sasl/saslauthd.conf

Mon, 28 Jan 2013 17:37:18 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Mon, 28 Jan 2013 17:37:18 +0100
changeset 758
a2c6460cfb16
permissions
-rw-r--r--

Correct socket error reporting improvement with IPv6 portable code,
after helpful recommendation by Saúl Ibarra Corretgé on OSips devlist.

     1 ##
     2 ##  saslauthd.conf -- SASL Authentication Daemon Configuration
     3 ##
     5 #   white space separated list of LDAP servers
     6 ldap_servers: ldap://127.0.0.1
     8 #   authentication for restricted LDAP servers
     9 #ldap_bind_dn: cn=operator,ou=Profile,o=example.com
    10 #ldap_bind_pw: secret
    12 #   LDAP version to use (2|3)
    13 #ldap_version 3
    15 #   LDAP timeout
    16 #ldap_timeout 5
    18 #   LDAP aliases (search|find|always|never)
    19 ldap_deref: never
    21 #   follow LDAP referrals ?
    22 ldap_referrals: no
    24 #   restart LDAP I/O operations that fail ?
    25 ldap_restart: yes
    27 #   search scope (sub|one|base)
    28 #ldap_scope: sub
    30 #   starting point for a search
    31 ldap_search_base: MUST-SPECIFY
    33 #   authenticate against LDAP (bind|custom|fastbind)
    34 ldap_auth_method: bind
    36 #   Filter LDAP records, %u = username, %r = realm
    37 #   if ldap_auth_method is 'bind' the filter searches for the DN
    38 #   otherwise the filter searches for the userPassword attribute
    39 #ldap_filter: uid=%u
    41 #   debugging LDAP operation
    42 #ldap_debug 0
    44 #   require and verify server certificate
    45 #ldap_tls_check_peer:  no
    46 #ldap_tls_cacert_file:
    47 #ldap_tls_cacert_dir:
    49 #   list of SSL/TLS ciphers to allow
    50 #ldap_tls_ciphers: DEFAULT
    52 #   files containing client certificate and key
    53 #ldap_tls_cert:
    54 #ldap_tls_key:

mercurial