Last active
August 29, 2015 14:04
-
-
Save dolph/18c70858941bf964922f to your computer and use it in GitHub Desktop.
Sample keystone configuration for identity-only LDAP (no assignments)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ldap] | |
# | |
# Options defined in keystone | |
# | |
# URL for connecting to the LDAP server. (string value) | |
#url=ldap://localhost | |
# User BindDN to query the LDAP server. (string value) | |
#user=<None> | |
# Password for the BindDN to query the LDAP server. (string | |
# value) | |
#password=<None> | |
# LDAP server suffix (string value) | |
#suffix=cn=example,cn=com | |
# If true, will add a dummy member to groups. This is required | |
# if the objectclass for groups requires the "member" | |
# attribute. (boolean value) | |
#use_dumb_member=false | |
# DN of the "dummy member" to use when "use_dumb_member" is | |
# enabled. (string value) | |
#dumb_member=cn=dumb,dc=nonexistent | |
# Delete subtrees using the subtree delete control. Only | |
# enable this option if your LDAP server supports subtree | |
# deletion. (boolean value) | |
#allow_subtree_delete=false | |
# The LDAP scope for queries, this can be either "one" | |
# (onelevel/singleLevel) or "sub" (subtree/wholeSubtree). | |
# (string value) | |
#query_scope=one | |
# Maximum results per page; a value of zero ("0") disables | |
# paging. (integer value) | |
#page_size=0 | |
# The LDAP dereferencing option for queries. This can be | |
# either "never", "searching", "always", "finding" or | |
# "default". The "default" option falls back to using default | |
# dereferencing configured by your ldap.conf. (string value) | |
#alias_dereferencing=default | |
# Sets the LDAP debugging level for LDAP calls. A value of 0 | |
# means that debugging is not enabled. This value is a | |
# bitmask, consult your LDAP documentation for possible | |
# values. (integer value) | |
#debug_level=<None> | |
# Override the system's default referral chasing behavior for | |
# queries. (boolean value) | |
#chase_referrals=<None> | |
# Search base for users. (string value) | |
#user_tree_dn=<None> | |
# LDAP search filter for users. (string value) | |
#user_filter=<None> | |
# LDAP objectclass for users. (string value) | |
#user_objectclass=inetOrgPerson | |
# LDAP attribute mapped to user id. (string value) | |
#user_id_attribute=cn | |
# LDAP attribute mapped to user name. (string value) | |
#user_name_attribute=sn | |
# LDAP attribute mapped to user email. (string value) | |
#user_mail_attribute=email | |
# LDAP attribute mapped to password. (string value) | |
#user_pass_attribute=userPassword | |
# LDAP attribute mapped to user enabled flag. (string value) | |
#user_enabled_attribute=enabled | |
# Bitmask integer to indicate the bit that the enabled value | |
# is stored in if the LDAP server represents "enabled" as a | |
# bit on an integer rather than a boolean. A value of "0" | |
# indicates the mask is not used. If this is not set to "0" | |
# the typical value is "2". This is typically used when | |
# "user_enabled_attribute = userAccountControl". (integer | |
# value) | |
#user_enabled_mask=0 | |
# Default value to enable users. This should match an | |
# appropriate int value if the LDAP server uses non-boolean | |
# (bitmask) values to indicate if a user is enabled or | |
# disabled. If this is not set to "True" the typical value is | |
# "512". This is typically used when "user_enabled_attribute = | |
# userAccountControl". (string value) | |
#user_enabled_default=True | |
# List of attributes stripped off the user on update. (list | |
# value) | |
#user_attribute_ignore=default_project_id,tenants | |
# LDAP attribute mapped to default_project_id for users. | |
# (string value) | |
#user_default_project_id_attribute=<None> | |
# Allow user creation in LDAP backend. (boolean value) | |
#user_allow_create=true | |
# Allow user updates in LDAP backend. (boolean value) | |
#user_allow_update=true | |
# Allow user deletion in LDAP backend. (boolean value) | |
#user_allow_delete=true | |
# If true, Keystone uses an alternative method to determine if | |
# a user is enabled or not by checking if they are a member of | |
# the "user_enabled_emulation_dn" group. (boolean value) | |
#user_enabled_emulation=false | |
# DN of the group entry to hold enabled users when using | |
# enabled emulation. (string value) | |
#user_enabled_emulation_dn=<None> | |
# List of additional LDAP attributes used for mapping | |
# additional attribute mappings for users. Attribute mapping | |
# format is <ldap_attr>:<user_attr>, where ldap_attr is the | |
# attribute in the LDAP entry and user_attr is the Identity | |
# API attribute. (list value) | |
#user_additional_attribute_mapping= | |
# Search base for groups. (string value) | |
#group_tree_dn=<None> | |
# LDAP search filter for groups. (string value) | |
#group_filter=<None> | |
# LDAP objectclass for groups. (string value) | |
#group_objectclass=groupOfNames | |
# LDAP attribute mapped to group id. (string value) | |
#group_id_attribute=cn | |
# LDAP attribute mapped to group name. (string value) | |
#group_name_attribute=ou | |
# LDAP attribute mapped to show group membership. (string | |
# value) | |
#group_member_attribute=member | |
# LDAP attribute mapped to group description. (string value) | |
#group_desc_attribute=description | |
# List of attributes stripped off the group on update. (list | |
# value) | |
#group_attribute_ignore= | |
# Allow group creation in LDAP backend. (boolean value) | |
#group_allow_create=true | |
# Allow group update in LDAP backend. (boolean value) | |
#group_allow_update=true | |
# Allow group deletion in LDAP backend. (boolean value) | |
#group_allow_delete=true | |
# Additional attribute mappings for groups. Attribute mapping | |
# format is <ldap_attr>:<user_attr>, where ldap_attr is the | |
# attribute in the LDAP entry and user_attr is the Identity | |
# API attribute. (list value) | |
#group_additional_attribute_mapping= | |
# CA certificate file path for communicating with LDAP | |
# servers. (string value) | |
#tls_cacertfile=<None> | |
# CA certificate directory path for communicating with LDAP | |
# servers. (string value) | |
#tls_cacertdir=<None> | |
# Enable TLS for communicating with LDAP servers. (boolean | |
# value) | |
#use_tls=false | |
# Valid options for tls_req_cert are demand, never, and allow. | |
# (string value) | |
#tls_req_cert=demand |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment