Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
P
puppet-freeradius
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Projets publics
puppet-freeradius
Commits
1610d8f6
Commit
1610d8f6
authored
Jan 30, 2017
by
Angel L. Mateo
Browse files
Options
Downloads
Patches
Plain Diff
Add a more complete list of parameters to freeradius::module::ldap
parent
2b6b45d5
No related branches found
No related tags found
No related merge requests found
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
manifests/module/ldap.pp
+61
-50
61 additions, 50 deletions
manifests/module/ldap.pp
templates/ldap.erb
+112
-18
112 additions, 18 deletions
templates/ldap.erb
types/sasl.pp
+7
-0
7 additions, 0 deletions
types/sasl.pp
types/scope.pp
+1
-0
1 addition, 0 deletions
types/scope.pp
with
181 additions
and
68 deletions
manifests/module/ldap.pp
+
61
−
50
View file @
1610d8f6
# Configure LDAP support for FreeRADIUS
# Configure LDAP support for FreeRADIUS
define
freeradius::module::ldap
(
define
freeradius::module::ldap
(
$identity
,
String
$basedn
,
$password
,
Enum
[
'present'
,
'absent'
]
$ensure
=
'present'
,
$basedn
,
$server
=
[
'localhost'
],
$server
=
[
'localhost'
],
$port
=
389
,
Integer
$port
=
389
,
$uses
=
0
,
Optional
[
String
]
$identity
=
undef
,
$idle
=
60
,
Optional
[
String
]
$password
=
undef
,
$probes
=
3
,
Optional
[
Freeradius
::
Sasl
]
$sasl
=
{},
$interval
=
3
,
Optional
[
String
]
$valuepair_attribute
=
undef
,
$timeout
=
10
,
Optional
[
Array
[
String
]]
$update
=
undef
,
$start
=
'${thread[pool].start_servers}'
,
Optional
[
Freeradius
::
Boolean
]
$edir
=
undef
,
$min
=
'${thread[pool].min_spare_servers}'
,
Optional
[
Freeradius
::
Boolean
]
$edir_autz
=
undef
,
$max
=
'${thread[pool].max_servers}'
,
String
$user_base_dn
=
"
\$
{..base_dn}"
,
$spare
=
'${thread[pool].max_spare_servers}'
,
String
$user_filter
=
'(uid=%{%{Stripped-User-Name}:-%{User-Name}})'
,
$ensure
=
'present'
,
Optional
[
Freeradius
::
Sasl
]
$user_sasl
=
{},
$starttls
=
'no'
,
Optional
[
Freeradius
::
Scope
]
$user_scope
=
undef
,
$cafile
=
undef
,
Optional
[
String
]
$user_sort_by
=
undef
,
$certfile
=
undef
,
Optional
[
String
]
$user_access_attribute
=
undef
,
$keyfile
=
undef
,
Optional
[
Freeradius
::
Boolean
]
$user_access_positive
=
undef
,
$requirecert
=
'allow'
,
String
$group_base_dn
=
"
\$
{..base_dn}"
,
String
$group_filter
=
'(objectClass=posixGroup)'
,
Optional
[
Freeradius
::
Scope
]
$group_scope
=
undef
,
Optional
[
String
]
$group_name_attribute
=
undef
,
Optional
[
String
]
$group_membership_filter
=
undef
,
String
$group_membership_attribute
=
'memberOf'
,
Optional
[
Freeradius
::
Boolean
]
$group_cacheable_name
=
undef
,
Optional
[
Freeradius
::
Boolean
]
$group_cacheable_dn
=
undef
,
Optional
[
String
]
$group_cache_attribute
=
undef
,
Optional
[
String
]
$group_attribute
=
undef
,
Optional
[
String
]
$profile_filter
=
undef
,
Optional
[
String
]
$profile_default
=
undef
,
Optional
[
String
]
$profile_attribute
=
undef
,
String
$client_base_dn
=
"
\$
{..base_dn}"
,
String
$client_filter
=
'(objectClass=radiusClient)'
,
Optional
[
Freeradius
::
Boolean
]
$client_scope
=
undef
,
Optional
[
Freeradius
::
Boolean
]
$read_clients
=
undef
,
Optional
[
Enum
[
'never'
