Hi

“Automation of ldap integration” can mean a thousand things.


Could you please tell clearly:


- What you are trying to achieve.

- How you are doing this.

- What problems you encounter.

- Which command did you run, and what output did you get from that (copied
as text, not as images/attachments/screenshots)

- What the relevant tasks/playbooks/code/variables look like




On Tue, 11 Feb 2020 at 11:13, Vishal Bobade <[email protected]>
wrote:

> Hi,
>
> could some one help me in understanding if the below yaml code can be used
> in ansible-playbook to achieve the automation of LDAP integration.
>
> security:   #Security configuration (LDAP, SAML, Password Policy, ...)
>   ldapSettings:   #LDAP server(s) settings
>     ldap1:   #The unique ID of the LDAP setting
>       emailAttribute: email1   #An attribute that can be used to map a
> user's email to a user created automatically by Artifactory
>       ldapPoisoningProtection: true   #When set to true (recommended),
> Artifactory will protect against LDAP poisoning by filtering out users
> exposed to vulnerability
>       ldapUrl: ldap://myserver:myport/dc=sampledomain,dc=com   #Location
> of the LDAP server in the following format:
> ldap://myserver:myport/dc=sampledomain,dc=com. The URL should include the
> base DN used to search for and/or authenticate users
>       search:
>         managerDn: manager1   #The full DN of a user with permissions
> that allow querying the LDAP server. When working with LDAP Groups, the
> user should have permissions for any extra group attributes such as memberOf
>         managerPassword: managerpass1   #The password of the user binding
> to the LDAP server when using "search" authentication
>         searchBase: searchbase1   #The Context name in which to search
> relative to the base DN in the LDAP URL. Multiple search bases may be
> specified separated by a pipe ( | ). This is parameter is optional
>         searchFilter: searchfilter1   #A filter expression used to search
> for the user DN that is used in LDAP authentication. Possible examples are:
> uid={0}) - this would search for a username match on the uid attribute.
> Authentication using LDAP is performed from the DN found if successful
>         searchSubTree: true   #When set, enables deep search through the
> sub-tree of the LDAP URL + Search Base
>       userDnPattern: userppatt1  #A DN pattern used to log users directly
> in to the LDAP database. This pattern is used to create a DN string for
> "direct" user authentication, and is relative to the base DN in the LDAP
> URL. For example: uid={0},ou=People
>       allowUserToAccessProfile: false   #When set, users created after
> logging in using LDAP will be able to access their profile page in
> Artifactory
>       autoCreateUser: true   #When set, Artifactory will automatically
> create new users for those who have logged in using LDAP, and assign them
> to the default groups
>       enabled: true   #When set, these settings are enabled
> Samp
>
> --
> You received this message because you are subscribed to the Google Groups
> "Ansible Project" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/ansible-project/f9d8e4a5-cb48-4351-9154-ad9329ab7dd0%40googlegroups.com
> <https://groups.google.com/d/msgid/ansible-project/f9d8e4a5-cb48-4351-9154-ad9329ab7dd0%40googlegroups.com?utm_medium=email&utm_source=footer>
> .
>
-- 
Sent from a mobile device - please excuse the brevity, spelling and
punctuation.

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/CAL8fbwN4H0CN%2B4DofT5CLFLjnAJTh07Wy0gzVZqFsmOYswsz2g%40mail.gmail.com.

Reply via email to