-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathsample-webSecurity-LDAP.xml
51 lines (47 loc) · 1.78 KB
/
sample-webSecurity-LDAP.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
<!-- The following webSecurity.xml file defines an ODM super user,
create groups in the basic registry and add all the users to them,
then add the LDAP connection information to restrict access to authorized LDAP users.
Useful if you are not allowed to create groups in your LDAP registry-->
<server>
<!-- Define the basic registry -->
<basicRegistry id="basic" realm="customRealm">
<!-- Define users -->
<!-- ODM super user -->
<user name="odmAdmin" password="odmAdmin"/>
<!-- Users for Decision Server -->
<user name="resDeployer" password="resDeployer"/>
<user name="resMonitor" password="resMonitor"/>
<user name="resExecutor" password="resExecutor" />
<!-- Assign users to groups -->
<group name="rtsAdministrators">
<member name="odmAdmin"/>
</group>
<group name="resAdministrators">
<member name="odmAdmin" />
</group>
<group name="resDeployers">
<member name="resDeployer" />
</group>
<group name="resMonitors">
<member name="resMonitor" />
</group>
<group name="resExecutors">
<member name="odmAdmin" />
<member name="resDeployer" />
<member name="resMonitor" />
<member name="resExecutor" />
</group>
</basicRegistry>
<!-- Define the LDAP registry -->
<ldapRegistry id="ldap" realm="OpenLdapRealm"
host="openldap" port="389" ldapType="Custom" ignoreCase="true" recursiveSearch="true"
baseDN="dc=example,dc=org" bindDN="cn=admin,dc=example,dc=org" bindPassword="admin">
<customFilters
userFilter="(uid=%v)"
groupFilter="(cn=%v)"
userIdMap="*:uid"
groupIdMap="*:cn"
groupMemberIdMap="groupOfNames:member">
</customFilters>
</ldapRegistry>
</server>