2012-02-14 12:35:20 +00:00
|
|
|
#
|
|
|
|
# LDAP Defaults
|
|
|
|
#
|
|
|
|
|
|
|
|
# See ldap.conf(5) for details
|
|
|
|
# This file should be world readable but not world writable.
|
|
|
|
|
|
|
|
#BASE dc=example,dc=com
|
|
|
|
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
|
|
|
|
|
|
|
|
#SIZELIMIT 12
|
|
|
|
#TIMELIMIT 15
|
|
|
|
#DEREF never
|
|
|
|
|
2018-02-11 19:01:37 +00:00
|
|
|
# When no CA certificates are specified the Shared System Certificates
|
|
|
|
# are in use. In order to have these available along with the ones specified
|
|
|
|
# by TLS_CACERTDIR one has to include them explicitly:
|
|
|
|
#TLS_CACERT /etc/pki/tls/cert.pem
|
2013-04-09 11:43:45 +00:00
|
|
|
|
2018-03-05 08:48:07 +00:00
|
|
|
# System-wide Crypto Policies provide up to date cipher suite which should
|
|
|
|
# be used unless one needs a finer grinded selection of ciphers. Hence, the
|
|
|
|
# PROFILE=SYSTEM value represents the default behavior which is in place
|
|
|
|
# when no explicit setting is used. (see openssl-ciphers(1) for more info)
|
|
|
|
#TLS_CIPHER_SUITE PROFILE=SYSTEM
|
|
|
|
|
2013-04-09 11:43:45 +00:00
|
|
|
# Turning this off breaks GSSAPI used with krb5 when rdns = false
|
2013-10-30 10:08:41 +00:00
|
|
|
SASL_NOCANON on
|
|
|
|
|