,
'searching'
,
'finding'
,
'always'
]]
$dereference
=
undef
,
Freeradius
::
Boolean
$chase_referrals
=
'yes'
,
Freeradius
::
Boolean
$rebind
=
'yes'
,
Freeradius
::
Boolean
$use_referral_credentials
=
'no'
,
Optional
[
Freeradius
::
Boolean
]
$session_tracking
=
undef
,
Integer
$timeout
=
10
,
Integer
$timelimit
=
3
,
Integer
$idle
=
60
,
Integer
$probes
=
3
,
Integer
$interval
=
3
,
String
$ldap_debug
=
'0x0028'
,
Freeradius
::
Boolean
$starttls
=
'no'
,
Optional
[
String
]
$cafile
=
undef
,
Optional
[
String
]
$certfile
=
undef
,
Optional
[
String
]
$keyfile
=
undef
,
Optional
[
String
]
$random_file
=
undef
,
Enum
[
'never'
,
'allow'
,
'demand'
,
'hard'
]
$requirecert
=
'allow'
,
Freeradius
::
Integer
$start
=
'${thread[pool].start_servers}'
,
Freeradius
::
Integer
$min
=
'${thread[pool].min_spare_servers}'
,
Freeradius
::
Integer
$max
=
'${thread[pool].max_servers}'
,
Freeradius
::
Integer
$spare
=
'${thread[pool].max_spare_servers}'
,
Integer
$uses
=
0
,
Integer
$retry_delay
=
30
,
Integer
$lifetime
=
0
,
Integer
$idle_timeout
=
60
,
Float
$connect_timeout
=
3.0
,
)
{
)
{
$fr_package
=
$::freeradius::params::fr_package
$fr_package
=
$::freeradius::params::fr_package
$fr_service
=
$::freeradius::params::fr_service
$fr_service
=
$::freeradius::params::fr_service
...
@@ -42,36 +83,6 @@ define freeradius::module::ldap (
...
@@ -42,36 +83,6 @@ define freeradius::module::ldap (
default
=>
$serverarray
,
default
=>
$serverarray
,
}
}
# Fake booleans (FR uses yes/no instead of true/false)
unless
$starttls
in
[
'yes'
,
'no'
]
{
fail
(
'$starttls must be yes or no'
)
}
# Validate multiple choice options
unless
$requirecert
in
[
'never'
,
'allow'
,
'demand'
,
'hard'
]
{
fail
(
'$requirecert must be one of never, allow, demand, hard'
)
}
# Validate integers
unless
is_integer
(
$port
)
{
fail
(
'$port must be an integer'
)
}
unless
is_integer
(
$uses
)
{
fail
(
'$uses must be an integer'
)
}
unless
is_integer
(
$idle
)
{
fail
(
'$idle must be an integer'
)
}
unless
is_integer
(
$probes
)
{
fail
(
'$probes must be an integer'
)
}
unless
is_integer
(
$interval
)
{
fail
(
'$interval must be an integer'
)
}
unless
is_integer
(
$timeout
)
{
fail
(
'$timeout must be an integer'
)
}
# Generate a module config, based on ldap.conf
# Generate a module config, based on ldap.conf
file
{
"
${fr_modulepath}
/
${name}
"
:
file
{
"
${fr_modulepath}
/
${name}
"
:
ensure
=>
$ensure
,
ensure
=>
$ensure
,
...
...
This diff is collapsed.
Click to expand it.
templates/ldap.erb
+
112
−
18
View file @
1610d8f6
...
@@ -26,8 +26,12 @@ ldap <%= @name %> {
...
@@ -26,8 +26,12 @@ ldap <%= @name %> {
# Administrator account for searching and possibly modifying.
# Administrator account for searching and possibly modifying.
# If using SASL + KRB5 these should be commented out.
# If using SASL + KRB5 these should be commented out.
<%-
if
@identity
-%>
identity = '
<%=
@identity
%>
'
identity = '
<%=
@identity
%>
'
password = '
<%=
@password
%>
'
<%-
end
-%>
<%-
if
@password
-%>
password =
<%=
@password
%>
<%-
end
-%>
# Unless overridden in another section, the dn from which all
# Unless overridden in another section, the dn from which all
# searches will start from.
# searches will start from.
...
