Editing LDAP Server Configuration Object Attributes

Modify the existing attributes on an LDAP server. Any changes to the attributes are applied on subsequent connections. Any connection already open when the change is applied does not immediately reflect the change.

Prerequisites
Requires the MANAGE ANY LDAP SERVER system privilege.
Task
  1. Identify the existing SEARCH DN attributes to be modified.
    SEARCH DN Attributes
    Attribute Valid Values
    URL Specify the host (by name or by IP address), port number, and search to be performed to lookup the DN for a given user ID or enter NULL.
    Note: See Syntax and Parameters for the LDAP Server Configuration Object URL for supported syntax.
    ACCESS ACCOUNT The distinguished name for a user connecting to the external LDAP server.
    IDENTIFIED BY The password associated with the ACCESS ACCOUNT distinguished name.
    IDENTIFIED BY ENCRYPTED The encrypted password associated with the ACCESS ACCOUNT distinguished name.
  2. Identify the existing LDAPUA attributes to be modified.
    LDAPUA Attributes
    Attribute Valid Values
    SEARCH DN All attributes defined from SEARCH DN Attributes (see step 1).
    AUTHENTICATION URL Specify the host (by name or by IP address), port number, and search to be performed to lookup the DN for a given user ID or enter NULL.
    Note: See Syntax and Parameters for the LDAP Server Configuration Object URL for supported syntax.
    CONNECTION TIMEOUT Specifies the connection timeout value for both DN searches and authentication between SAP Sybase IQ and the external LDAP server. Specified in milliseconds, the default value is 10 seconds.
    CONNECTION RETRIES Specifies the number of retries on connections from SAP Sybase IQ to the LDAP server for both DN searches and authentication. The valid range of values is 1 – 60, with a default value of 3.
    TLS Defines whether the TLS or Secure LDAP protocol is used for connections to the LDAP server both for DN searches and authentication. The valid settings are ON and OFF (default).
    Note: See Enabling Secure LDAP and Setting the TLS Connection Trusted Relationship.
  3. Identify the server clauses to be used.
    Clause Description
    WITH SUSPEND Puts the LDAP server into maintenance mode
    WITH ACTIVATE Puts the LDAP server in a READY state and enables LDAP authentication
    WITH REFRESH Reinitializes LDAP user authentication
  4. Execute the ALTER LDAP SERVER command with the applicable parameters and clauses, for example:
ALTER LDAP SERVER apps_primary
AUTHENTICATION URL 'ldap://my_LDAPserver:1066/'
CONNECTION RETRIES 10
WITH ACTIVATE
Related concepts
Syntax and Parameters for the LDAP Server Configuration Object URL
Enabling Secure LDAP
Related tasks
Setting the TLS Connection Trusted Relationship
Validating an LDAP Server Configuration Object
Related reference
ALTER LDAP SERVER Statement