"Fossies" - the Fresh Open Source Software Archive

Member "nss-pam-ldapd-0.9.12/nslcd.conf" (15 Nov 2021, 4880 Bytes) of package /linux/privat/nss-pam-ldapd-0.9.12.tar.gz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) Generic config files source code syntax highlighting (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file. See also the latest Fossies "Diffs" side-by-side code changes report for "nslcd.conf": 0.9.11_vs_0.9.12.

    1 # This is the configuration file for the LDAP nameservice
    2 # switch library's nslcd daemon. It configures the mapping
    3 # between NSS names (see /etc/nsswitch.conf) and LDAP
    4 # information in the directory.
    5 # See the manual page nslcd.conf(5) for more information.
    6 
    7 # The user and group nslcd should run as.
    8 uid nslcd
    9 gid nslcd
   10 
   11 # The uri pointing to the LDAP server to use for name lookups.
   12 # Multiple entries may be specified. The address that is used
   13 # here should be resolvable without using LDAP (obviously).
   14 #uri ldap://127.0.0.1/
   15 #uri ldaps://127.0.0.1/
   16 #uri ldapi://%2fvar%2frun%2fldapi_sock/
   17 # Note: %2f encodes the '/' used as directory separator
   18 uri ldap://127.0.0.1/
   19 
   20 # The LDAP version to use (defaults to 3
   21 # if supported by client library)
   22 #ldap_version 3
   23 
   24 # The distinguished name of the search base.
   25 base dc=example,dc=com
   26 
   27 # The distinguished name to bind to the server with.
   28 # Optional: default is to bind anonymously.
   29 #binddn cn=proxyuser,dc=example,dc=com
   30 
   31 # The credentials to bind with.
   32 # Optional: default is no credentials.
   33 # Note that if you set a bindpw you should check the permissions of this file.
   34 #bindpw secret
   35 
   36 # The distinguished name to perform password modifications by root by.
   37 #rootpwmoddn cn=admin,dc=example,dc=com
   38 
   39 # The default search scope.
   40 #scope sub
   41 #scope one
   42 #scope base
   43 
   44 # Customize certain database lookups.
   45 #base   group  ou=Groups,dc=example,dc=com
   46 #base   passwd ou=People,dc=example,dc=com
   47 #base   shadow ou=People,dc=example,dc=com
   48 #scope  group  onelevel
   49 #scope  hosts  sub
   50 
   51 # Bind/connect timelimit.
   52 #bind_timelimit 30
   53 
   54 # Search timelimit.
   55 #timelimit 30
   56 
   57 # Idle timelimit. nslcd will close connections if the
   58 # server has not been contacted for the number of seconds.
   59 #idle_timelimit 3600
   60 
   61 # Use StartTLS without verifying the server certificate.
   62 #ssl start_tls
   63 #tls_reqcert never
   64 
   65 # CA certificates for server certificate verification
   66 #tls_cacertdir /etc/ssl/certs
   67 #tls_cacertfile /etc/ssl/ca.cert
   68 
   69 # Certificate Revocation List (CRL), requires TLS_CACERTDIR parameter to be set
   70 #tls_crlcheck all
   71 
   72 # Seed the PRNG if /dev/urandom is not provided
   73 #tls_randfile /var/run/egd-pool
   74 
   75 # SSL cipher suite
   76 # See man ciphers for syntax
   77 #tls_ciphers TLSv1
   78 
   79 # Client certificate and key
   80 # Use these, if your server requires client authentication.
   81 #tls_cert
   82 #tls_key
   83 
   84 # Mappings for Services for UNIX 3.5
   85 #filter passwd (objectClass=User)
   86 #map    passwd uid              msSFU30Name
   87 #map    passwd userPassword     msSFU30Password
   88 #map    passwd homeDirectory    msSFU30HomeDirectory
   89 #map    passwd homeDirectory    msSFUHomeDirectory
   90 #filter shadow (objectClass=User)
   91 #map    shadow uid              msSFU30Name
   92 #map    shadow userPassword     msSFU30Password
   93 #filter group  (objectClass=Group)
   94 #map    group  member           msSFU30PosixMember
   95 
   96 # Mappings for Services for UNIX 2.0
   97 #filter passwd (objectClass=User)
   98 #map    passwd uid              msSFUName
   99 #map    passwd userPassword     msSFUPassword
  100 #map    passwd homeDirectory    msSFUHomeDirectory
  101 #map    passwd gecos            msSFUName
  102 #filter shadow (objectClass=User)
  103 #map    shadow uid              msSFUName
  104 #map    shadow userPassword     msSFUPassword
  105 #map    shadow shadowLastChange pwdLastSet
  106 #filter group  (objectClass=Group)
  107 #map    group  member           posixMember
  108 
  109 # Mappings for Active Directory
  110 #pagesize 1000
  111 #referrals off
  112 #idle_timelimit 800
  113 #filter passwd (&(objectClass=user)(!(objectClass=computer))(uidNumber=*)(unixHomeDirectory=*))
  114 #map    passwd uid              sAMAccountName
  115 #map    passwd homeDirectory    unixHomeDirectory
  116 #map    passwd gecos            displayName
  117 #filter shadow (&(objectClass=user)(!(objectClass=computer))(uidNumber=*)(unixHomeDirectory=*))
  118 #map    shadow uid              sAMAccountName
  119 #map    shadow shadowLastChange pwdLastSet
  120 #filter group  (objectClass=group)
  121 
  122 # Alternative mappings for Active Directory
  123 # (replace the SIDs in the objectSid mappings with the value for your domain)
  124 #pagesize 1000
  125 #referrals off
  126 #idle_timelimit 800
  127 #filter passwd (&(objectClass=user)(objectClass=person)(!(objectClass=computer)))
  128 #map    passwd uid           cn
  129 #map    passwd uidNumber     objectSid:S-1-5-21-3623811015-3361044348-30300820
  130 #map    passwd gidNumber     objectSid:S-1-5-21-3623811015-3361044348-30300820
  131 #map    passwd homeDirectory "/home/$cn"
  132 #map    passwd gecos         displayName
  133 #map    passwd loginShell    "/bin/bash"
  134 #filter group (|(objectClass=group)(objectClass=person))
  135 #map    group gidNumber      objectSid:S-1-5-21-3623811015-3361044348-30300820
  136 
  137 # Mappings for AIX SecureWay
  138 #filter passwd (objectClass=aixAccount)
  139 #map    passwd uid              userName
  140 #map    passwd userPassword     passwordChar
  141 #map    passwd uidNumber        uid
  142 #map    passwd gidNumber        gid
  143 #filter group  (objectClass=aixAccessGroup)
  144 #map    group  cn               groupName
  145 #map    group  gidNumber        gid