Advertisement
kamal2222ahmed

c2s.xml

Mar 9th, 2018
274
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
XML 25.45 KB | None | 0 0
  1. <!-- c2s configuration -->
  2. <c2s>
  3.   <!-- Our ID on the network (default: c2s) -->
  4.   <id>c2s</id>
  5.  
  6.   <!-- The process ID file. Comment this out if you don't need to know
  7.       the process ID from outside the process (eg for control scripts) -->
  8.   <pidfile>/var/lib/jabberd/pid/c2s.pid</pidfile>
  9.  
  10.   <!-- Router connection configuration -->
  11.   <router>
  12.     <!-- IP/port the router is waiting for connections on -->
  13.     <ip>::1</ip>            <!-- default: 127.0.0.1 -->
  14.     <port>5347</port>             <!-- default: 5347 -->
  15.  
  16.     <!-- Username/password to authenticate as -->
  17.     <user>jabberd</user>          <!-- default: jabberd -->
  18.     <pass>90ab48c641e2aec7d96465f86048628cf60cf739</pass>           <!-- default: secret -->
  19.  
  20.     <!-- File containing an SSL certificate and private key to use when
  21.         setting up an encrypted channel with the router. From
  22.         SSL_CTX_use_certificate_chain_file(3): "The certificates must be
  23.         in PEM format and must be sorted starting with the subject's
  24.         certificate (actual client or server certificate), followed
  25.         by intermediate CA certificates if applicable, and ending
  26.         at the highest level (root) CA" (the latter one being optional).
  27.         If this is commented out, or the file can't be read, no attempt
  28.         will be made to establish an encrypted channel with the router. -->
  29.     <!--
  30.    <pemfile>/etc/jabberd/server.pem</pemfile>
  31.    -->
  32.  
  33.     <!-- Router connection retry -->
  34.     <retry>
  35.       <!-- If the connection to the router can't be established at
  36.           startup, we should try again this many times before exiting.
  37.           Use -1 to retry indefinitely. [default: 3] -->
  38.       <init>3</init>
  39.  
  40.       <!-- If we lost the connection to the router during normal
  41.           operation (ie we've successfully connected to the router in
  42.           the past), we should try to reconnect this many times before
  43.           exiting. Use -1 to retry indefinitely. [default: 3] -->
  44.       <lost>3</lost>
  45.  
  46.       <!-- Sleep for this many seconds before trying attempting a
  47.           reconnect. [default: 2] -->
  48.       <sleep>2</sleep>
  49.     </retry>
  50.   </router>
  51.  
  52.   <!-- Log configuration - type is "syslog", "file" or "stdout" -->
  53.   <log type="syslog">
  54.     <!-- If logging to syslog, this is the log ident -->
  55.     <ident>jabberd/c2s</ident>
  56.  
  57.     <!-- If logging to syslog, this is the log facility
  58.         (local0 - local7)                        [default: local3] -->
  59.     <facility>local3</facility>
  60.  
  61.     <!-- If logging to file, this is the filename of the logfile -->
  62.     <!--
  63.    <file>/var/lib/jabberd/log/c2s.log</file>
  64.    -->
  65.  
  66.     <!-- Filename of the debug logfile -->
  67.     <!--
  68.    <debug>/var/lib/jabberd/log/debug-${id}.log</debug>
  69.    -->
  70.   </log>
  71.  
  72.   <!-- Local network configuration -->
  73.   <local>
  74.     <!-- Who we identify ourselves as. This should correspond to the
  75.         ID (host) that the session manager thinks it is. You can
  76.         specify more than one to support virtual hosts, as long as you
  77.         have additional session manager instances on the network to
  78.         handle those hosts.
  79.  
  80.         You may leave the content of the <id/> empty to setup default
  81.         virtual host setup, that will be used for all present but not
  82.         configured otherwise SM domains.
  83.  
  84.         realm
  85.         attribute specifies the auth/reg or SASL authentication realm
  86.         for the host. If the attribute is not specified, the realm will
  87.         be selected by the SASL mechanism, or will be the same as the ID
  88.         itself. Be aware that users are assigned to a realm, not a host,
  89.         so two hosts in the same realm will have the same users. If no
  90.         realm is specified, it will be set to be the same as the ID.
