sssd-ldap.5.xml revision 24c3186d01d8d1c11832baab24ab3f0de121c666
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce<!DOCTYPE reference PUBLIC "-//OASIS//DTD DocBook V4.4//EN"
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <xi:include xmlns:xi="http://www.w3.org/2001/XInclude" href="include/upstream.xml" />
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <refmiscinfo class="manual">File Formats and Conventions</refmiscinfo>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <refpurpose>the configuration file for SSSD</refpurpose>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </refnamediv>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce This manual page describes the configuration of LDAP
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </citerefentry>.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Refer to the <quote>FILE FORMAT</quote> section of the
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <citerefentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </citerefentry> manual page for detailed syntax information.</para>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce You can configure SSSD to use more than one LDAP domain.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce LDAP back end supports id, auth, access and chpass providers. If you want
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce to authenticate against an LDAP server either TLS/SSL or LDAPS
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce is required. <command>sssd</command> <emphasis>does
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce not</emphasis> support authentication over an unencrypted channel.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce If the LDAP server is used only as an identity provider, an encrypted
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce channel is not needed. Please refer to <quote>ldap_access_filter</quote>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce config option for more information about using LDAP as an access provider.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce All of the common configuration options that apply to SSSD domains also apply
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce to LDAP domains. Refer to the <quote>DOMAIN SECTIONS</quote> section of the
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <citerefentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </citerefentry> manual page for full details.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <variablelist>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Specifies the comma-separated list of URIs of the LDAP servers to which
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce SSSD should connect in the order of preference. Refer to the
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <quote>FAILOVER</quote> section for more information on failover and server redundancy.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce If neither option is specified, service discovery is enabled. For more information,
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce refer to the <quote>SERVICE DISCOVERY</quote> section.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce The format of the URI must match the format defined in RFC 2732:
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce ldap[s]://<host>[:port]
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce For explicit IPv6 addresses, <host> must be enclosed in brackets []
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce example: ldap://[fc00::126:25]:389
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <term>ldap_chpass_uri, ldap_chpass_backup_uri (string)</term>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Specifies the comma-separated list of URIs of the LDAP servers to
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce which SSSD should connect in the order of preference
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce to change the password of a user. Refer to the
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <quote>FAILOVER</quote> section for more information
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce on failover and server redundancy.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce To enable service discovery
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce ldap_chpass_dns_service_name must be set.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: empty, i.e. ldap_uri is used.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The default base DN to use for
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce performing LDAP user operations.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Starting with SSSD 1.7.0, SSSD supports multiple
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce search bases using the syntax:
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce search_base[?scope?[filter][?search_base?scope?[filter]]*]
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The scope can be one of "base", "onelevel" or "subtree".
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The filter must be a valid LDAP search filter as
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce ldap_search_base = dc=example,dc=com
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce (which is equivalent to)
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce ldap_search_base = dc=example,dc=com?subtree?
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce ldap_search_base = cn=host_specific,dc=example,dc=com?subtree?(host=thishost)?dc=example.com?subtree?
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Note: It is unsupported to have multiple search
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce bases which reference identically-named objects
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce (for example, groups with the same name in two
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce different search bases). This will lead to
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce unpredictable behavior on client machines.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: If not set, the value of the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce defaultNamingContext or namingContexts attribute
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce from the RootDSE of the LDAP server is
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce used. If defaultNamingContext does not exist or
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce has an empty value namingContexts is used.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The namingContexts attribute must have a
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce single value with the DN of the search base of the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce LDAP server to make this work. Multiple values are
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce are not supported.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Specifies the Schema Type in use on the target LDAP
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Depending on the selected schema, the default
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce attribute names retrieved from the servers may vary.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The way that some attributes are handled may also differ.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Four schema types are currently supported:
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <itemizedlist>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </itemizedlist>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The main difference between these schema types is
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce how group memberships are recorded in the server.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce With rfc2307, group members are listed by name in the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce With rfc2307bis and IPA, group members are listed by DN
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce and stored in the <emphasis>member</emphasis> attribute.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The AD schema type sets the attributes to correspond with
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Active Directory 2008r2 values.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: rfc2307
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The default bind DN to use for
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce performing LDAP operations.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The type of the authentication token of the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce default bind DN.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The two mechanisms currently supported are:
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce obfuscated_password
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: password
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The authentication token of the default bind DN.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Only clear text passwords are currently supported.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The object class of a user entry in LDAP.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: posixAccount
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce The LDAP attribute that corresponds to the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce user's login name.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: uid
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that corresponds to the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: uidNumber
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that corresponds to the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce user's primary group id.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: gidNumber
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that corresponds to the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce user's gecos field.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: gecos
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that contains the name of the user's
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce home directory.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: homeDirectory
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce The LDAP attribute that contains the path to the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce user's default shell.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: loginShell
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that contains the UUID/GUID of
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce an LDAP user object.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: nsUniqueId
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that contains the objectSID of
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce an LDAP user object. This is usually only
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce necessary for ActiveDirectory servers.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: objectSid for ActiveDirectory, not set
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce for other servers.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce The LDAP attribute that contains timestamp of the
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce last modification of the parent object.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: modifyTimestamp
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <term>ldap_user_shadow_last_change (string)</term>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (date of the last
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce password change).
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: shadowLastChange
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (minimum password age).
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: shadowMin
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (maximum password age).
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: shadowMax
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (password warning
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: shadowWarning
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce When using ldap_pwd_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (password inactivity
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: shadowInactive
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=shadow or
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce ldap_account_expire_policy=shadow, this parameter
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce contains the name of an LDAP attribute corresponding
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <citerefentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </citerefentry> counterpart (account expiration date).
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: shadowExpire
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <term>ldap_user_krb_last_pwd_change (string)</term>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce When using ldap_pwd_policy=mit_kerberos, this
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce parameter contains the name of an LDAP attribute
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce storing the date and time of last password change
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce in kerberos.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: krbLastPwdChange
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <term>ldap_user_krb_password_expiration (string)</term>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce When using ldap_pwd_policy=mit_kerberos, this
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce parameter contains the name of an LDAP attribute
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce storing the date and time when current password
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: krbPasswordExpiration
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <term>ldap_user_ad_account_expires (string)</term>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce When using ldap_account_expire_policy=ad, this
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce parameter contains the name of an LDAP attribute
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce storing the expiration time of the account.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: accountExpires
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce </varlistentry>
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <term>ldap_user_ad_user_account_control (string)</term>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce When using ldap_account_expire_policy=ad, this
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce parameter contains the name of an LDAP attribute
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce storing the user account control bit field.
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce Default: userAccountControl
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce </varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce <varlistentry>
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce When using ldap_account_expire_policy=rhds or
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce equivalent, this parameter determines if access is
625bb2ddf15e8f305a53afa44e87f2146fa930afSimo Sorce allowed or not.
1dd679584241a0f9b29072c7eed1c5c5e4a577e4Simo Sorce Default: nsAccountLock
supports nested groups (e.g. RFC2307bis), then
by ldap.conf)
Default: not set, i.e. service discovery is disabled
use server side access control, i.e. the LDAP
ldap_uri = ldap://ldap.mydomain.org