rectory.fortress.fortress-core.2.0.0-RC2.source-code.fortress.properties Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of fortress-core Show documentation
Show all versions of fortress-core Show documentation
Apache Fortress is a standards-based Access Management SDK that implements ANSI RBAC INCITS 359.
#
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
#
# Fortress slapd.conf default settings.
# Note: Directives that begin with '@' are substitution parms for Fortress' build.xml 'init-slapd' target.
# Host name and port of LDAP DIT:
host=${ldap.host}
port=${ldap.port}
# Options are openldap or apacheds (default):
ldap.server.type=${ldap.server.type}
# Audit only works if ldap.server.type == openldap:
disable.audit=${disable.audit}
# Used for SSL Connection to LDAP Server:
enable.ldap.ssl=${enable.ldap.ssl}
enable.ldap.ssl.debug=${enable.ldap.ssl.debug}
trust.store=${trust.store}
trust.store.password=${trust.store.password}
trust.store.onclasspath=${trust.store.onclasspath}
# Used to enable STARTTLS on Connection to LDAP Server
enable.ldap.starttls=false
# Used for SSL Demo with Tomcat:
key.store=${key.store}
key.store.password=${key.store.password}
# These credentials are used for read/write access to all nodes under suffix:
admin.user=${root.dn}
# LDAP admin root pass is encrypted using 'encrypt' target in build.xml:
admin.pw=${cfg.root.pw}
# This is min/max settings for LDAP administrator pool connections that have read/write access to all nodes under suffix:
min.admin.conn=${admin.min.conn}
max.admin.conn=${admin.max.conn}
# This is min/max connection pool settings for LDAP User authentication connection pool:
min.user.conn=${user.min.conn}
max.user.conn=${user.max.conn}
# These credentials are used for read/write access to all nodes under slapd access log suffix:
log.admin.user=${log.admin.user}
# For corresponding log user:
log.admin.pw=${log.admin.pw}
# This is min/max settings for LDAP connections to read slapo access log:
min.log.conn=${min.log.conn}
max.log.conn=${max.log.conn}
# This node contains fortress properties stored on behalf of connecting LDAP clients:
config.realm=DEFAULT
config.root=ou=Config,${suffix}
# enable this to see trace statements when connection pool allocates new connections:
debug.ldap.pool=true
# Default for pool reconnect flag is false:
enable.pool.reconnect=true
crypto.prop=${crypto.prop}
ehcache.config.file=ehcache.xml
# If for any reason echcache must be DISABLED for DSD, make sure this parameter is set to 'true' which is the default. Otherwise performance penalty will be incurred during multi-role activations.
disable.dsd.cache=false
# This will override default LDAP manager implementations for the RESTful ones:
enable.mgr.impl.rest=${enable.mgr.impl.rest}
# Optional parameters needed when Fortress client is connecting with the Fortress Rest (rather than LDAP) server:
http.user=${http.user}
http.pw=${http.pw}
http.host=${http.host}
http.port=${http.port}
http.protocol=${http.protocol}
dao.connector=${ldap.client.type}
GroupTest=org.apache.directory.fortress.core.group.GroupAntTest
# These may be used to override default LDAP or REST with OTHER implementations:
#reviewmgr.implementation=org.apache.directory.fortress.core.rest.ReviewMgrOtherImpl
#adminmgr.implementation=org.apache.directory.fortress.core.rest.AdminMgrOtherImpl
#accessmgr.implementation=org.apache.directory.fortress.core.rest.AccessMgrOtherImpl
#delegated.adminmgr.implementation=org.apache.directory.fortress.core.rest.DelAdminMgrOtherImpl
#delegated.reviewmgr.implementation=org.apache.directory.fortress.core.rest.DelReviewMgrOtherImpl
#policymgr.implementation=org.apache.directory.fortress.core.rest.PwPolicyMgrOtherImpl
#delegated.accessmgr.implementation=org.apache.directory.fortress.core.rest.DelAccessMgrOtherImpl
#auditmgr.implementation=org.apache.directory.fortress.core.rest.AuditMgrOtherImpl
#configmgr.implementation=org.apache.directory.fortress.core.rest.ConfigMgrOtherImpl
# Default behaviour when creating a user with no password is to set userPassword set to an empty string.
#The Fortress API will not allow auth binding if password is empty string or null, but enabling this property will cause the userPassword field to not be created.
#user.creation.field.password.disable=false
#attribute to use for group properties
group.properties=ftProps