  91.         If empty "" realm is specified, the PAM backend wil authenticate
  92.         using plain usernames, not JIDs.
  93.  
  94.         pemfile
  95.         attribute specifies the file containing a SSL certificate and
  96.         private key for client connections. If this is non existant,
  97.         clients will not be offered the STARTTLS stream extension
  98.         From SSL_CTX_use_certificate_chain_file(3):
  99.         "The certificates must be in PEM format and must be sorted
  100.         starting with the subject's certificate (actual client or server
  101.         certificate), followed by intermediate CA certificates if
  102.         applicable, and ending at the highest level (root) CA"
  103.         (the latter one being optional).
  104.  
  105.         verify-mode
  106.         SSL verify mode - see SSL_CTX_set_verify(3), mode parameter.
  107.         Sum of the following options:
  108.         SSL_VERIFY_NONE                 0x00
  109.                 SSL_VERIFY_PEER                 0x01
  110.                 SSL_VERIFY_FAIL_IF_NO_PEER_CERT 0x02
  111.                 SSL_VERIFY_CLIENT_ONCE          0x04
  112.                 Use 7 to require all clients to present _valid_ certificates.
  113.  
  114.  
  115.         cachain
  116.         SSL CA chain. Used to verify client certificates.
  117.         CA names published to client upon connection.
  118.  
  119.         require-starttls
  120.         If this attribute is set to any value, clients must do STARTTLS
  121.         before they can authenticate. Until the stream is encrypted,
  122.         all packets will be dropped.
  123.  
  124.         register-enable
  125.         Remove this attribute to disable account registrations.
  126.  
  127.         instructions
  128.         Human-readable instructions to be returned to client when
  129.         registration is requested.
  130.  
  131.         register-oob
  132.         URL to be attached as an alternative, out-of-band registration
  133.         method. Usually web-based http:// URL.
  134.  
  135.         password-change
  136.         Password change only. When registration is disabled, it may
  137.         still be useful to allow clients to change their password. If
  138.         you want this, add this attribute with any value, when you need
  139.         registration disabled.
  140.          -->
  141.     <id require-starttls="false" pemfile="/etc/pki/spacewalk/jabberd/server.pem" realm="" register-enable="true">gss-spacewalk-1-prod.aws.u.d.g</id>
  142.     <!--<id require-starttls="false" pemfile="/etc/pki/spacewalk/jabberd/server.pem" realm="" register-enable="true">gss-spacewalk-1-prod.aws.u.d.g</
  143. id>-->
  144.     <!--<id require-starttls="false" pemfile="/etc/pki/spacewalk/jabberd/server.pem" realm="" register-enable="true">spacewalk.u.d.g</id>-->
  145.     <!-- or
  146.    <id realm='company.int'
  147.        pemfile='/etc/jabberd/server.pem'
  148.        verify-mode='7'
  149.        cachain='/etc/jabberd/client_ca_certs.pem'
  150.        require-starttls='mu'
  151.        register-enable='mu'
  152.        instructions='Enter a username and password to register with this server.'
  153.        register-oob='http://example.org/register'
  154.        password-change='mu'
  155.    >example.net</id> -->
  156.     <!-- or the default host
  157.    <id password-change='mu' /> -->
  158.  
  159.     <!-- IP address to bind to (default: 0.0.0.0) -->
  160.     <ip>::</ip>
  161.  
  162.     <!-- Port to bind to, or 0 to disable unencrypted access to the
  163.         server (default: 5222) -->
  164.     <port>5222</port>
  165.  
  166.     <!-- Older versions of jabberd support encrypted client connections
  167.         via an additional listening socket on port 5223. If you want
  168.         this (required to allow pre-STARTTLS clients to do SSL),
  169.         uncomment this -->
  170.     <!--
  171.    <ssl-port>5223</ssl-port>
  172.    -->
  173.  
  174.     <!-- File containing an SSL certificate and private key for client
  175.         connections. From SSL_CTX_use_certificate_chain_file(3):
  176.         "The certificates must be in PEM format and must be sorted
  177.         starting with the subject's certificate (actual client or server
  178.         certificate), followed by intermediate CA certificates if
  179.         applicable, and ending at the highest level (root) CA"
  180.         (the latter one being optional).
