Notice: This Wiki is now read only and edits are no longer possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.
Difference between revisions of "SMILA/Documentation/LDAPSecurityResolver"
< SMILA | Documentation
(New page: == <tt>org.eclipse.smila.security.ldap.LDAPSecurityResolver</tt> == === Description === This is an implementation of the <tt>a org.eclipse.smila.security.SecurityResolver</tt> interface,...) |
m (→Description) |
||
Line 3: | Line 3: | ||
=== Description === | === Description === | ||
− | This is an implementation of the <tt> | + | This is an implementation of the <tt>org.eclipse.smila.security.SecurityResolver</tt> interface, allowing to resolve principals against an LDAP directory. |
The following LDAP object classes are interpreted as groups: | The following LDAP object classes are interpreted as groups: | ||
Line 11: | Line 11: | ||
*dynamicGroup | *dynamicGroup | ||
*dynamicGroupAux | *dynamicGroupAux | ||
− | |||
=== Configuration === | === Configuration === |
Revision as of 08:31, 9 April 2009
Contents
org.eclipse.smila.security.ldap.LDAPSecurityResolver
Description
This is an implementation of the org.eclipse.smila.security.SecurityResolver interface, allowing to resolve principals against an LDAP directory.
The following LDAP object classes are interpreted as groups:
- group
- groupOfNames
- groupOfUniqueNames
- dynamicGroup
- dynamicGroupAux
Configuration
Property | Constraint | Description |
---|---|---|
ldap.host | required | the ip adress or hostname of the LDAP directory server |
ldap.port | optional | the port of the LDAP directory server, default is 389 |
ldap.login | required | the full user DN used to log into the LDAP directory |
ldap.password | required | the password for the user configured in ldap.login |
ldap.base.dn | required | the base DN used as root folder to search principals in |
ldap.username.attribute | optional | the name of the LDAP property containing the user id, default is "cn" |
Example
ldap.properties for LDAPSecurityResolver
# connection settings ldap.host=localhost ldap.port=389 ldap.login=CN=admin ldap.password=secret #ldap server settings ldap.base.dn=DC=local ldap.username.attribute=cn