ldap.conf - Online Manual Page Of Unix/Linux

  Command: man perldoc info search(apropos)

WebSearch:
Our Recommended Sites:
  • Printer Ink
Full-Featured Editor
 

LDAP.CONF(5)                                                                         LDAP.CONF(5)



NAME
       ldap.conf, .ldaprc - ldap configuration file

SYNOPSIS
       /etc/openldap/ldap.conf, .ldaprc

DESCRIPTION
       If the environment variable LDAPNOINIT is defined, all defaulting is disabled.

       The  ldap.conf  configuration  file is used to set system-wide defaults to be applied when
       running ldap clients.

       Users may create an optional configuration file, ldaprc or .ldaprc, in their  home  direc-
       tory which will be used to override the system-wide defaults file.  The file ldaprc in the
       current working directory is also used.


       Additional configuration files can be specified using the LDAPCONF and LDAPRC  environment
       variables.   LDAPCONF  may  be  set to the path of a configuration file.  This path can be
       absolute or relative to the current working directory.  The LDAPRC, if defined, should  be
       the basename of a file in the current working directory or in the user's home directory.

       Environmental  variables may also be used to augment the file based defaults.  The name of
       the variable is the option name with an added prefix of LDAP.  For example, to define BASE
       via the environment, set the variable LDAPBASE to the desired value.

       Some options are user-only.  Such options are ignored if present in the ldap.conf (or file
       specified by LDAPCONF).

OPTIONS
       The different configuration options are:

       URI  ...>
              Specifies the URI(s) of an LDAP server(s) to which the LDAP library should connect.
              The  URI  scheme  may  be either ldapor ldaps which refer to LDAP over TCP and LDAP
              over SSL (TLS) respectively.  Each server's name can be specified as a domain-style
              name or an IP address literal.  Optionally, the server's name can followed by a ':'
              and the port number the LDAP server is listening on.  If no  port  number  is  pro-
              vided, the default port for the scheme is used (389 for ldap://, 636 for ldaps://).
              A space separated list of URIs may be provided.

       BASE 
              Specifies the default base DN to use when performing  ldap  operations.   The  base
              must be specified as a Distinguished Name in LDAP format.

       BINDDN 
              Specifies  the default bind DN to use when performing ldap operations.  The bind DN
              must be specified as a Distinguished Name in LDAP  format.   This  is  a  user-only
              option.

       HOST  ...>
              Specifies  the  name(s)  of an LDAP server(s) to which the LDAP library should con-
              nect.  Each server's name can be specified as a domain-style name or an IP  address
              and  optionally  followed by a ':' and the port number the ldap server is listening
              on.  A space separated list of hosts may be provided.  HOST is deprecated in  favor
              of URI.

       PORT 
              Specifies  the  default port used when connecting to LDAP servers(s).  The port may
              be specified as a number.  PORT is deprecated in favor of URI.

       SIZELIMIT 
              Specifies a size limit to use when performing searches.  The  number  should  be  a
              non-negative integer.  SIZELIMIT of zero (0) specifies unlimited search size.

       TIMELIMIT 
              Specifies  a  time  limit  to use when performing searches.  The number should be a
              non-negative integer.  TIMELIMIT of zero (0) specifies unlimited search time to  be
              used.

       DEREF 
              Specifies  how alias dereferencing is done when performing a search. The  can
              be specified as one of the following keywords:

              never  Aliases are never dereferenced. This is the default.

              searching
                     Aliases are dereferenced in subordinates of the  base  object,  but  not  in
                     locating the base object of the search.

              finding
                     Aliases are only dereferenced when locating the base object of the search.

              always Aliases  are  dereferenced both in searching and in locating the base object
                     of the search.

SASL OPTIONS
       If OpenLDAP is built with Simple Authentication and Security Layer support, there are more
       options you can specify.

       SASL_MECH 
              Specifies the SASL mechanism to use.  This is a user-only option.

       SASL_REALM 
              Specifies the SASL realm.  This is a user-only option.

       SASL_AUTHCID 
              Specifies the authentication identity.  This is a user-only option.

       SASL_AUTHZID 
              Specifies the proxy authorization identity.  This is a user-only option.