  181.  
  182.         Note: This certificate is ONLY used for old style SSL
  183.         connections on port 5223 (pre-STARTTLS).  If you want to
  184.         use STARTTLS over the standard XMPP port 5222 then you
  185.         MUST specify the pemfile in the 'id' tag above. -->
  186.     <!--
  187.    <pemfile>/etc/jabberd/server.pem</pemfile>
  188.    -->
  189.  
  190.     <!-- SSL verify mode - see SSL_CTX_set_verify(3), mode parameter -->
  191.     <!--
  192.    <verify-mode>7</verify-mode>
  193.    -->
  194.  
  195.     <!-- SSL CA chain. Used to verify client certificates. CA names published to client upon connection -->
  196.     <!--
  197.    <cachain>/etc/jabberd/client_ca_certs.pem</cachain>
  198.    -->
  199.  
  200.     <!-- Forward incoming HTTP clients to a real HTTP server -->
  201.     <!--
  202.    <httpforward>http://www.jabber.org/</httpforward>
  203.    -->
  204.   </local>
  205.  
  206.   <!-- Input/output settings -->
  207.   <io>
  208.     <!-- Maximum number of file descriptors. This value sets an upper
  209.         limit on the number of users who may be logged in to this
  210.         server at a given time. Each user consumers one file
  211.         descriptor.
  212.  
  213.         Note that the number of possible connections will be slightly
  214.         less than this, because c2s itself can use up five on its own,
  215.         and auth/reg modules may need a few also. If the supply of
  216.         file descriptors is exhausted, new incoming connections will
  217.         be denied.
  218.  
  219.         Also note that this value only affects how many file descriptors
  220.         jabberd is able to handle internally. You may also need to
  221.         tell your operating system to allow jabberd to use more file
  222.         descriptors. On Linux this can be done using ulimit -n or by
  223.         changing the value of /proc/sys/fd/file-max.
  224.  
  225.         (default: 1024) -->
  226.     <max_fds>1024</max_fds>
  227.  
  228.     <!-- Rate limiting -->
  229.     <limits>
  230.       <!-- Maximum bytes per second - if more than X bytes are sent in Y
  231.           seconds, connection is throttled for Z seconds. The format
  232.           is:
  233.  
  234.             <bytes seconds='Y' throttle='Z'>X</bytes>
  235.  
  236.           Default Y is 1, default Z is 5. set X to 0 to disable. -->
  237.       <bytes>0</bytes>
  238.  
  239.       <!-- Maximum number of stanzas per second - if more than X stanzas
  240.           are sent in Y seconds, connection is throttled for Z seconds.
  241.           The format is:
  242.  
  243.             <stanzas seconds='Y' throttle='Z'>X</stanzas>
  244.  
  245.           Default Y 1, default Z is 5. Set X to 0 to disable -->
  246.       <stanzas>1000</stanzas>
  247.  
  248.       <!-- Maximum connects per second - if more than X connects are
  249.           attempted from a single IP in Y seconds, that IP is throttled
  250.           for Z seconds. The format is:
  251.  
  252.             <connects seconds='Y' throttle='Z'>X</connects>
  253.  
  254.           Default Y is 5, default Z is 5. set X to 0 to disable. -->
  255.       <connects>0</connects>
  256.  
  257.       <!-- Maximum stanza size - if more than given number of bytes
  258.           are read in one incoming stanza, the stream is closed
  259.           with policy-violation error.
  260.  
  261.           Set to 0 to disable.
  262.           Values less than 16384 might not work. -->
  263.       <stanzasize>65535</stanzasize>
  264.     </limits>
  265.  
  266.     <!-- Enable XEP-0138: Stream Compression -->
  267.     <!--
  268.    <compression/>
  269.    -->
  270.  
  271.     <!-- IP-based access controls. If a connection IP matches an allow
  272.         rule, the connection will be accepted. If a connecting IP
  273.         matches a deny rule, the connection will be refused. If the
  274.         connecting IP does not match any rules, or it matches both an
  275.         allow and a deny rule, the contents of the <order/> option
  276.         determines what happens. -->
  277.     <access>
  278.       <!-- Rule check order (default: allow,deny)
  279.  
