All Downloads are FREE. Search and download functionalities are using the official Maven repository.

rectory.fortress.fortress-core.2.0.0.source-code.fortress.properties Maven / Gradle / Ivy

Go to download

Apache Fortress is a standards-based Access Management SDK that implements ANSI RBAC INCITS 359.

There is a newer version: 3.0.0
Show newest version
#
#   Licensed to the Apache Software Foundation (ASF) under one
#   or more contributor license agreements.  See the NOTICE file
#   distributed with this work for additional information
#   regarding copyright ownership.  The ASF licenses this file
#   to you under the Apache License, Version 2.0 (the
#   "License"); you may not use this file except in compliance
#   with the License.  You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
#   Unless required by applicable law or agreed to in writing,
#   software distributed under the License is distributed on an
#   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
#   KIND, either express or implied.  See the License for the
#   specific language governing permissions and limitations
#   under the License.
#
# Fortress slapd.conf default settings.
# Note: Directives that begin with '@' are substitution parms for Fortress' build.xml 'init-slapd' target.

# Host name and port of LDAP DIT:
host=${ldap.host}
port=${ldap.port}

# Options are openldap or apacheds (default):
ldap.server.type=${ldap.server.type}

apacheds.pwpolicy.root=ou=passwordPolicies,ads-interceptorId=authenticationInterceptor,ou=interceptors,ads-directoryServiceId=default,ou=config

# Audit only works if ldap.server.type == openldap:
disable.audit=${disable.audit}

# Used for SSL Connection to LDAP Server:
enable.ldap.ssl=${enable.ldap.ssl}
enable.ldap.ssl.debug=${enable.ldap.ssl.debug}
trust.store=${trust.store}
trust.store.password=${trust.store.password}
trust.store.onclasspath=${trust.store.onclasspath}

# Used to enable STARTTLS on Connection to LDAP Server
enable.ldap.starttls=false

# Used for SSL Demo with Tomcat:
key.store=${key.store}
key.store.password=${key.store.password}

# These credentials are used for read/write access to all nodes under suffix:
admin.user=${root.dn}
# LDAP admin root pass is encrypted using 'encrypt' target in build.xml:
admin.pw=${cfg.root.pw}

# This is min/max settings for LDAP administrator pool connections that have read/write access to all nodes under suffix:
min.admin.conn=${admin.min.conn}
max.admin.conn=${admin.max.conn}

# This is min/max connection pool settings for LDAP User authentication connection pool:
min.user.conn=${user.min.conn}
max.user.conn=${user.max.conn}

# These credentials are used for read/write access to all nodes under slapd access log suffix:
log.admin.user=${log.admin.user}
# For corresponding log user:
log.admin.pw=${log.admin.pw}

# This is min/max settings for LDAP connections to read slapo access log:
min.log.conn=${min.log.conn}
max.log.conn=${max.log.conn}

# This node contains fortress properties stored on behalf of connecting LDAP clients:
config.realm=DEFAULT
config.root=ou=Config,${suffix}

# enable this to see trace statements when connection pool allocates new connections:
debug.ldap.pool=true

# Default for pool reconnect flag is false:
enable.pool.reconnect=true

crypto.prop=${crypto.prop}

ehcache.config.file=ehcache.xml

# If for any reason echcache must be DISABLED for DSD, make sure this parameter is set to 'true' which is the default.  Otherwise performance penalty will be incurred during multi-role activations.
disable.dsd.cache=false

# This will override default LDAP manager implementations for the RESTful ones:
enable.mgr.impl.rest=${enable.mgr.impl.rest}
# Optional parameters needed when Fortress client is connecting with the Fortress Rest (rather than LDAP) server:
http.user=${http.user}
http.pw=${http.pw}
http.host=${http.host}
http.port=${http.port}
http.protocol=${http.protocol}
dao.connector=${ldap.client.type}

GroupTest=org.apache.directory.fortress.core.group.GroupAntTest

# These may be used to override default LDAP or REST with OTHER implementations:
#reviewmgr.implementation=org.apache.directory.fortress.core.rest.ReviewMgrOtherImpl
#adminmgr.implementation=org.apache.directory.fortress.core.rest.AdminMgrOtherImpl
#accessmgr.implementation=org.apache.directory.fortress.core.rest.AccessMgrOtherImpl
#delegated.adminmgr.implementation=org.apache.directory.fortress.core.rest.DelAdminMgrOtherImpl
#delegated.reviewmgr.implementation=org.apache.directory.fortress.core.rest.DelReviewMgrOtherImpl
#policymgr.implementation=org.apache.directory.fortress.core.rest.PwPolicyMgrOtherImpl
#delegated.accessmgr.implementation=org.apache.directory.fortress.core.rest.DelAccessMgrOtherImpl
#auditmgr.implementation=org.apache.directory.fortress.core.rest.AuditMgrOtherImpl
#configmgr.implementation=org.apache.directory.fortress.core.rest.ConfigMgrOtherImpl

# Default behaviour when creating a user with no password is to set userPassword set to an empty string. 
#The Fortress API will not allow auth binding if password is empty string or null, but enabling this property will cause the userPassword field to not be created. 
#user.creation.field.password.disable=false

#attribute to use for group properties
group.properties=ftProps




© 2015 - 2024 Weber Informatics LLC | Privacy Policy