LDAP_LINK_DRYRUN_CONNECT

This metafunction takes a set of LDAP Link connection parameters as arguments and begins a dry run connection between the LDAP server and Vertica.

By providing an empty string for the LDAPLinkBindPswd argument, you can also perform an anonymous bind if your LDAP server allows unauthenticated binds.

Syntax

LDAP_LINK_DRYRUN_CONNECT (
    'LDAPLinkURL',
    'LDAPLinkBindDN',
    'LDAPLinkBindPswd', 
    '[LDAPLinkStartTLS]', 
    '[LDAPLinkTLSReqCert]', 
    '[LDAPLinkTLSCACert]', 
    '[LDAPLinkTLSCADir]', 
)

Privileges

Superuser

Example

This tests the connection to an LDAP server at ldap://glw2k8-64.dc.com with the DN CN=amir,OU=QA,DC=dc,DC=com with the optional TLS parameters. This begins the connection with StartTLS but does not require a valid certificate from the client, and specifies certificate ~/ca.crt.

=> SELECT LDAP_LINK_DRYRUN_CONNECT('ldap://glw2k8-64.dc.com','CN=amir,OU=QA,DC=dc,DC=com','password',1,'allow','~/ca.crt');
				
				ldap_link_dryrun_connect
---------------------------------------------------------------------------------
Dry Run Connect Completed. Query v_monitor.ldap_link_dryrun_events for results.

To check the results of the bind, query the system table LDAP_LINK_DRYRUN_EVENTS.

=> SELECT event_timestamp, event_type, entry_name, role_name, link_scope, search_base from LDAP_LINK_DRYRUN_EVENTS;
        event_timestamp       |       event_type      |      entry_name      | link_scope | search_base        
------------------------------+-----------------------+----------------------+------------+-------------
2019-12-09 15:41:43.589398-05 | BIND_STARTED          | -------------------- | ---------- | -----------
2019-12-09 15:41:43.590504-05 | BIND_FINISHED         | -------------------- | ---------- | -----------

See Also