  280.           allow,deny - Check allow rules, then check deny rules.
  281.                        Allow by default.
  282.           deny,allow - Check deny rules, then check allow rules.
  283.                        Deny by default. -->
  284.       <order>allow,deny</order>
  285.  
  286.       <!-- Allow a network. If the mask isn't specified, it defaults to
  287.           255.255.255.255 (ie allow onle the specified IP) -->
  288.       <!--
  289.      <allow ip='127.0.0.0' mask='255.0.0.0'/>
  290.      -->
  291.  
  292.       <!-- Allow a single host -->
  293.       <!--
  294.      <allow ip='12.34.56.78'/>
  295.      -->
  296.  
  297.       <!-- Deny a network or a host -->
  298.       <!--
  299.      <deny ip='127.0.0.1' mask='255.0.0.0'/>
  300.      <deny ip='87.65.43.21'/>
  301.      -->
  302.     </access>
  303.  
  304.     <!-- Timed checks -->
  305.     <check>
  306.       <!-- Interval between checks.
  307.  
  308.           Open client connections will be checked every n seconds, and
  309.           the following checks applied.
  310.  
  311.           0 disables all checks.                       (default: 0) -->
  312.       <interval>60</interval>
  313.  
  314.       <!-- Idle connection checks.
  315.  
  316.           Connections that have not sent data for longer than this many
  317.           seconds will be dropped.
  318.  
  319.           0 disables idle timeouts.                    (default: 0) -->
  320.       <idle>0</idle>
  321.  
  322.       <!-- Keepalives.
  323.  
  324.           Connections that have not sent data for longer than this many
  325.           seconds will have a single whitespace character sent to them.
  326.           This will force the TCP connection to be closed if they have
  327.           disconnected without us knowing about it.
  328.  
  329.           0 disables keepalives.                       (default: 0) -->
  330.       <keepalive>60</keepalive>
  331.  
  332.     </check>
  333.  
  334.   </io>
  335.  
  336.   <!-- Statistics -->
  337.   <stats>
  338.     <!-- file containing count of packets that went through -->
  339.     <!--
  340.    <packet>/var/lib/jabberd/stats/c2s.packets</packet>
  341.    -->
  342.   </stats>
  343.  
  344.   <!-- PBX integration -->
  345.   <pbx>
  346.     <!-- Commands named pipe path. Allows creating "fake" sessions
  347.         with given resource and status -->
  348.     <!--
  349.    <pipe>/var/lib/jabberd/run/pbx</pipe>
  350.    -->
  351.     <!-- Available commands:
  352.          START jid/resource [[priority ]status] [description]
  353.          STOP jid/resource [description]
  354.          where priority is integer between -128 and +127
  355.          and status is one of: CHAT, ONLINE, DND, AWAY, XA
  356.    -->
  357.   </pbx>
  358.  
  359.   <!-- see-other-host error stream redirection support
  360.       This will redirect connections to specified domains to other host:port
  361.       Usefull when migrating service and DNS change did not propagate yet.
  362.       Note that to_address should be RFC 3986 compliant. -->
  363.   <stream_redirect>
  364.     <!--
  365.    <redirect requested_domain="some.domain" to_address="other.hostname" to_port="5269" />
  366.    <redirect requested_domain="other.domain" to_address="other.host" to_port="1234" />
  367.    -->
  368.   </stream_redirect>
  369.  
  370.   <!-- Authentication/registration database configuration -->
  371.   <authreg>
  372.     <!-- Dynamic authreg modules path -->
  373.     <path>/usr/lib64/jabberd</path>
  374.  
  375.     <!-- Backend module to use -->
  376.     <module>db</module>
  377.  
  378.     <!-- Available authentication mechanisms -->
  379.     <mechanisms>
  380.  
  381.       <!-- These are the traditional Jabber authentication mechanisms.
  382.           Comment out any that you don't want to be offered to clients.
  383.           Note that if the auth/reg module does not support one of
  384.           these mechanisms, then it will not be offered regardless of
  385.           whether or not it is enabled here. -->
  386.       <traditional>
  387.         <plain/>
  388.         <digest/>
  389.       </traditional>
  390.  
