ldapauth.toml 1.2 KB

123456789101112131415161718192021222324252627282930313233
  1. [httpd]
  2. bind_address = ""
  3. bind_port = 9000
  4. # Path to a file used to store usernames and passwords for basic authentication. It can be generated using the Apache htpasswd tool
  5. auth_user_file = ""
  6. # If both the certificate and the private key are provided, the server will expect HTTPS connections
  7. certificate_file = ""
  8. certificate_key_file = ""
  9. [ldap]
  10. basedn = "dc=example,dc=com"
  11. bind_url = "ldap://127.0.0.1:389"
  12. bind_username = "cn=Directory Manager"
  13. bind_password = "YOUR_ADMIN_PASSWORD_HERE"
  14. search_filter = "(&(objectClass=nsPerson)(uid=%s))"
  15. # you can change the name of the search base attributes to adapt them to your schema but the order must remain the same
  16. search_base_attrs = [
  17. "dn",
  18. "homeDirectory",
  19. "uidNumber",
  20. "gidNumber",
  21. "nsSshPublicKey"
  22. ]
  23. default_uid = 0
  24. default_gid = 0
  25. force_default_uid = true
  26. force_default_gid = true
  27. # if true, ldaps accepts any certificate presented by the LDAP server and any host name in that certificate.
  28. # This should be used only for testing
  29. insecure_skip_verify = false
  30. # list of root CA to use for ldaps connections
  31. # If you use a self signed certificate is better to add the root CA to this list than set insecure_skip_verify to true
  32. ca_certificates = []