forked from rabbitmq/rabbitmq-server
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathldap.conf
138 lines (106 loc) · 3.77 KB
/
ldap.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
# ## ----------------------------------------------------------------------------
# ## RabbitMQ LDAP Plugin
# ##
# ## See http://www.rabbitmq.com/ldap.html for details.
# ##
# ## ----------------------------------------------------------------------------
# =======================================
# LDAP section
# =======================================
# Should be defined in additional.conf maybe?
# {rabbitmq_auth_backend_ldap,
# [##
# ## Connecting to the LDAP server(s)
# ## ================================
# ##
# ## Specify servers to bind to. You *must* set this in order for the plugin
# ## to work properly.
# ##
# ## {servers, ["your-server-name-goes-here"]},
ldap.servers.myserver = your-server-name-goes-here
# ## Connect to the LDAP server using SSL
# ##
# ## {use_ssl, false},
ldap.use_ssl = false
# ## Specify the LDAP port to connect to
# ##
# ## {port, 389},
ldap.port = 389
# ## LDAP connection timeout, in milliseconds or 'infinity'
# ##
# ## {timeout, infinity},
ldap.timeout = infinity
# Or number
# ldap.timeout = 500
# ## Enable logging of LDAP queries.
# ## One of
# ## - false (no logging is performed)
# ## - true (verbose logging of the logic used by the plugin)
# ## - network (as true, but additionally logs LDAP network traffic)
# ##
# ## Defaults to false.
# ##
# ## {log, false},
ldap.log = false
# Also can be true or network
# ldap.log = true
# ldap.log = network
# ##
# ## Authentication
# ## ==============
# ##
# ## Pattern to convert the username given through AMQP to a DN before
# ## binding
# ##
# ## {user_dn_pattern, "cn=${username},ou=People,dc=example,dc=com"},
ldap.user_dn_pattern = cn=${username},ou=People,dc=example,dc=com
# ## Alternatively, you can convert a username to a Distinguished
# ## Name via an LDAP lookup after binding. See the documentation for
# ## full details.
# ## When converting a username to a dn via a lookup, set these to
# ## the name of the attribute that represents the user name, and the
# ## base DN for the lookup query.
# ##
# ## {dn_lookup_attribute, "userPrincipalName"},
# ## {dn_lookup_base, "DC=gopivotal,DC=com"},
ldap.dn_lookup_attribute = userPrincipalName
ldap.dn_lookup_base = DC=gopivotal,DC=com
# ## Controls how to bind for authorisation queries and also to
# ## retrieve the details of users logging in without presenting a
# ## password (e.g., SASL EXTERNAL).
# ## One of
# ## - as_user (to bind as the authenticated user - requires a password)
# ## - anon (to bind anonymously)
# ## - {UserDN, Password} (to bind with a specified user name and password)
# ##
# ## Defaults to 'as_user'.
# ##
# ## {other_bind, as_user},
ldap.other_bind = as_user
# Or can be more complex:
# ldap.other_bind.user_dn = User
# ldap.other_bind.password = Password
# If user_dn and password defined - other options is ignored.
# -----------------------------
# Too complex section of LDAP
# -----------------------------
# ##
# ## Authorisation
# ## =============
# ##
# ## The LDAP plugin can perform a variety of queries against your
# ## LDAP server to determine questions of authorisation. See
# ## http://www.rabbitmq.com/ldap.html#authorisation for more
# ## information.
# ## Set the query to use when determining vhost access
# ##
# ## {vhost_access_query, {in_group,
# ## "ou=${vhost}-users,ou=vhosts,dc=example,dc=com"}},
# ## Set the query to use when determining resource (e.g., queue) access
# ##
# ## {resource_access_query, {constant, true}},
# ## Set queries to determine which tags a user has
# ##
# ## {tag_queries, []}
# ]},
# -----------------------------