All Downloads are FREE. Search and download functionalities are using the official Maven repository.

repository.conf.embedded-ldap.xml Maven / Gradle / Ivy

<?xml version="1.0" encoding="UTF-8"?>
<!--
  ~ Copyright (c) 2016, WSO2 Inc. (http://wso2.com) All Rights Reserved.
  ~
  ~ Licensed under the Apache License, Version 2.0 (the "License");
  ~ you may not use this file except in compliance with the License.
  ~ You may obtain a copy of the License at
  ~
  ~ http://www.apache.org/licenses/LICENSE-2.0
  ~
  ~ Unless required by applicable law or agreed to in writing, software
  ~ distributed under the License is distributed on an "AS IS" BASIS,
  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  ~ See the License for the specific language governing permissions and
  ~ limitations under the License.
  -->

<!--
	All carbon based products comes with a LDAP user store. 
	For this we use an embedded LDAP in carbon based products. 
	This file contains necessary configurations to control the behavior of embedded LDAP.
	You may use this file to enable, disable LDAP server, configure connection admin password, etc ...
	In addition to embedded-ldap server configurations this file also has Kerberos KDC (Key Distribution Center) 
	specific configurations.
-->

<EmbeddedLDAPConfig>

  <!-- 
	LDAP server configurations 
	==========================
	This section contains LDAP server specific configurations.

	Property                Usage
	=======                 ====
	enable                  If true the embedded LDAP server will start when server starts up.
				            Else embedded LDAP server will not start. Thus user has to use a different
				            user store.
	instanceid              An id given to the LDAP server instance.
	connectionPassword      The password of the admin. (uid=admin,ou=system)
	workingDirectory        Location where LDAP will store its schema files.
	AdminEntryObjectClass   Object class which encapsulate attributes needed by claims.
	allowAnonymousAccess    Should allow users to access LDAP server without credentials. Default false.
	accessControlEnabled    Should access control be enabled among partitions. Default true.
	saslHostName            Default host name to be used in SASL (Simple Authentication and Security Layer).
				            This property comes from apacheds implementation itself.
	saslPrincipalName       Default SASL principal name. Again this property also comes from apacheds implementation
				            itself.
  -->
  <EmbeddedLDAP>
    <Property name="enable">true</Property>
    <Property name="port">10389</Property>
    <Property name="instanceId">default</Property>
    <Property name="connectionPassword">admin</Property>
    <Property name="workingDirectory">.</Property>
    <Property name="AdminEntryObjectClass">identityPerson</Property>
    <Property name="allowAnonymousAccess">false</Property>
    <Property name="accessControlEnabled">true</Property>
    <Property name="denormalizeOpAttrsEnabled">false</Property>
    <Property name="maxPDUSize">2000000</Property>
    <Property name="saslHostName">localhost</Property>
    <Property name="saslPrincipalName">ldap/[email protected]</Property>
  </EmbeddedLDAP>

  <!-- 
	Default partition configurations
	================================ 
	When embedded LDAP server starts for the first time it will create a default partition. 
	Following properties configure values for the default partition.
	
	Property                        Usage
	=======                         =====
	id                              Each partition is given an id. The id given to the default paritition.
	realm                           Realm is the place where we store user principals and service principals.
                                        The name of the realm for default partition.
	kdcPassword                     This parameter is used when KDC (Key Distribution Center) is enabled. In apacheds
                                        KDC also has a server principal. This defines a password for KDC server principal.
	ldapServerPrinciplePassword     If LDAP server is also defined as a server principal, this will be the password.
	
  -->
  <DefaultPartition>
    <Property name="id">root</Property>
    <Property name="realm">WSO2.ORG</Property>    
    <Property name="kdcPassword">secret</Property>
    <Property name="ldapServerPrinciplePassword">randall</Property>
  </DefaultPartition>

  <!-- 
	Default partition admin configurations
	======================================
	In a multi-tenant scenario each tenant will have a separate partition. Thus tenant admin will be the partition admin.
	Following configurations define admin attributes for above created default partition.

	Property            Usage
	========            =====
	uid                 UID attribute for partition admin.
	commonName          The cn attribute for admin
	lastName            The sn attribute for admin
	email               The email attribute for admin
	passwordType        The password hashing mechanism. Following hashing mechanisms are available, "SHA", "MD5".
                        "PLAIN_TEXT" is also a valid value. If KDC is enabled password type will be enforced to be
                        plain text.
  -->
  <PartitionAdmin>
    <Property name="uid">admin</Property>
    <Property name="firstName">admin</Property>
    <Property name="lastName">admin</Property>
    <Property name="email">[email protected]</Property>
    <Property name="password">admin</Property>
    <Property name="passwordType">PLAIN_TEXT</Property>
  </PartitionAdmin>

  <!-- 
	Default partition admin's group configuration 
	=============================================
	Embedded LDAP is capable of keeping group information also.
	If LDAP groups are enabled in user store (usr-mgt.xml) group information will be
	recorded in a separate sub-context. Following configuration defines the group
	properties.

	Property                Usage
	=======                 =====
	adminRoleName		    The name of the role/group that admin should be included.
	groupNameAttribute	    The attribute which group name will be recorded.
	memberNameAttribute	    The attribute which memebers are recorded.
  -->
  <PartitionAdminGroup>
    <Property name="adminRoleName">admin</Property>
    <Property name="groupNameAttribute">cn</Property>
    <Property name="memberNameAttribute">member</Property>
  </PartitionAdminGroup>

    <!--
      KDC configurations
      =================
      Following configurations are applicable to KDC server. Generally, the KDC is only enabled in
      Identity Server. You may enable KDC server if you wish to do so. But if you dont have any Kerberos specific
      programs, it is recommended to disable KDC server.

      Property                          Usage
      =======                           =====
      name                              Name given to default KDC server.
      enabled                           If true a KDC server will start when starting LDAP server.
                                          Else a KDC server will not start with a LDAP server.
      protocol                          Default protocol to be used in KDC communication. Default is UDP.
      maximumTicketLifeTime             The maximum life time of a ticket issued by the KDC.
      maximumRenewableLifeTime          Life time which a ticket can be used by renewing it several times.
      preAuthenticationTimeStampEnabled Pre-authentication is a feature in latest Kerberos protocol.
                                          This property says whether to enable it or disable it.
    -->
  <KDCServer>
    <Property name="name">defaultKDC</Property>
    <Property name="enabled">false</Property>
    <Property name="protocol">UDP</Property>
    <Property name="host">localhost</Property>
    <Property name="port">10389</Property>
    <Property name="maximumTicketLifeTime">8640000</Property>
    <Property name="maximumRenewableLifeTime">604800000</Property>
    <Property name="preAuthenticationTimeStampEnabled">true</Property>
  </KDCServer>

</EmbeddedLDAPConfig>




© 2015 - 2025 Weber Informatics LLC | Privacy Policy