Skip to content
Snippets Groups Projects
Select Git revision
  • f85e6c0113b4f5f0617d24d459ebf18c46f338eb
  • master default protected
  • b24
  • ll-framework
  • ll-wf-finitions
  • ll-workflow
  • alc-scindage-donnees-pj
  • FJ_LL_Tbl_Contrat
  • alc-docker-node
  • ll-apiplatform
  • php84
  • ll-rgpd
  • b23
  • alc-filtre-type-intervenant
  • ll-sans-mdb5
  • formules-ancienne-infra
  • ll-formules
  • alc-intervenant-dmep
  • ll-suppr-v_vol-s
  • b20
  • ll-postgresql
  • 24.11
  • 24.10
  • 24.9
  • 24.8
  • 24.7
  • 24.6
  • 24.5
  • 24.4
  • 24.3
  • 24.2
  • 24.1
  • 24.0
  • 23.15
  • 24.0-beta19
  • 24.0-beta18
  • 24.0-beta17
  • 24.0-beta16
  • 24.0-beta15
  • 24.0-beta14
  • 24.0-beta13
41 results

config.local.php.default

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    control-socket 1.92 KiB
    # -*- text -*-
    ######################################################################
    #
    #	Control socket interface.
    #
    #	In the future, we will add username/password checking for
    #	connections to the control socket.  We will also add
    #	command authorization, where the commands entered by the
    #	administrator are run through a virtual server before
    #	they are executed.
    #
    #	For now, anyone who has permission to connect to the socket
    #	has nearly complete control over the server.  Be warned!
    #
    #	This functionality is NOT enabled by default.
    #
    #	See also the "radmin" program, which is used to communicate
    #	with the server over the control socket.
    #
    #	$Id$
    #
    ######################################################################
    listen {
    	#
    	#  Listen on the control socket.
    	#
    	type = control
    
    	#
    	#  Socket location.
    	#
    	#  This file is created with the server's uid and gid.
    	#  It's permissions are r/w for that user and group, and
    	#  no permissions for "other" users.  These permissions form
    	#  minimal security, and should not be relied on.
    	#
    	socket = ${run_dir}/${name}.sock
    
    	#
    	#  The following two parameters perform authentication and
    	#  authorization of connections to the control socket.
    	#
    	#  If not set, then ANYONE can connect to the control socket,	
    	#  and have complete control over the server.  This is likely
    	#  not what you want.
    	#
    	#  One, or both, of "uid" and "gid" should be set.  If set, the
    	#  corresponding value is checked.  Unauthorized users result
    	#  in an error message in the log file, and the connection is
    	#  closed.
    	#
    
    	#
    	#  Name of user that is allowed to connect to the control socket.
    	#
    	uid = radiusd
    
    	#
    	#  Name of group that is allowed to connect to the control socket.
    	#
    	gid = radiusd
    
    	#
    	#  Access mode.
    	#
    	#  This can be used to give *some* administrators access to
    	#  monitor the system, but not to change it.
    	#
    	#	ro = read only access (default)
    	#	rw = read/write access.
    	#
    	mode = rw
    }