Hi “Automation of ldap integration” can mean a thousand things.
Could you please tell clearly: - What you are trying to achieve. - How you are doing this. - What problems you encounter. - Which command did you run, and what output did you get from that (copied as text, not as images/attachments/screenshots) - What the relevant tasks/playbooks/code/variables look like On Tue, 11 Feb 2020 at 11:13, Vishal Bobade <[email protected]> wrote: > Hi, > > could some one help me in understanding if the below yaml code can be used > in ansible-playbook to achieve the automation of LDAP integration. > > security: #Security configuration (LDAP, SAML, Password Policy, ...) > ldapSettings: #LDAP server(s) settings > ldap1: #The unique ID of the LDAP setting > emailAttribute: email1 #An attribute that can be used to map a > user's email to a user created automatically by Artifactory > ldapPoisoningProtection: true #When set to true (recommended), > Artifactory will protect against LDAP poisoning by filtering out users > exposed to vulnerability > ldapUrl: ldap://myserver:myport/dc=sampledomain,dc=com #Location > of the LDAP server in the following format: > ldap://myserver:myport/dc=sampledomain,dc=com. The URL should include the > base DN used to search for and/or authenticate users > search: > managerDn: manager1 #The full DN of a user with permissions > that allow querying the LDAP server. When working with LDAP Groups, the > user should have permissions for any extra group attributes such as memberOf > managerPassword: managerpass1 #The password of the user binding > to the LDAP server when using "search" authentication > searchBase: searchbase1 #The Context name in which to search > relative to the base DN in the LDAP URL. Multiple search bases may be > specified separated by a pipe ( | ). This is parameter is optional > searchFilter: searchfilter1 #A filter expression used to search > for the user DN that is used in LDAP authentication. Possible examples are: > uid={0}) - this would search for a username match on the uid attribute. > Authentication using LDAP is performed from the DN found if successful > searchSubTree: true #When set, enables deep search through the > sub-tree of the LDAP URL + Search Base > userDnPattern: userppatt1 #A DN pattern used to log users directly > in to the LDAP database. This pattern is used to create a DN string for > "direct" user authentication, and is relative to the base DN in the LDAP > URL. For example: uid={0},ou=People > allowUserToAccessProfile: false #When set, users created after > logging in using LDAP will be able to access their profile page in > Artifactory > autoCreateUser: true #When set, Artifactory will automatically > create new users for those who have logged in using LDAP, and assign them > to the default groups > enabled: true #When set, these settings are enabled > Samp > > -- > You received this message because you are subscribed to the Google Groups > "Ansible Project" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To view this discussion on the web visit > https://groups.google.com/d/msgid/ansible-project/f9d8e4a5-cb48-4351-9154-ad9329ab7dd0%40googlegroups.com > <https://groups.google.com/d/msgid/ansible-project/f9d8e4a5-cb48-4351-9154-ad9329ab7dd0%40googlegroups.com?utm_medium=email&utm_source=footer> > . > -- Sent from a mobile device - please excuse the brevity, spelling and punctuation. -- You received this message because you are subscribed to the Google Groups "Ansible Project" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/CAL8fbwN4H0CN%2B4DofT5CLFLjnAJTh07Wy0gzVZqFsmOYswsz2g%40mail.gmail.com.
