LDAP_LINK_DRYRUN_CONNECT
This metafunction takes a set of LDAP Link connection parameters as arguments and begins a dry run connection between the LDAP server and Vertica.
By providing an empty string for the LDAPLinkBindPswd
argument, you can also perform an anonymous bind if your LDAP server allows unauthenticated binds.
Syntax
LDAP_LINK_DRYRUN_CONNECT ( 'LDAPLinkURL', 'LDAPLinkBindDN', 'LDAPLinkBindPswd', '[LDAPLinkStartTLS]', '[LDAPLinkTLSReqCert]', '[LDAPLinkTLSCACert]', '[LDAPLinkTLSCADir]', )
Privileges
Superuser
Example
This tests the connection to an LDAP server at ldap://glw2k8-64.dc.com
with the DN CN=amir,OU=QA,DC=dc,DC=com
with the optional TLS parameters. This begins the connection with StartTLS but does not require a valid certificate from the client, and specifies certificate ~/ca.crt
.
=> SELECT LDAP_LINK_DRYRUN_CONNECT('ldap://glw2k8-64.dc.com','CN=amir,OU=QA,DC=dc,DC=com','password',1,'allow','~/ca.crt'); ldap_link_dryrun_connect --------------------------------------------------------------------------------- Dry Run Connect Completed. Query v_monitor.ldap_link_dryrun_events for results.
To check the results of the bind, query the system table LDAP_LINK_DRYRUN_EVENTS.
=> SELECT event_timestamp, event_type, entry_name, role_name, link_scope, search_base from LDAP_LINK_DRYRUN_EVENTS; event_timestamp | event_type | entry_name | link_scope | search_base ------------------------------+-----------------------+----------------------+------------+------------- 2019-12-09 15:41:43.589398-05 | BIND_STARTED | -------------------- | ---------- | ----------- 2019-12-09 15:41:43.590504-05 | BIND_FINISHED | -------------------- | ---------- | -----------