       SASL_SECPROPS 
              Specifies  Cyrus  SASL  security properties. The  can be specified as a
              comma-separated list of the following:

              none   (without any other properties) causes  the  properties  defaults  ("noanony-
                     mous,noplain") to be cleared.

              noplain
                     disables mechanisms susceptible to simple passive attacks.

              noactive
                     disables mechanisms susceptible to active attacks.

              nodict disables mechanisms susceptible to passive dictionary attacks.

              noanonymous
                     disables mechanisms which support anonymous login.

              forwardsec
                     requires forward secrecy between sessions.

              passcred
                     requires  mechanisms  which  pass  client credentials (and allows mechanisms
                     which can pass credentials to do so).

              minssf=
                     specifies the minimum acceptable security  strength  factor  as  an  integer
                     approximating  the  effective  key  length  used  for  encryption.  0 (zero)
                     implies no protection, 1 implies integrity protection only, 56 allows DES or
                     other  weak  ciphers,  112  allows  triple DES and other strong ciphers, 128
                     allows RC4, Blowfish and other modern strong ciphers.  The default is 0.

              maxssf=
                     specifies the maximum acceptable security strength factor as an integer (see
                     minssf description).  The default is INT_MAX.

              maxbufsize=
                     specifies  the  maximum  security layer receive buffer size allowed.  0 dis-
                     ables security layers.  The default is 65536.

TLS OPTIONS
       If OpenLDAP is built with Transport Layer Security support, there are more options you can
       specify.   These  options  are used when an ldaps:// URI is selected (by default or other-
       wise) or when the application negotiates TLS by issuing the LDAP Start TLS operation.

       TLS_CACERT 
              Specifies the file that contains certificates for all of the  Certificate  Authori-
              ties the client will recognize.

       TLS_CACERTDIR 
              Specifies  the path of a directory that contains Certificate Authority certificates
              in separate individual files. The TLS_CACERT is always used before TLS_CACERTDIR.

       TLS_CERT 
              Specifies the file that contains the  client  certificate.   This  is  a  user-only
              option.

       TLS_KEY 
              Specifies  the  file  that  contains  the  private key that matches the certificate
              stored in the TLS_CERT file. Currently, the private key must not be protected  with
              a  password,  so  it is of critical importance that the key file is protected care-
              fully. This is a user-only option.

       TLS_RANDFILE 
              Specifies the file to obtain random bits from when /dev/[u]random is not available.
              Generally  set to the name of the EGD/PRNGD socket.  The environment variable RAND-
              FILE can also be used to specify the filename.

       TLS_REQCERT 
              Specifies what checks to perform on server certificates in a TLS session,  if  any.
              The  can be specified as one of the following keywords:

              never  The client will not request or check any server certificate.

              allow  The server certificate is requested. If no certificate is provided, the ses-
                     sion proceeds normally. If a bad certificate is provided, it will be ignored
                     and the session proceeds normally.

              try    The server certificate is requested. If no certificate is provided, the ses-
                     sion proceeds normally. If a bad certificate is  provided,  the  session  is
                     immediately terminated.

              demand | hard
                     These  keywords  are  equivalent. The server certificate is requested. If no
                     certificate is provided, or a bad certificate is provided,  the  session  is
                     immediately terminated. This is the default setting.

ENVIRONMENT VARIABLES
       LDAPNOINIT
              disable all defaulting

       LDAPCONF
              path of a configuration file

       LDAPRC basename of ldaprc file in $HOME or $CWD

       LDAP
              Set  as from ldap.conf

FILES
       /etc/openldap/ldap.conf
              system-wide ldap configuration file

       $HOME/ldaprc, $HOME/.ldaprc
              user ldap configuration file

       $CWD/ldaprc
              local ldap configuration file

SEE ALSO
       ldap(3)

AUTHOR
       Kurt Zeilenga, The OpenLDAP Project

ACKNOWLEDGEMENTS
       OpenLDAP  is  developed and maintained by The OpenLDAP Project (http://www.openldap.org/).
       OpenLDAP is derived from University of Michigan LDAP 3.3 Release.



4.3 Berkeley Distribution                   2004/06/10                               LDAP.CONF(5)