@@ -56,12 +60,21 @@ ldap <%= @name %> {
...
@@ -56,12 +60,21 @@ ldap <%= @name %> {
sasl {
sasl {
# SASL mechanism
# SASL mechanism
# mech = 'PLAIN'
# mech = 'PLAIN'
<%-
if
@sasl
.
has_key?
(
'mech'
)
-%>
mech = '
<%=
@sasl
[
'mech'
]
%>
'
<%-
end
-%>
# SASL authorisation identity to proxy.
# SASL authorisation identity to proxy.
# proxy = 'autz_id'
# proxy = 'autz_id'
<%-
if
@sasl
.
has_key?
(
'proxy'
)
-%>
proxy = '
<%=
@sasl
[
'proxy'
]
%>
'
<%-
end
-%>
# SASL realm. Used for kerberos.
# SASL realm. Used for kerberos.
# realm = 'example.org'
# realm = 'example.org'
<%-
if
@sasl
.
has_key?
(
'realm'
)
-%>
realm = '
<%=
@sasl
[
'realm'
]
%>
'
<%-
end
-%>
}
}
#
#
...
@@ -82,6 +95,9 @@ ldap <%= @name %> {
...
@@ -82,6 +95,9 @@ ldap <%= @name %> {
# If the value is wrapped in double quotes it
# If the value is wrapped in double quotes it
# will be xlat expanded.
# will be xlat expanded.
# valuepair_attribute = 'radiusAttribute'
# valuepair_attribute = 'radiusAttribute'
<%-
if
@valuepair_attribute
-%>
valuepair_attribute =
<%=
@valuepair_attribute
%>
<%-
end
-%>
#
#
# Mapping of LDAP directory attributes to RADIUS dictionary attributes.
# Mapping of LDAP directory attributes to RADIUS dictionary attributes.
...
@@ -110,6 +126,11 @@ ldap <%= @name %> {
...
@@ -110,6 +126,11 @@ ldap <%= @name %> {
# Note: LDAP attribute names should be single quoted unless you want
# Note: LDAP attribute names should be single quoted unless you want
# the name to be derived from an xlat expansion, or an attribute ref.
# the name to be derived from an xlat expansion, or an attribute ref.
#
#
<%-
if
@update
-%>
update {
<%=
@update
.
join
(
"
\n
"
)
%>
}
<%-
else
-%>
update {
update {
control:Password-With-Header += 'userPassword'
control:Password-With-Header += 'userPassword'
# control:NT-Password := 'ntPassword'
# control:NT-Password := 'ntPassword'
...
@@ -125,15 +146,22 @@ ldap <%= @name %> {
...
@@ -125,15 +146,22 @@ ldap <%= @name %> {
request: += 'radiusRequestAttribute'
request: += 'radiusRequestAttribute'
reply: += 'radiusReplyAttribute'
reply: += 'radiusReplyAttribute'
}
}
<%-
end
-%>
# Set to yes if you have eDirectory and want to use the universal
# Set to yes if you have eDirectory and want to use the universal
# password mechanism.
# password mechanism.
# edir = no
# edir = no
<%-
if
@edir
-%>
edir =
<%=
@edir
%>
<%-
end
-%>
# Set to yes if you want to bind as the user after retrieving the
# Set to yes if you want to bind as the user after retrieving the
# Cleartext-Password. This will consume the login grace, and
# Cleartext-Password. This will consume the login grace, and
# verify user authorization.
# verify user authorization.
# edir_autz = no
# edir_autz = no
<%-
if
@edir_autz
-%>
edir_autz =
<%=
@edir_autz
%>
<%-
end
-%>
# Note: set_auth_type was removed in v3.x.x
# Note: set_auth_type was removed in v3.x.x
# Equivalent functionality can be achieved by adding the following
# Equivalent functionality can be achieved by adding the following
...
@@ -151,11 +179,11 @@ ldap <%= @name %> {
...
