-
Notifications
You must be signed in to change notification settings - Fork 0
/
.env
80 lines (66 loc) · 2.53 KB
/
.env
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
# main configuration file
# Domain name
DOMAIN=wso2.com
# Debug option
DEBUG=true
#################################### openldap ###########################
#loglevel Logging description
#-1 enable all debugging
#0 no debugging
#1 trace function calls
#2 debug packet handling
#4 heavy trace debugging
#8 connection management
#16 print out packets sent and received
#32 search filter processing
#64 configuration file processing
#128 access control list processing
#256 stats log connections/operations/results
#512 stats log entries sent
#1024 print communication with shell backends
#2048 print entry parsing debugging
#The loglevel directive uses a decimal bit value so to set more that one logging level you need to add the decimal numbers as in the following examples:
#loglevel 255 or loglevel -1
# sets 1, 2, 4, 8, 16, 32, 64 and 128
#loglevel 2176
# 2048 + 128
#loglevel 296
# 256 + 32 + 8
LDAP_LOG_LEVEL=-1
LDAP_ORGANISATION=LSF
LDAP_DOMAIN=wso2.com
LDAP_BASE_DN=dc=wso2,dc=com
LDAP_ADMIN_PASSWORD=admin
LDAP_CONFIG_PASSWORD=config
#LDAP_READONLY_USER=true
#LDAP_READONLY_USER_USERNAME=readonly
#LDAP_READONLY_USER_PASSWORD=readonly
LDAP_RFC2307BIS_SCHEMA=false
LDAP_BACKEND=mdb
LDAP_TLS=false
#LDAP_TLS_CRT_FILENAME=ldap.crt
#LDAP_TLS_KEY_FILENAME=ldap.key
#LDAP_TLS_CA_CRT_FILENAME=ca.crt
#LDAP_TLS_ENFORCE=false
#LDAP_TLS_CIPHER_SUITE=SECURE256:-VERS-SSL3.0
#LDAP_TLS_PROTOCOL_MIN=3.1
#OpenLDAP user parameters
CN=admin
DC1=wso2
DC2=com
DNPASS=admin
OU=Users
OU=Groups
#LDAP_TLS_VERIFY_CLIENT is set to demand by default so the clients must provide a certificate signed by the ldap trusted ca authorities.
#Possible values are : never | allow | try | demand
#Note try will disable client authentication - if you ident do use that you might want to check all client certs are signed properly
#and CA certs are imported to your ldap server trust store.
LDAP_TLS_VERIFY_CLIENT=try
LDAP_REPLICATION=false
#LDAP_REPLICATION_CONFIG_SYNCPROV=binddn=cn=admin,cn=config bindmethod=simple credentials=$LDAP_CONFIG_PASSWORD searchbase=cn=config type=refreshAndPersist retry=60 + timeout=1 starttls=critical
#LDAP_REPLICATION_DB_SYNCPROV=binddn=cn=admin,$LDAP_BASE_DN bindmethod=simple credentials=$LDAP_ADMIN_PASSWORD searchbase=$LDAP_BASE_DN type=refreshAndPersist interval=00:00:00:10 retry=60 + timeout=1 starttls=critical
#LDAP_REPLICATION_HOSTS=#PYTHON2BASH:['ldap://172.19.0.22','ldap://openldap']
KEEP_EXISTING_CONFIG=true
LDAP_REMOVE_CONFIG_AFTER_SETUP=true
LDAP_SSL_HELPER_PREFIX=ldap
##################################### END #################################