &amp;#39;10.10.10.10&amp;#39;;
=&amp;gt; GRANT AUTHENTICATION v_ldap_bind_search TO public;
=&amp;gt; ALTER AUTHENTICATION v_ldap_bind_search SET
host=&amp;#39;ldap://10.10.10.10&amp;#39;,
basedn=&amp;#39;OU=Vertica,DC=CompanyCorp,DC=com&amp;#39;,
binddn=&amp;#39;CN=jsmith,OU=Vertica Users,DC=CompanyCorp,DC=com&amp;#39;,
bind_password=&amp;#39;password&amp;#39;,
search_attribute=&amp;#39;CN&amp;#39;;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more information see &lt;a href=&#34;../../../../../en/security-and-authentication/client-authentication/ldap-authentication/ldap-authentication-parameters/#LDAP Bin2&#34;&gt;LDAP Bind and Search Parameters&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
  </channel>
</rss>