  391.       <!-- SASL authentication mechanisms. Comment out any that you
  392.           don't want to be offered to clients. Again, if the auth/reg
  393.           module does not support one of these mechanisms, then it will
  394.           not be offered. -->
  395.       <sasl>
  396.         <plain/>
  397.         <digest-md5/>
  398.         <!--
  399.        <anonymous/>
  400.        <gssapi/>
  401.        -->
  402.       </sasl>
  403.  
  404.     </mechanisms>
  405.  
  406.     <!-- Additional mechanisms that are also available when the
  407.         connection is encrypted. Ie. when START-TLS had been
  408.         negotiated, or user connected on SSL-wrapped port. -->
  409.     <ssl-mechanisms>
  410.  
  411.       <!-- it's advisable that you disable plain in the above
  412.           <mechanisms/> section -->
  413.       <traditional>
  414.         <plain/>
  415.       </traditional>
  416.  
  417.       <sasl>
  418.         <plain/>
  419.         <external/>
  420.       </sasl>
  421.  
  422.     </ssl-mechanisms>
  423.  
  424.     <!-- SQLite driver configuration -->
  425.     <sqlite>
  426.       <!-- Database name -->
  427.       <dbname>/var/lib/jabberd/db/sqlite.db</dbname>
  428.  
  429.       <!-- Transacation support. If this is commented out, transactions
  430.           will be disabled. This might make database accesses faster,
  431.           but data may be lost if jabberd crashes. -->
  432.       <transactions/>
  433.  
  434.       <!-- SQLite busy-timeout in milliseconds. -->
  435.       <busy-timeout>2000</busy-timeout>
  436.  
  437.       <!-- Passwords in DB may be stored in plain or hashed format -->
  438.       <!-- NOTE: If you are using hashed passwords, the only auth
  439.                 method that will work is PLAIN.
  440.                 Make sure that you disabled others in 'mechanisms'
  441.                 sections of the config file. -->
  442.       <password_type>
  443.         <!-- only one may be enabled here -->
  444.         <plaintext/>
  445.         <!-- use crypt(3)ed passwords
  446.        <crypt/>
  447.        -->
  448.         <!-- use A1HASH passwords
  449.             This stores the MD5 digest of user:realm:password in the database
  450.        <a1hash/>
  451.        -->
  452.       </password_type>
  453.     </sqlite>
  454.  
  455.     <!-- MySQL module configuration -->
  456.     <mysql>
  457.       <!-- Database server host and port -->
  458.       <host>localhost</host>
  459.       <port>3306</port>
  460.  
  461.       <!-- Database name -->
  462.       <dbname>jabberd2</dbname>
  463.  
  464.       <!-- Database username and password -->
  465.       <user>jabberd2</user>
  466.       <pass>90ab48c641e2aec7d96465f86048628cf60cf739</pass>
  467.  
  468.       <!-- Passwords in DB may be stored in plain or hashed format -->
  469.       <!-- NOTE: If you are using hashed passwords, the only auth
  470.                 method that will work is PLAIN.
  471.                 Make sure that you disabled others in 'mechanisms'
  472.                 sections of the config file. -->
  473.       <password_type>
  474.         <!-- only one may be enabled here -->
  475.         <plaintext/>
  476.         <!-- use crypt(3)ed passwords
  477.        <crypt/>
  478.        -->
  479.         <!-- use A1HASH passwords
  480.                     This stores the MD5 digest of user:realm:password in the database
  481.        <a1hash/>
  482.        -->
  483.       </password_type>
  484.     </mysql>
  485.  
  486.     <!-- PostgreSQL module configuration -->
  487.     <pgsql>
  488.       <!-- PostgreSQL connection info.
  489.           For the rest of the options see
  490.           http://www.postgresql.org/docs/8.0/interactive/libpq.html -->
  491.       <conninfo>dbname=jabberd2 user=jabberd2 password=secret</conninfo>
  492.  
  493.       <!-- Alternatively you may set connection settings separately.
  494.           These are used only in absence of 'conninfo' -->
  495.  
  496.       <!-- Database server host and port -->
  497.       <host>localhost</host>
  498.       <port>5432</port>
  499.  
  500.       <!-- Database name -->
  501.       <dbname>jabberd2</dbname>
  502.  
