# Example configuration for the LDAP identity provider plug-in. # Adjust values to match your directory deployment before enabling the plugin. connection: host: "ldaps://ldap.example.internal" port: 636 useStartTls: false validateCertificates: true clientCertificate: pfxPath: "file:/etc/stellaops/certs/ldap-client.pfx" passwordSecret: "file:/etc/stellaops/secrets/ldap-client-pfx.txt" sendChain: true trustStore: mode: system # system | bundle bundlePath: "file:/etc/stellaops/trust/ldap-root.pem" searchBase: "ou=people,dc=example,dc=internal" usernameAttribute: "uid" userDnFormat: "uid={username},ou=people,dc=example,dc=internal" bindDn: "cn=stellaops-bind,ou=service,dc=example,dc=internal" bindPasswordSecret: "file:/etc/stellaops/secrets/ldap-bind.txt" security: requireTls: true allowInsecureWithEnvToggle: false # set STELLAOPS_LDAP_ALLOW_INSECURE=true to permit TLS downgrade allowedCipherSuites: - "TLS_AES_256_GCM_SHA384" - "TLS_AES_128_GCM_SHA256" referralChasing: false lockout: useAuthorityPolicies: true directoryLockoutAttribute: "pwdAccountLockedTime" claims: groupAttribute: "memberOf" groupToRoleMap: "cn=stellaops-admins,ou=groups,dc=example,dc=internal": "operators" "cn=stellaops-read,ou=groups,dc=example,dc=internal": "auditors" regexMappings: - pattern: "^cn=stellaops-(?P[a-z-]+),ou=groups,dc=example,dc=internal$" roleFormat: "{role}" extraAttributes: displayName: "displayName" email: "mail" queries: userFilter: "(&(objectClass=person)(uid={username}))" attributes: - "displayName" - "mail" - "memberOf" clientProvisioning: enabled: false containerDn: "ou=service,dc=example,dc=internal" secretAttribute: "userPassword" auditMirror: enabled: true collectionName: "ldap_client_provisioning" health: probeIntervalSeconds: 60 timeoutSeconds: 5