Description of LDAP configuration options
Configuration option = Default value Description
[ldap]
= default (StrOpt) The LDAP dereferencing option for queries. The "default" option falls back to using default dereferencing configured by your ldap.conf.
= False (BoolOpt) Delete subtrees using the subtree delete control. Only enable this option if your LDAP server supports subtree deletion.
= 60 (IntOpt) End user auth connection lifetime in seconds.
= 100 (IntOpt) End user auth connection pool size.
= None (BoolOpt) Override the system's default referral chasing behavior for queries.
= None (IntOpt) Sets the LDAP debugging level for LDAP calls. A value of 0 means that debugging is not enabled. This value is a bitmask, consult your LDAP documentation for possible values.
= cn=dumb,dc=nonexistent (StrOpt) DN of the "dummy member" to use when "use_dumb_member" is enabled.
= (ListOpt) Additional attribute mappings for groups. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow group creation in LDAP backend.
= True (BoolOpt) Allow group deletion in LDAP backend.
= True (BoolOpt) Allow group update in LDAP backend.
= (ListOpt) List of attributes stripped off the group on update.
= description (StrOpt) LDAP attribute mapped to group description.
= None (StrOpt) LDAP search filter for groups.
= cn (StrOpt) LDAP attribute mapped to group id.
= member (StrOpt) LDAP attribute mapped to show group membership.
= ou (StrOpt) LDAP attribute mapped to group name.
= groupOfNames (StrOpt) LDAP objectclass for groups.
= None (StrOpt) Search base for groups. Defaults to the suffix value.
= 0 (IntOpt) Maximum results per page; a value of zero ("0") disables paging.
= None (StrOpt) Password for the BindDN to query the LDAP server.
= 600 (IntOpt) Connection lifetime in seconds.
= -1 (IntOpt) Connector timeout in seconds. Value -1 indicates indefinite wait for response.
= 0.1 (FloatOpt) Time span in seconds to wait between two reconnect trials.
= 3 (IntOpt) Maximum count of reconnect trials.
= 10 (IntOpt) Connection pool size.
= (ListOpt) Additional attribute mappings for projects. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow project creation in LDAP backend.
= True (BoolOpt) Allow project deletion in LDAP backend.
= True (BoolOpt) Allow project update in LDAP backend.
= (ListOpt) List of attributes stripped off the project on update.
= description (StrOpt) LDAP attribute mapped to project description.
= businessCategory (StrOpt) LDAP attribute mapped to project domain_id.
= enabled (StrOpt) LDAP attribute mapped to project enabled.
= False (BoolOpt) If true, Keystone uses an alternative method to determine if a project is enabled or not by checking if they are a member of the "project_enabled_emulation_dn" group.
= None (StrOpt) DN of the group entry to hold enabled projects when using enabled emulation.
= None (StrOpt) LDAP search filter for projects.
= cn (StrOpt) LDAP attribute mapped to project id.
= member (StrOpt) LDAP attribute mapped to project membership for user.
= ou (StrOpt) LDAP attribute mapped to project name.
= groupOfNames (StrOpt) LDAP objectclass for projects.
= None (StrOpt) Search base for projects. Defaults to the suffix value.
= one (StrOpt) The LDAP scope for queries, "one" represents oneLevel/singleLevel and "sub" represents subtree/wholeSubtree options.
= (ListOpt) Additional attribute mappings for roles. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow role creation in LDAP backend.
= True (BoolOpt) Allow role deletion in LDAP backend.
= True (BoolOpt) Allow role update in LDAP backend.
= (ListOpt) List of attributes stripped off the role on update.
= None (StrOpt) LDAP search filter for roles.
= cn (StrOpt) LDAP attribute mapped to role id.
= roleOccupant (StrOpt) LDAP attribute mapped to role membership.
= ou (StrOpt) LDAP attribute mapped to role name.
= organizationalRole (StrOpt) LDAP objectclass for roles.
= None (StrOpt) Search base for roles. Defaults to the suffix value.
= cn=example,cn=com (StrOpt) LDAP server suffix
= None (StrOpt) CA certificate directory path for communicating with LDAP servers.
= None (StrOpt) CA certificate file path for communicating with LDAP servers.
= demand (StrOpt) Specifies what checks to perform on client certificates in an incoming TLS session.
= ldap://localhost (StrOpt) URL for connecting to the LDAP server.
= False (BoolOpt) Enable LDAP connection pooling for end user authentication. If use_pool is disabled, then this setting is meaningless and is not used at all.
= False (BoolOpt) If true, will add a dummy member to groups. This is required if the objectclass for groups requires the "member" attribute.
= False (BoolOpt) Enable LDAP connection pooling.
= False (BoolOpt) Enable TLS for communicating with LDAP servers.
= None (StrOpt) User BindDN to query the LDAP server.
= (ListOpt) List of additional LDAP attributes used for mapping additional attribute mappings for users. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow user creation in LDAP backend.
= True (BoolOpt) Allow user deletion in LDAP backend.
= True (BoolOpt) Allow user updates in LDAP backend.
= default_project_id (ListOpt) List of attributes stripped off the user on update.
= None (StrOpt) LDAP attribute mapped to default_project_id for users.
= enabled (StrOpt) LDAP attribute mapped to user enabled flag.
= True (StrOpt) Default value to enable users. This should match an appropriate int value if the LDAP server uses non-boolean (bitmask) values to indicate if a user is enabled or disabled. If this is not set to "True" the typical value is "512". This is typically used when "user_enabled_attribute = userAccountControl".
= False (BoolOpt) If true, Keystone uses an alternative method to determine if a user is enabled or not by checking if they are a member of the "user_enabled_emulation_dn" group.
= None (StrOpt) DN of the group entry to hold enabled users when using enabled emulation.
= False (BoolOpt) Invert the meaning of the boolean enabled values. Some LDAP servers use a boolean lock attribute where "true" means an account is disabled. Setting "user_enabled_invert = true" will allow these lock attributes to be used. This setting will have no effect if "user_enabled_mask" or "user_enabled_emulation" settings are in use.
= 0 (IntOpt) Bitmask integer to indicate the bit that the enabled value is stored in if the LDAP server represents "enabled" as a bit on an integer rather than a boolean. A value of "0" indicates the mask is not used. If this is not set to "0" the typical value is "2". This is typically used when "user_enabled_attribute = userAccountControl".
= None (StrOpt) LDAP search filter for users.
= cn (StrOpt) LDAP attribute mapped to user id. WARNING: must not be a multivalued attribute.
= mail (StrOpt) LDAP attribute mapped to user email.
= sn (StrOpt) LDAP attribute mapped to user name.
= inetOrgPerson (StrOpt) LDAP objectclass for users.
= userPassword (StrOpt) LDAP attribute mapped to password.
= None (StrOpt) Search base for users. Defaults to the suffix value.