  503.       <!-- Database schema -->
  504.       <schema>public</schema>
  505.  
  506.       <!-- Database username and password -->
  507.       <user>jabberd2</user>
  508.       <pass>90ab48c641e2aec7d96465f86048628cf60cf739</pass>
  509.  
  510.       <!-- Passwords in DB may be stored in plain or hashed format -->
  511.       <!-- NOTE: If you are using hashed passwords, the only auth
  512.                 method that will work is PLAIN.
  513.                 Make sure that you disabled others in 'mechanisms'
  514.                 sections of the config file. -->
  515.       <password_type>
  516.         <!-- only one may be enabled here -->
  517.         <plaintext/>
  518.         <!-- use crypt(3)ed passwords
  519.        <crypt/>
  520.        -->
  521.         <!-- use A1HASH passwords
  522.                     This stores the MD5 digest of user:realm:password in the database
  523.        <a1hash/>
  524.        -->
  525.       </password_type>
  526.     </pgsql>
  527.  
  528.     <!-- Oracle driver configuration -->
  529.     <oracle>
  530.       <!-- Database server host and port. -->
  531.       <host>localhost</host>
  532.       <port>1521</port>
  533.  
  534.       <!-- Database name -->
  535.       <dbname>jabberd2</dbname>
  536.  
  537.       <!-- Database username and password -->
  538.       <user>jabberd2</user>
  539.       <pass>90ab48c641e2aec7d96465f86048628cf60cf739</pass>
  540.     </oracle>
  541.  
  542.     <!-- Berkeley DB module configuration -->
  543.     <db>
  544.       <!-- Directory to store database files under -->
  545.       <path>/var/lib/jabberd/db</path>
  546.  
  547.       <!-- Synchronize the database to disk after each write. If you
  548.           disable this, database accesses may be faster, but data may
  549.           be lost if jabberd crashes. -->
  550.       <sync/>
  551.     </db>
  552.  
  553.     <!-- LDAPFULL module configuration -->
  554.     <ldapfull>
  555.       <!-- LDAP server host and port (default: 389) -->
  556.       <uri>ldap://localhost/ ldaps://ldap.example.com/</uri>
  557.  
  558.       <!-- DN to bind as for searches. If unspecified, the searches
  559.           will be done anonymously. -->
  560.       <!--
  561.      <binddn>cn=Directory Manager</binddn>
  562.      <bindpw>secret</bindpw>
  563.      -->
  564.  
  565.       <!-- Type of LDAP server. Currently "ad" for active directory and "ldap"
  566.           for other ldap servers. If not specified, then it is ldap. -->
  567.       <!--
  568.      <type>ad</type>
  569.      -->
  570.  
  571.       <!-- LDAP attribute that holds the user ID (default: uid) -->
  572.       <uidattr>uid</uidattr>
  573.       <objectclass>posixAccount</objectclass>
  574.       <!-- LDAP attribute that holds the cleartext or hashed password
  575.           (not needed when pwscheme is set to 'bind') -->
  576.       <pwattr>userPassword</pwattr>
  577.       <!-- if you use included jabberd.schema use this:
  578.      <uidattr>jid</uidattr>
  579.      <objectclass>jabberUser</objectclass>
  580.      <pwattr>jabberPassword</pwattr>
  581.      -->
  582.  
  583.       <!-- Attribute that holds jabber account status. Must be TRUE for AD,
  584.           and 1 for other LDAP server.
  585.           If not specified, then it will not be used. -->
  586.       <!--
  587.      <validattr>valid</validattr>
  588.      -->
  589.  
  590.       <!-- Group that users must be members of
  591.           If this is set, only user that are members of the specified LDAP
  592.           group can log in. The group must be specified with its full
  593.           distinguished name -->
  594.       <!--
  595.      <group_dn>cn=jabberdusers,ou=servicegroups,dc=example,dc=com</group_dn>
  596.      -->
  597.  
  598.       <fulluid/>
  599.       <!-- If pwscheme is not defined, then passwords are stored in clear
  600.           text and digest authentication may be done.
  601.           If passwords are hashed, then you cannot use digest authentication
  602.           and should use plain text authentication.
