Managing users from external LDAP on Netezza Performance Server

If you want the users from external LDAP to access the Netezza Performance Server database, you need to add them manually and configure authentication.

Before you begin

  • The administrator must ensure that each user is also defined within the system catalog. The Netezza Performance Server usernames must match the usernames that are defined in the LDAP/AD server.
  • Make sure that you have a working communication between the host and the LDAP/AD server before you start the LDAP authentication process in the host container.

    You can cross-check connection by using ping <LDAP/AD server> or ssh <LDAP/AD server>.

  • Collect the following information from an LDAP administrator:
    Name Required Default value Description
    LDAP server Yes   Host on which LDAP is working.
    base Yes   Node of the LDAP tree in which LDAP users are searched. For example, OU=ForNetezza,DC=KSL,DC=lab.
    port Yes   Port on which LDAP server is listening. The default is 389 for non-SSL.
    BINDDN No   Full name of user that has access to base subtree on LDAP server. Must be specified whether anonymous access to LDAP server is not allowed. For example, "cn=netezza_user,cn=Users,dc=KSL,dc=lab".
    BINDPW No   Password for BINDDN user.
    ATTRNAME No “cn” LDAP attribute, which is used to define userid. Commonly used is 'sAMAccountName'. A unique account name, for example jkowalski.
  • Verify server name and port on which LDAP is running. To verify whether a port is blocked by firewall, you can run the following command.
    telnet <host_name> <port>
    
    ldapsearch -v -h <ldap_server> -b <base> -D <binddn> -p <port> -x -w <bindpw>
    
    Example command: ldapsearch -v -h <ldap_server> -p 389 -D "cn=admin,dc=somedomain,dc=com" -x -w adminpass