Description of LDAP configuration options
Configuration option = Default value Description
[ldap]
= default (StrOpt) The LDAP dereferencing option for queries. This can be either "never", "searching", "always", "finding" or "default". The "default" option falls back to using default dereferencing configured by your ldap.conf.
= False (BoolOpt) Delete subtrees using the subtree delete control. Only enable this option if your LDAP server supports subtree deletion.
= 60 (IntOpt) End user auth connection lifetime in seconds.
= 100 (IntOpt) End user auth connection pool size.
= None (BoolOpt) Override the system's default referral chasing behavior for queries.
= None (IntOpt) Sets the LDAP debugging level for LDAP calls. A value of 0 means that debugging is not enabled. This value is a bitmask, consult your LDAP documentation for possible values.
= cn=dumb,dc=nonexistent (StrOpt) DN of the "dummy member" to use when "use_dumb_member" is enabled.
= (ListOpt) Additional attribute mappings for groups. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow group creation in LDAP backend.
= True (BoolOpt) Allow group deletion in LDAP backend.
= True (BoolOpt) Allow group update in LDAP backend.
= (ListOpt) List of attributes stripped off the group on update.
= description (StrOpt) LDAP attribute mapped to group description.
= None (StrOpt) LDAP search filter for groups.
= cn (StrOpt) LDAP attribute mapped to group id.
= member (StrOpt) LDAP attribute mapped to show group membership.
= ou (StrOpt) LDAP attribute mapped to group name.
= groupOfNames (StrOpt) LDAP objectclass for groups.
= None (StrOpt) Search base for groups.
= 0 (IntOpt) Maximum results per page; a value of zero ("0") disables paging.
= None (StrOpt) Password for the BindDN to query the LDAP server.
= 600 (IntOpt) Connection lifetime in seconds.
= -1 (IntOpt) Connector timeout in seconds. Value -1 indicates indefinite wait for response.
= 0.1 (FloatOpt) Time span in seconds to wait between two reconnect trials.
= 3 (IntOpt) Maximum count of reconnect trials.
= 10 (IntOpt) Connection pool size.
= (ListOpt) Additional attribute mappings for projects. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow project creation in LDAP backend.
= True (BoolOpt) Allow project deletion in LDAP backend.
= True (BoolOpt) Allow project update in LDAP backend.
= (ListOpt) List of attributes stripped off the project on update.
= description (StrOpt) LDAP attribute mapped to project description.
= businessCategory (StrOpt) LDAP attribute mapped to project domain_id.
= enabled (StrOpt) LDAP attribute mapped to project enabled.
= False (BoolOpt) If true, Keystone uses an alternative method to determine if a project is enabled or not by checking if they are a member of the "project_enabled_emulation_dn" group.
= None (StrOpt) DN of the group entry to hold enabled projects when using enabled emulation.
= None (StrOpt) LDAP search filter for projects.
= cn (StrOpt) LDAP attribute mapped to project id.
= member (StrOpt) LDAP attribute mapped to project membership for user.
= ou (StrOpt) LDAP attribute mapped to project name.
= groupOfNames (StrOpt) LDAP objectclass for projects.
= None (StrOpt) Search base for projects
= one (StrOpt) The LDAP scope for queries, this can be either "one" (onelevel/singleLevel) or "sub" (subtree/wholeSubtree).
= (ListOpt) Additional attribute mappings for roles. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow role creation in LDAP backend.
= True (BoolOpt) Allow role deletion in LDAP backend.
= True (BoolOpt) Allow role update in LDAP backend.
= (ListOpt) List of attributes stripped off the role on update.
= None (StrOpt) LDAP search filter for roles.
= cn (StrOpt) LDAP attribute mapped to role id.
= roleOccupant (StrOpt) LDAP attribute mapped to role membership.
= ou (StrOpt) LDAP attribute mapped to role name.
= organizationalRole (StrOpt) LDAP objectclass for roles.
= None (StrOpt) Search base for roles.
= cn=example,cn=com (StrOpt) LDAP server suffix
= None (StrOpt) CA certificate directory path for communicating with LDAP servers.
= None (StrOpt) CA certificate file path for communicating with LDAP servers.
= demand (StrOpt) Valid options for tls_req_cert are demand, never, and allow.
= ldap://localhost (StrOpt) URL for connecting to the LDAP server.
= False (BoolOpt) Enable LDAP connection pooling for end user authentication. If use_pool is disabled, then this setting is meaningless and is not used at all.
= False (BoolOpt) If true, will add a dummy member to groups. This is required if the objectclass for groups requires the "member" attribute.
= False (BoolOpt) Enable LDAP connection pooling.
= False (BoolOpt) Enable TLS for communicating with LDAP servers.
= None (StrOpt) User BindDN to query the LDAP server.
= (ListOpt) List of additional LDAP attributes used for mapping additional attribute mappings for users. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.
= True (BoolOpt) Allow user creation in LDAP backend.
= True (BoolOpt) Allow user deletion in LDAP backend.
= True (BoolOpt) Allow user updates in LDAP backend.
= default_project_id, tenants (ListOpt) List of attributes stripped off the user on update.
= None (StrOpt) LDAP attribute mapped to default_project_id for users.
= enabled (StrOpt) LDAP attribute mapped to user enabled flag.
= True (StrOpt) Default value to enable users. This should match an appropriate int value if the LDAP server uses non-boolean (bitmask) values to indicate if a user is enabled or disabled. If this is not set to "True" the typical value is "512". This is typically used when "user_enabled_attribute = userAccountControl".
= False (BoolOpt) If true, Keystone uses an alternative method to determine if a user is enabled or not by checking if they are a member of the "user_enabled_emulation_dn" group.
= None (StrOpt) DN of the group entry to hold enabled users when using enabled emulation.
= False (BoolOpt) Invert the meaning of the boolean enabled values. Some LDAP servers use a boolean lock attribute where "true" means an account is disabled. Setting "user_enabled_invert = true" will allow these lock attributes to be used. This setting will have no effect if "user_enabled_mask" or "user_enabled_emulation" settings are in use.
= 0 (IntOpt) Bitmask integer to indicate the bit that the enabled value is stored in if the LDAP server represents "enabled" as a bit on an integer rather than a boolean. A value of "0" indicates the mask is not used. If this is not set to "0" the typical value is "2". This is typically used when "user_enabled_attribute = userAccountControl".
= None (StrOpt) LDAP search filter for users.
= cn (StrOpt) LDAP attribute mapped to user id. WARNING: must not be a multivalued attribute.
= mail (StrOpt) LDAP attribute mapped to user email.
= sn (StrOpt) LDAP attribute mapped to user name.
= inetOrgPerson (StrOpt) LDAP objectclass for users.
= userPassword (StrOpt) LDAP attribute mapped to password.
= None (StrOpt) Search base for users.