  603.           Any of sha, ssha, crypt, bind and clear may be specified.
  604.           'sha' specifies that the attribute in pwattr holds a base-64
  605.           encoded SHA-1 hashed password beginning with the string {SHA}.
  606.           'ssha' specifies that the attribute in pwattr holds a base-64
  607.           SHA-1 hashed password appended with 32 bits of salt and beginning
  608.           with the string {SSHA}.
  609.           'crypt' specifies that the attribute in pwattr holds a UNIX-style
  610.           crypt(3) hashed password.
  611.           'bind' specifies that the password is not stored in an attribute
  612.           but is authenticated directly by the LDAP server by binding
  613.           using the user's DN. This should be compatible with the
  614.           widest variety of LDAP servers.
  615.      -->
  616.       <!-- <pwscheme>bind</pwscheme> -->
  617.  
  618.       <!-- base DN of the tree. You should specify a DN for each
  619.           authentication realm declared in the <local/> section above,
  620.           by using the realm attribute. -->
  621.       <basedn realm="company">o=Company.com</basedn>
  622.       <basedn>o=Example Corp.</basedn>
  623.     </ldapfull>
  624.  
  625.     <!-- LDAP module configuration -->
  626.     <!-- Remember that you need to use PLAIN auth with LDAP backend -->
  627.     <ldap>
  628.       <!-- LDAP server host and port (default: 389) -->
  629.       <host>ldap.example.com</host>
  630.       <port>389</port>
  631.  
  632.       <!-- Use LDAP v3 if possible. If disabled, v2 will be used.
  633.           Encryption options are only available if v3 is enabled. -->
  634.       <!--
  635.      <v3/>
  636.      -->
  637.  
  638.       <!-- Encryption. If enabled, this will create an encrypted channel
  639.           to the LDAP server using the LDAP STARTTLS mechanism. -->
  640.       <!--
  641.      <starttls/>
  642.      -->
  643.  
  644.       <!-- Encryption. If enabled, this will create an encrypted channel
  645.           to the server using the old-style "ldaps://" mechanism. It is
  646.           recommended that you use <starttls/> instead of this. -->
  647.       <!--
  648.      <ssl/>
  649.      -->
  650.  
  651.       <!-- DN to bind as for searches. If unspecified, the searches
  652.           will be done anonymously. -->
  653.       <!--
  654.      <binddn>cn=Directory Manager</binddn>
  655.      <bindpw>secret</bindpw>
  656.      -->
  657.  
  658.       <!-- LDAP attribute that holds the user ID (default: uid) -->
  659.       <uidattr>uid</uidattr>
  660.  
  661.       <!-- Enable the append-realm element if you want to append
  662.           realm value (usernam@realm) to the uidattr value
  663.      <append-realm/>
  664.      -->
  665.  
  666.       <!-- Alternatively to <uidattr/> and <append-realm/> you may
  667.           specify full LDAP search <query/> that will be used to
  668.           get user objects from directory.
  669.  
  670.           The following replacements take place:
  671.           %u  is replaced by user login name
  672.           %r  is replaced by user login realm
  673.  
  674.           When <query/> is specified, <uidattr/> and <append-realm/>
  675.           are unused and take no effect. -->
  676.       <!--
  677.      <query>(&amp;(mail=%u@%r)(objectClass=inetOrgPerson))</query>
  678.      -->
  679.  
  680.       <!-- base DN of the tree. You should specify a DN for each
  681.           authentication realm declared in the <local/> section above,
  682.           by using the realm attribute. -->
  683.       <basedn realm="company">o=Company.com</basedn>
  684.       <basedn>o=Example Corp.</basedn>
  685.     </ldap>
  686.     <!-- if you want to configure more than one LDAP server
  687.         create ldap1, ldap2 etc. sections
  688.    <ldap1>
  689.  
  690.    </ldap1>
  691.    -->
  692.  
  693.     <!-- Pipe module configuration -->
  694.     <pipe>
  695.       <!-- Program to execute -->
  696.       <exec>/usr/bin/pipe-auth.pl</exec>
  697.     </pipe>
  698.  
  699.   </authreg>
  700.  
  701. </c2s><!--
  702.  vim: syntax=xml
  703. -->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement