VALIDATE LDAP SERVER Statement

Validates changes to the settings of existing LDAP server configuration objects before applying them.

Quick Links:

Go to Parameters

Go to Examples

Go to Usage

Go to Standards

Go to Permissions

Syntax

VALIDATE LDAP SERVER [ ldapua-server-name | ldapua-server-attribs  ]
   [ CHECK userid [ user-dn-string ] ]

ldapua-server-attribs 
   SEARCH DN 
            URL { ‘URL_string’ | NULL } 
            | ACCESS ACCOUNT { ‘DN_string’ | NULL } 
            | IDENTIFIED BY ( ‘password’ | NULL } 
            | IDENTIFIED BY ENCRYPTED { encrypted-password | NULL }

   | AUTHENTICATION URL { ‘URL_string’ | NULL } 
   | CONNECTION TIMEOUT timeout_value 
   | CONNECTION RETRIES retry_value 
   | TLS { ON | OFF } 

Parameters

(back to top)

Examples

(back to top)

Usage

(back to top)

This statement is useful for an administrator when setting up a new server to use LDAP user authentication, and for diagnosing problems between the LDAP server configuration object and the external LDAP server. Any connection made by the VALIDATE LDAP SERVER statement is temporary and is closed by the end of the statement.

When validating the LDAP server configuration object by name, definitions from prior CREATE LDAP SERVER and ALTER LDAP SERVER statements are used. Alternately, when ldapua-server-attributes are specified instead of the LDAP server configuration object name, the specified attributes are validated. When ldapua-server-attributes are specified, the URLs are parsed to identify syntax errors, and statement processing stops is a syntax error is detected.

Whether using an LDAP server configuration object name or a successfully parsed set of ldapua-server-attributes, a connection to the external LDAP server is attempted. If the parameter ACCESS ACCOUNT and a password are specified, the values are used to establish the connection to the SEARCH DN URL. This is the SEARCH DN URL, ACCESS ACCOUNT, and ACCESS ACCOUNT password.

When using the optional CHECK clause, the userID is used in the search to validate the existence of the user on the external LDAP server.  When the expected DN value for a given user is known, the value can be specified, and is compared with the result of the search to determine success or failure.

Standards

(back to top)

ANSI SQL–Compliance level: Transact-SQL extension.

Permissions

(back to top)

Requires the MANAGE ANY LDAP SERVER system privilege.