Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange
  3. DBMOVER Configuration File
  4. Netport Jobs
  5. PowerExchange Message Logs and Destination Overrides
  6. SMF Statistics Logging and Reporting
  7. PowerExchange Security
  8. Secure Sockets Layer Support
  9. PowerExchange Alternative Network Security
  10. PowerExchange Nonrelational SQL
  11. PowerExchange Globalization
  12. Using the PowerExchange ODBC Drivers
  13. PowerExchange Datatypes and Conversion Matrix
  14. Appendix A: DTL__CAPXTIMESTAMP Time Stamps
  15. Appendix B: PowerExchange Glossary

PowerExchange LDAP User Authentication

PowerExchange LDAP User Authentication

You can use LDAP user authentication to authenticate client requests to a PowerExchange Listener or PowerExchange Logger for Linux, UNIX, and Windows instance that runs on a Linux, UNIX, or Windows system.
If you enable LDAP authentication, the PowerExchange Listener or PowerExchange Logger connects to an LDAP server to authenticate the LDAP enterprise user ID and password of the client that requests a connection to the PowerExchange Listener or PowerExchange Logger.
LDAP authentication in PowerExchange provides the following features:
  • LDAP user validation. PowerExchange can validate PowerExchange user credentials against an entry in LDAP.
  • Flexible search. DBMOVER configuration statements provide the ability to specify multiple LDAP search locations, search filters, search tree depth, and a login attribute to key against the PowerExchange user ID.
  • Failover. You can configure a list of LDAP servers in order of priority for failover, so that if a higher priority server is down, subsequent calls fail over to another server in the list.
  • Relational pass-through authentication. You can configure pass-through authentication for relational connections. Pass-through authentication delegates authentication to the underlying relational database.
  • LDAP with TLS. LDAP user authentication in PowerExchange supports the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols to protect against snooping, tampering, and man-in-the-middle security threats.

0 COMMENTS

We’d like to hear from you!