@@ -151,11 +179,11 @@ ldap <%= @name %> {
#
#
user {
user {
# Where to start searching in the tree for users
# Where to start searching in the tree for users
base_dn = "
${..
base_dn
}
"
base_dn = "
<%=
@user_
base_dn
%>
"
# Filter for user objects, should be specific enough
# Filter for user objects, should be specific enough
# to identify a single user object.
# to identify a single user object.
filter = "
(uid=%{%{Stripped-User-Name}:-%{User-Name}})
"
filter = "
<%=
@user_filter
%>
"
# SASL parameters to use for user binds
# SASL parameters to use for user binds
#
#
...
@@ -169,16 +197,28 @@ ldap <%= @name %> {
...
@@ -169,16 +197,28 @@ ldap <%= @name %> {
sasl {
sasl {
# SASL mechanism
# SASL mechanism
# mech = 'PLAIN'
# mech = 'PLAIN'
<%-
if
@user_sasl
.
has_key?
(
'mech'
)
-%>
mech = '
<%=
@user_sasl
[
'mech'
]
%>
'
<%-
end
-%>
# SASL authorisation identity to proxy.
# SASL authorisation identity to proxy.
# proxy =
&
User-Name
# proxy =
&
User-Name
<%-
if
@user_sasl
.
has_key?
(
'proxy'
)
-%>
proxy = '
<%=
@user_sasl
[
'proxy'
]
%>
'
<%-
end
-%>
# SASL realm. Used for kerberos.
# SASL realm. Used for kerberos.
# realm = 'example.org'
# realm = 'example.org'
<%-
if
@user_sasl
.
has_key?
(
'realm'
)
-%>
realm = '
<%=
@user_sasl
[
'realm'
]
%>
'
<%-
end
-%>
}
}
# Search scope, may be 'base', 'one', sub' or 'children'
# Search scope, may be 'base', 'one', sub' or 'children'
# scope = 'sub'
# scope = 'sub'
<%-
if
@user_scope
-%>
scope = '
<%=
@user_scope
%>
'
<%-
end
-%>
# Server side result sorting
# Server side result sorting
#
#
...
@@ -196,11 +236,17 @@ ldap <%= @name %> {
...
@@ -196,11 +236,17 @@ ldap <%= @name %> {
# If a search returns multiple user objects and sort_by is not
# If a search returns multiple user objects and sort_by is not
# set, the search will fail.
# set, the search will fail.
# sort_by = '-uid'
# sort_by = '-uid'
<%-
if
@user_sort_by
-%>
sort_by = '
<%=
@user_sort_by
%>
'
<%-
end
-%>
# If this is undefined, anyone is authorised.
# If this is undefined, anyone is authorised.
# If it is defined, the contents of this attribute
# If it is defined, the contents of this attribute
# determine whether or not the user is authorised
# determine whether or not the user is authorised
# access_attribute = 'dialupAccess'
# access_attribute = 'dialupAccess'
<%-
if
@user_access_attribute
-%>
access_attribute = '
<%=
@user_access_attribute
%>
'
<%-
end
-%>
# Control whether the presence of 'access_attribute'
# Control whether the presence of 'access_attribute'
# allows access, or denys access.
# allows access, or denys access.
...
@@ -225,6 +271,9 @@ ldap <%= @name %> {
...
@@ -225,6 +271,9 @@ ldap <%= @name %> {
#
#
# Will result in the user being locked out.
# Will result in the user being locked out.
# access_positive = yes
# access_positive = yes
<%-
if
@user_access_positive
-%>
access_positive =
<%=
@user_access_positive
%>
<%-
end
-%>
}
}
#
#
...
@@ -232,24 +281,33 @@ ldap <%= @name %> {
...
@@ -232,24 +281,33 @@ ldap <%= @name %> {
#
#
group {
group {
# Where to start searching in the tree for groups
# Where to start searching in the tree for groups
base_dn = "
${..
