ldapsearch -D cn=orcladmin -w [ORCLADMIN PASSWORD] -p [LDAP_PORT] \
           -h [LDAP_URL] -b "cn=IAS,cn=Products,cn=OracleContext" \
           -s sub -v OrclresourceName=ORASSO | grep \
           orclpasswordattribute
Did this post help you in any way can you please leave a comment? This will motivate me writing more posts.
![Validate my Atom 1.0 feed [Valid Atom 1.0]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwsk0jkCpg60orkOvHQLaU5Kfnb72Q4Fv59o0rzOSTRknWzbGrBmh31ZjGOZdIt4C_wLVtBkWfFwG5eMfJQQ1E7MlTWYYZhWtFG6ndJemCWSu5DypAo_UP6u1Y20xCR_N-ksYP5OzvrUkE/s400/valid-atom.png)
Hey, you have scripted a good command , but it has reduced database safety . It can increase accessibility of wrong people for using database.
ReplyDeleteoracle ebs r12