68 lines
3.8 KiB
Properties
68 lines
3.8 KiB
Properties
|
# LDAP authentication (and possibly attribute resolver) configuration
|
||
|
# Note, this doesn't apply to the use of JAAS authentication via LDAP
|
||
|
|
||
|
## Authenticator strategy, either anonSearchAuthenticator, bindSearchAuthenticator, directAuthenticator, adAuthenticator
|
||
|
#idp.authn.LDAP.authenticator = anonSearchAuthenticator
|
||
|
|
||
|
## Connection properties ##
|
||
|
idp.authn.LDAP.ldapURL = ldap://localhost:10389
|
||
|
#idp.authn.LDAP.useStartTLS = true
|
||
|
# Time in milliseconds that connects will block
|
||
|
#idp.authn.LDAP.connectTimeout = PT3S
|
||
|
# Time in milliseconds to wait for responses
|
||
|
#idp.authn.LDAP.responseTimeout = PT3S
|
||
|
# Connection strategy to use when multiple URLs are supplied, either ACTIVE_PASSIVE, ROUND_ROBIN, RANDOM
|
||
|
#idp.authn.LDAP.connectionStrategy = ACTIVE_PASSIVE
|
||
|
|
||
|
## SSL configuration, either jvmTrust, certificateTrust, or keyStoreTrust
|
||
|
#idp.authn.LDAP.sslConfig = certificateTrust
|
||
|
## If using certificateTrust above, set to the trusted certificate's path
|
||
|
idp.authn.LDAP.trustCertificates = %{idp.home}/credentials/ldap-server.crt
|
||
|
## If using keyStoreTrust above, set to the truststore path
|
||
|
idp.authn.LDAP.trustStore = %{idp.home}/credentials/ldap-server.truststore
|
||
|
|
||
|
## Return attributes during authentication
|
||
|
idp.authn.LDAP.returnAttributes = passwordExpirationTime,loginGraceRemaining
|
||
|
|
||
|
## DN resolution properties ##
|
||
|
|
||
|
# Search DN resolution, used by anonSearchAuthenticator, bindSearchAuthenticator
|
||
|
# for AD: CN=Users,DC=example,DC=org
|
||
|
idp.authn.LDAP.baseDN = ou=people,dc=example,dc=org
|
||
|
#idp.authn.LDAP.subtreeSearch = false
|
||
|
idp.authn.LDAP.userFilter = (uid={user})
|
||
|
# bind search configuration
|
||
|
# for AD: idp.authn.LDAP.bindDN=adminuser@domain.com
|
||
|
idp.authn.LDAP.bindDN = uid=myservice,ou=system
|
||
|
|
||
|
# Format DN resolution, used by directAuthenticator, adAuthenticator
|
||
|
# for AD use idp.authn.LDAP.dnFormat=%s@domain.com
|
||
|
idp.authn.LDAP.dnFormat = uid=%s,ou=people,dc=example,dc=org
|
||
|
|
||
|
# pool passivator, either none, bind or anonymousBind
|
||
|
#idp.authn.LDAP.bindPoolPassivator = none
|
||
|
|
||
|
# LDAP attribute configuration, see attribute-resolver.xml
|
||
|
# Note, this likely won't apply to the use of legacy V2 resolver configurations
|
||
|
idp.attribute.resolver.LDAP.ldapURL = %{idp.authn.LDAP.ldapURL}
|
||
|
idp.attribute.resolver.LDAP.connectTimeout = %{idp.authn.LDAP.connectTimeout:PT3S}
|
||
|
idp.attribute.resolver.LDAP.responseTimeout = %{idp.authn.LDAP.responseTimeout:PT3S}
|
||
|
idp.attribute.resolver.LDAP.connectionStrategy = %{idp.authn.LDAP.connectionStrategy:ACTIVE_PASSIVE}
|
||
|
idp.attribute.resolver.LDAP.baseDN = %{idp.authn.LDAP.baseDN:undefined}
|
||
|
idp.attribute.resolver.LDAP.bindDN = %{idp.authn.LDAP.bindDN:undefined}
|
||
|
idp.attribute.resolver.LDAP.useStartTLS = %{idp.authn.LDAP.useStartTLS:true}
|
||
|
idp.attribute.resolver.LDAP.trustCertificates = %{idp.authn.LDAP.trustCertificates:undefined}
|
||
|
idp.attribute.resolver.LDAP.searchFilter = (uid=$resolutionContext.principal)
|
||
|
|
||
|
# LDAP pool configuration, used for both authn and DN resolution
|
||
|
#idp.pool.LDAP.minSize = 3
|
||
|
#idp.pool.LDAP.maxSize = 10
|
||
|
#idp.pool.LDAP.validateOnCheckout = false
|
||
|
#idp.pool.LDAP.validatePeriodically = true
|
||
|
#idp.pool.LDAP.validatePeriod = PT5M
|
||
|
#idp.pool.LDAP.validateDN =
|
||
|
#idp.pool.LDAP.validateFilter = (objectClass=*)
|
||
|
#idp.pool.LDAP.prunePeriod = PT5M
|
||
|
#idp.pool.LDAP.idleTime = PT10M
|
||
|
#idp.pool.LDAP.blockWaitTime = PT3S
|