base_dn
}
"
base_dn = "
<%=
@group_
base_dn
%>
"
# Filter for group objects, should match all available
# Filter for group objects, should match all available
# group objects a user might be a member of.
# group objects a user might be a member of.
filter =
'(objectClass=posixGroup)'
filter =
"
<%=
@group_filter
%>
"
# Search scope, may be 'base', 'one', sub' or 'children'
# Search scope, may be 'base', 'one', sub' or 'children'
# scope = 'sub'
# scope = 'sub'
<%-
if
@group_scope
-%>
scope = '
<%=
@group_scope
%>
'
<%-
end
-%>
# Attribute that uniquely identifies a group.
# Attribute that uniquely identifies a group.
# Is used when converting group DNs to group
# Is used when converting group DNs to group
# names.
# names.
# name_attribute = cn
# name_attribute = cn
<%-
if
@group_name_attribute
-%>
name_attribute =
<%=
@group_name_attribute
%>
<%-
end
-%>
# Filter to find group objects a user is a member of.
# Filter to find group objects a user is a member of.
# That is, group objects with attributes that
# That is, group objects with attributes that
# identify members (the inverse of membership_attribute).
# identify members (the inverse of membership_attribute).
# membership_filter = "(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
# membership_filter = "(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
<%-
if
@group_membership_filter
-%>
membership_filter = "
<%=
@group_membership_filter
%>
"
<%-
end
-%>
# The attribute in user objects which contain the names
# The attribute in user objects which contain the names
# or DNs of groups a user is a member of.
# or DNs of groups a user is a member of.
...
@@ -257,7 +315,7 @@ ldap <%= @name %> {
...
@@ -257,7 +315,7 @@ ldap <%= @name %> {
# Unless a conversion between group name and group DN is
# Unless a conversion between group name and group DN is
# needed, there's no requirement for the group objects
# needed, there's no requirement for the group objects
# referenced to actually exist.
# referenced to actually exist.
membership_attribute = '
memberOf
'
membership_attribute = '
<%=
@group_membership_attribute
%>
'
# If cacheable_name or cacheable_dn are enabled,
# If cacheable_name or cacheable_dn are enabled,
# all group information for the user will be
# all group information for the user will be
...
@@ -274,17 +332,29 @@ ldap <%= @name %> {
...
@@ -274,17 +332,29 @@ ldap <%= @name %> {
# i.e. if your groups are specified as DNs then enable
# i.e. if your groups are specified as DNs then enable
# cacheable_dn else enable cacheable_name.
# cacheable_dn else enable cacheable_name.
# cacheable_name = 'no'
# cacheable_name = 'no'
<%-
if
@group_cacheable_name
-%>
cacheable_name = '
<%=
@group_cacheable_name
%>
'
<%-
end
-%>
# cacheable_dn = 'no'
# cacheable_dn = 'no'
<%-
if
@group_cacheable_dn
-%>
cacheable_dn = '
<%=
@group_cacheable_dn
%>
'
<%-
end
-%>
# Override the normal cache attribute (
<inst>
-LDAP-Group or
# Override the normal cache attribute (
<inst>
-LDAP-Group or
# LDAP-Group if using the default instance) and create a
# LDAP-Group if using the default instance) and create a
# custom attribute. This can help if multiple module instances
# custom attribute. This can help if multiple module instances
# are used in fail-over.
# are used in fail-over.
# cache_attribute = 'LDAP-Cached-Membership'
# cache_attribute = 'LDAP-Cached-Membership'
<%-
if
@group_cache_attribute
-%>
cache_attribute = '
<%=
@group_cache_attribute
%>
'
<%-
end
-%>
# Override the normal group comparison attribute name
# Override the normal group comparison attribute name
# (
<inst>
-LDAP-Group or LDAP-Group if using the default instance) .
# (
<inst>
-LDAP-Group or LDAP-Group if using the default instance) .
# group_attribute = "${.:instance}-${.:name}-Group"
# group_attribute = "${.:instance}-${.:name}-Group"
<%-
if
@group_attribute
-%>
group_attribute = '
<%=
@group_attribute
%>
'
<%-
end
-%>
}
}
#
#
...
@@ -295,6 +365,9 @@ ldap <%= @name %> {
...
@@ -295,6 +365,9 @@ ldap <%= @name %> {
profile {
profile {
# Filter for RADIUS profile objects
# Filter for RADIUS profile objects
# filter = '(objectclass=radiusprofile)'
# filter = '(objectclass=radiusprofile)'
<%-
if
@profile_filter
-%>
filter = '
<%=
@profile_filter
%>
'
<%-
end
-%>
# The default profile. This may be a DN or an attribute
# The default profile. This may be a DN or an attribute
# reference.
# reference.
...
@@ -302,6 +375,9 @@ ldap <%= @name %> {
...
@@ -302,6 +375,9 @@ ldap <%= @name %> {
#
&
User-Profile attribute to specify the default profile,
#
&
User-Profile attribute to specify the default profile,
# set this to
&
control:User-Profile.
# set this to
&
control:User-Profile.
# default = 'cn=radprofile,dc=example,dc=org'
# default = 'cn=radprofile,dc=example,dc=org'
<%-
if
@profile_default
-%>
default = '
<%=
@profile_default
%>
'
<%-
end
-%>
# The LDAP attribute containing profile DNs to apply
# The LDAP attribute containing profile DNs to apply
# in addition to the default profile above. These are
# in addition to the default profile above. These are
...
@@ -309,6 +385,9 @@ ldap <%= @name %> {
...
@@ -309,6 +385,9 @@ ldap <%= @name %> {
# attributes from the update section, are are applied
# attributes from the update section, are are applied
# if authorization is successful.
# if authorization is successful.
# attribute = 'radiusProfileDn'
# attribute = 'radiusProfileDn'
<%-
if
@profile_default
-%>
attribute = '
<%=
@profile_attribute
%>
'
<%-
end
-%>
}
}
#
#
...
@@ -316,15 +395,18 @@ ldap <%= @name %> {
...
@@ -316,15 +395,18 @@ ldap <%= @name %> {
#
#
client {
client {
# Where to start searching in the tree for clients
# Where to start searching in the tree for clients
base_dn = "
${..
base_dn
}
"
base_dn = "
<%=
@client_
base_dn
%>
"
#
#
# Filter to match client objects
# Filter to match client objects
#
#
filter = '
(objectClass=radiusClient)
'
filter = '
<%=
@client_filter
%>
'
# Search scope, may be 'base', 'one', 'sub' or 'children'
# Search scope, may be 'base', 'one', 'sub' or 'children'
# scope = 'sub'
# scope = 'sub'
<%-
if
@client_scope
-%>
scope = '
<%=
@client_scope
%>
'
<%-
end
-%>
#
#
# Sets default values (not obtained from LDAP) for new client entries
# Sets default values (not obtained from LDAP) for new client entries
...
@@ -367,6 +449,9 @@ ldap <%= @name %> {
...
@@ -367,6 +449,9 @@ ldap <%= @name %> {
# Load clients on startup
# Load clients on startup
# read_clients = no
# read_clients = no
<%-
if
@read_clients
-%>
read_clients =
<%=
@read_clients
%>
<%-
end
-%>
#
#
# Modify user object on receiving Accounting-Request
# Modify user object on receiving Accounting-Request
...
@@ -433,6 +518,9 @@ ldap <%= @name %> {
...
@@ -433,6 +518,9 @@ ldap <%= @name %> {
#
#
# LDAP_OPT_DEREF is set to this value.
# LDAP_OPT_DEREF is set to this value.
# dereference = 'always'
# dereference = 'always'
<%-
if
@dereference
-%>
dereference = '
<%=
@dereference
%>
'
<%-
end
-%>
#
#
# The following two configuration items control whether the
# The following two configuration items control whether the
...
@@ -441,15 +529,15 @@ ldap <%= @name %> {
...
@@ -441,15 +529,15 @@ ldap <%= @name %> {
# If you set these to 'no', then searches will likely return
# If you set these to 'no', then searches will likely return
# 'operations error', instead of a useful result.
# 'operations error', instead of a useful result.
#
#
chase_referrals =
yes
chase_referrals =
<%=
@chase_referrals
%>
rebind =
yes
rebind =
<%=
@rebind
%>
#
#
# On rebind, use the credentials from the rebind url instead
# On rebind, use the credentials from the rebind url instead
# of admin credentials used during the initial bind.
# of admin credentials used during the initial bind.
# Default 'no'
# Default 'no'
#
#
use_referral_credentials =
no
use_referral_credentials =
<%=
@use_referral_credentials
%>
#
#
# If 'yes', then include draft-wahl-ldap-session tracking
# If 'yes', then include draft-wahl-ldap-session tracking
...
@@ -461,6 +549,9 @@ ldap <%= @name %> {
...
@@ -461,6 +549,9 @@ ldap <%= @name %> {
# Default 'no'.
# Default 'no'.
#
#
# session_tracking = yes
# session_tracking = yes
<%-
if
@session_tracking
-%>
session_tracking =
<%=
@session_tracking
%>
<%-
end
-%>
# Seconds to wait for LDAP query to finish. default: 20
# Seconds to wait for LDAP query to finish. default: 20
res_timeout =
<%=
@timeout
%>
res_timeout =
<%=
@timeout
%>
...
@@ -469,7 +560,7 @@ ldap <%= @name %> {
...
@@ -469,7 +560,7 @@ ldap <%= @name %> {
# time limit). default: 20
# time limit). default: 20
#
#
# LDAP_OPT_TIMELIMIT is set to this value.
# LDAP_OPT_TIMELIMIT is set to this value.
srv_timelimit =
3
srv_timelimit =
<%=
@timelimit
%>
# LDAP_OPT_X_KEEPALIVE_IDLE
# LDAP_OPT_X_KEEPALIVE_IDLE
idle =
<%=
@idle
%>
idle =
<%=
@idle
%>
...
@@ -487,7 +578,7 @@ ldap <%= @name %> {
...
@@ -487,7 +578,7 @@ ldap <%= @name %> {
#
#
# default: 0x0000 (no debugging messages)
# default: 0x0000 (no debugging messages)
# Example:(LDAP_DEBUG_FILTER+LDAP_DEBUG_CONNS)
# Example:(LDAP_DEBUG_FILTER+LDAP_DEBUG_CONNS)
ldap_debug =
0x0028
ldap_debug =
<%=
@ldap_debug
%>
}
}
#
#
...
@@ -519,6 +610,9 @@ ldap <%= @name %> {
...
@@ -519,6 +610,9 @@ ldap <%= @name %> {
private_key_file =
<%=
@keyfile
%>
private_key_file =
<%=
@keyfile
%>
<%
end
-%>
<%
end
-%>
# random_file = /dev/urandom
# random_file = /dev/urandom
<%-
if
@random_file
-%>
random_file =
<%=
@random_file
%>
<%-
end
-%>
# Certificate Verification requirements. Can be:
# Certificate Verification requirements. Can be:
# 'never' (do not even bother trying)
# 'never' (do not even bother trying)
...
@@ -581,19 +675,19 @@ ldap <%= @name %> {
...
@@ -581,19 +675,19 @@ ldap <%= @name %> {
# The number of seconds to wait after the server tries
# The number of seconds to wait after the server tries
# to open a connection, and fails. During this time,
# to open a connection, and fails. During this time,
# no new connections will be opened.
# no new connections will be opened.
retry_delay =
30
retry_delay =
<%=
@retry_delay
%>
# The lifetime (in seconds) of the connection
# The lifetime (in seconds) of the connection
lifetime =
0
lifetime =
<%=
@lifetime
%>
# Idle timeout (in seconds). A connection which is
# Idle timeout (in seconds). A connection which is
# unused for this length of time will be closed.
# unused for this length of time will be closed.
idle_timeout =
60
idle_timeout =
<%=
@idle_timeout
%>
# Connection timeout (in seconds). The maximum amount of
# Connection timeout (in seconds). The maximum amount of
# time to wait for a new connection to be established.
# time to wait for a new connection to be established.
# Sets LDAP_OPT_NETWORK_TIMEOUT in libldap.
# Sets LDAP_OPT_NETWORK_TIMEOUT in libldap.
connect_timeout =
3.0
connect_timeout =
<%=
@connect_timeout
%>
# NOTE: All configuration settings are enforced. If a
# NOTE: All configuration settings are enforced. If a
# connection is closed because of 'idle_timeout',
# connection is closed because of 'idle_timeout',
...
...
This diff is collapsed.
Click to expand it.
types/sasl.pp
0 → 100644
+
7
−
0
View file @
1610d8f6
type
Freeradius
::
Sasl
=
Struct
[
{
mech
=>
Optional
[
String
],
proxy
=>
Optional
[
String
],
realm
=>
Optional
[
String
],
},
]
This diff is collapsed.
Click to expand it.
types/scope.pp
0 → 100644
+
1
−
0
View file @
1610d8f6
type
Freeradius
::
Scope
=
Enum
[
'base'
,
'one'
,
'sub'
,
'children'
]
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment