mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-04-28 18:30:24 +02:00
Restructured LDAP role
This commit is contained in:
parent
ec79cb8921
commit
72deb13d07
@ -39,7 +39,7 @@ defaults_oidc:
|
|||||||
# Helper Variables:
|
# Helper Variables:
|
||||||
# Keep in mind to mapp this variables if there is ever the possibility for the user to define them in the inventory
|
# Keep in mind to mapp this variables if there is ever the possibility for the user to define them in the inventory
|
||||||
_ldap_dn_base: "dc={{primary_domain_sld}},dc={{primary_domain_tld}}"
|
_ldap_dn_base: "dc={{primary_domain_sld}},dc={{primary_domain_tld}}"
|
||||||
_ldap_server_port: "{% if applications.ldap.network.local | bool %}{{ ports.localhost.ldap.ldap }}{% else %}{{ ports.localhost.ldaps.ldap }}{% endif %}"
|
_ldap_server_port: "{% if applications.ldap.network.docker | bool %}{{ ports.localhost.ldap.ldap }}{% else %}{{ ports.localhost.ldaps.ldap }}{% endif %}"
|
||||||
|
|
||||||
ldap:
|
ldap:
|
||||||
# Distinguished Names (DN)
|
# Distinguished Names (DN)
|
||||||
@ -60,11 +60,11 @@ ldap:
|
|||||||
# Password to access dn.bind
|
# Password to access dn.bind
|
||||||
bind_credential: "{{applications.ldap.administrator_database_password}}"
|
bind_credential: "{{applications.ldap.administrator_database_password}}"
|
||||||
server:
|
server:
|
||||||
domain: "{{applications.ldap.hostname if applications.ldap.network.local | bool else domains.ldap}}" # Mapping for public or locale access
|
domain: "{{applications.ldap.hostname if applications.ldap.network.docker | bool else domains.ldap}}" # Mapping for public or locale access
|
||||||
port: "{{_ldap_server_port}}"
|
port: "{{_ldap_server_port}}"
|
||||||
uri: "{% if applications.ldap.network.local | bool %}ldap://{{ applications.ldap.hostname }}{% else %}ldaps://{{ domains.ldap }}{% endif %}:{{ _ldap_server_port }}"
|
uri: "{% if applications.ldap.network.docker | bool %}ldap://{{ applications.ldap.hostname }}{% else %}ldaps://{{ domains.ldap }}{% endif %}:{{ _ldap_server_port }}"
|
||||||
network:
|
network:
|
||||||
local: "{{applications.ldap.network.local}}" # Uses the application configuration to define if local network should be available or not
|
local: "{{applications.ldap.network.docker}}" # Uses the application configuration to define if local network should be available or not
|
||||||
user_objects:
|
user_objects:
|
||||||
- person # Basic person attributes (sn, cn …) – RFC 4519
|
- person # Basic person attributes (sn, cn …) – RFC 4519
|
||||||
- inetOrgPerson # Extended Internet / intranet person – RFC 2798
|
- inetOrgPerson # Extended Internet / intranet person – RFC 2798
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
# Administration
|
# Administration
|
||||||
|
|
||||||
## Show Configuration
|
## Configuration
|
||||||
|
|
||||||
|
### Show Configuration
|
||||||
```bash
|
```bash
|
||||||
docker exec -it ldap bash -c "ldapsearch -LLL -Y EXTERNAL -H ldapi:/// -b 'cn=config'"
|
docker exec -it ldap bash -c "ldapsearch -LLL -Y EXTERNAL -H ldapi:/// -b 'cn=config'"
|
||||||
```
|
```
|
||||||
@ -18,7 +20,16 @@ docker exec -it ldap bash -c "ldapsearch -LLL -Y EXTERNAL -H ldapi:/// -b 'cn=co
|
|||||||
docker exec -it ldap ldapsearch -Y EXTERNAL -H ldapi:/// -b "cn=config" "(olcDatabase=*)"
|
docker exec -it ldap ldapsearch -Y EXTERNAL -H ldapi:/// -b "cn=config" "(olcDatabase=*)"
|
||||||
```
|
```
|
||||||
|
|
||||||
## Show all Entries
|
## Data
|
||||||
|
|
||||||
|
### Set Credentials
|
||||||
|
To execute the following commands set the credentials via:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
export $(grep -Ev '^(#|$)' .env/env | xargs)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Show all Entries
|
||||||
```bash
|
```bash
|
||||||
docker exec -it ldap bash -c "ldapsearch -LLL -o ldif-wrap=no -x -D \"\$LDAP_ADMIN_DN\" -w \"\$LDAP_ADMIN_PASSWORD\" -b \"\$LDAP_ROOT\"";
|
docker exec -it ldap bash -c "ldapsearch -LLL -o ldif-wrap=no -x -D \"\$LDAP_ADMIN_DN\" -w \"\$LDAP_ADMIN_PASSWORD\" -b \"\$LDAP_ROOT\"";
|
||||||
```
|
```
|
||||||
|
@ -1,25 +1,42 @@
|
|||||||
- name: Load memberof module from file in OpenLDAP container
|
- name: Load memberof module from file in OpenLDAP container
|
||||||
shell: >
|
shell: >
|
||||||
docker exec -i {{ applications[application_id].hostname }} ldapmodify -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}01_member_of_configuration.ldif
|
docker exec -i {{ applications[application_id].hostname }} ldapmodify -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}configuration/01_member_of_configuration.ldif
|
||||||
listen: "Import LDIF files"
|
listen:
|
||||||
|
- "Import configuration LDIF files"
|
||||||
|
- "Import all LDIF files"
|
||||||
# @todo Remove the following ignore errors when setting up a new server
|
# @todo Remove the following ignore errors when setting up a new server
|
||||||
# Just here because debugging would take to much time
|
# Just here because debugging would take to much time
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
|
|
||||||
- name: Refint Module Activation for OpenLDAP
|
- name: Refint Module Activation for OpenLDAP
|
||||||
shell: >
|
shell: >
|
||||||
docker exec -i {{ applications[application_id].hostname }} ldapadd -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}02_member_of_configuration.ldif
|
docker exec -i {{ applications[application_id].hostname }} ldapadd -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}configuration/02_member_of_configuration.ldif
|
||||||
listen: "Import LDIF files"
|
listen:
|
||||||
|
- "Import configuration LDIF files"
|
||||||
|
- "Import all LDIF files"
|
||||||
register: ldapadd_result
|
register: ldapadd_result
|
||||||
failed_when: ldapadd_result.rc not in [0, 68]
|
failed_when: ldapadd_result.rc not in [0, 68]
|
||||||
# @todo Remove the following ignore errors when setting up a new server
|
# @todo Remove the following ignore errors when setting up a new server
|
||||||
# Just here because debugging would take to much time
|
# Just here because debugging would take to much time
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
|
|
||||||
|
- name: "Import schemas"
|
||||||
|
shell: >
|
||||||
|
docker exec -i {{ applications[application_id].hostname }} ldapadd -Y EXTERNAL -H ldapi:/// -f "{{ldif_docker_path}}schema/{{ item | basename | regex_replace('\.j2$', '') }}"
|
||||||
|
register: ldapadd_result
|
||||||
|
changed_when: "'adding new entry' in ldapadd_result.stdout"
|
||||||
|
failed_when: ldapadd_result.rc not in [0, 80]
|
||||||
|
listen:
|
||||||
|
- "Import schema LDIF files"
|
||||||
|
- "Import all LDIF files"
|
||||||
|
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/schema/*.j2', wantlist=True) }}"
|
||||||
|
|
||||||
- name: Refint Overlay Configuration for OpenLDAP
|
- name: Refint Overlay Configuration for OpenLDAP
|
||||||
shell: >
|
shell: >
|
||||||
docker exec -i {{ applications[application_id].hostname }} ldapmodify -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}03_member_of_configuration.ldif
|
docker exec -i {{ applications[application_id].hostname }} ldapmodify -Y EXTERNAL -H ldapi:/// -f {{ldif_docker_path}}configuration/03_member_of_configuration.ldif
|
||||||
listen: "Import LDIF files"
|
listen:
|
||||||
|
- "Import configuration LDIF files"
|
||||||
|
- "Import all LDIF files"
|
||||||
register: ldapadd_result
|
register: ldapadd_result
|
||||||
failed_when: ldapadd_result.rc not in [0, 68]
|
failed_when: ldapadd_result.rc not in [0, 68]
|
||||||
# @todo Remove the following ignore errors when setting up a new server
|
# @todo Remove the following ignore errors when setting up a new server
|
||||||
@ -32,14 +49,7 @@
|
|||||||
register: ldapadd_result
|
register: ldapadd_result
|
||||||
changed_when: "'adding new entry' in ldapadd_result.stdout"
|
changed_when: "'adding new entry' in ldapadd_result.stdout"
|
||||||
failed_when: ldapadd_result.rc not in [0, 20, 68]
|
failed_when: ldapadd_result.rc not in [0, 20, 68]
|
||||||
listen: "Import LDIF files"
|
listen:
|
||||||
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/data/*.j2', wantlist=True) }}"
|
- "Import data LDIF files"
|
||||||
|
- "Import all LDIF files"
|
||||||
- name: "Import schemas"
|
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/data/*.j2', wantlist=True) }}"
|
||||||
shell: >
|
|
||||||
docker exec -i {{ applications[application_id].hostname }} ldapadd -Y EXTERNAL -H ldapi:/// -f "{{ldif_docker_path}}schema/{{ item | basename | regex_replace('\.j2$', '') }}"
|
|
||||||
register: ldapadd_result
|
|
||||||
changed_when: "'adding new entry' in ldapadd_result.stdout"
|
|
||||||
failed_when: ldapadd_result.rc not in [0, 80]
|
|
||||||
listen: "Import LDIF files"
|
|
||||||
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/schema/*.j2', wantlist=True) }}"
|
|
@ -1,9 +1,9 @@
|
|||||||
# In own task file for easier looping
|
# In own task file for easier looping
|
||||||
|
|
||||||
- name: "Create LDIF files at {{ ldif_host_path }}/{{ folder }}"
|
- name: "Create LDIF files at {{ ldif_host_path }}{{ folder }}"
|
||||||
template:
|
template:
|
||||||
src: "{{ item }}"
|
src: "{{ item }}"
|
||||||
dest: "{{ ldif_host_path }}/{{ folder }}/{{ item | basename | regex_replace('\\.j2$', '') }}"
|
dest: "{{ ldif_host_path }}{{ folder }}/{{ item | basename | regex_replace('\\.j2$', '') }}"
|
||||||
mode: '770'
|
mode: '770'
|
||||||
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/' ~ folder ~ '/*.j2', wantlist=True) }}"
|
loop: "{{ lookup('fileglob', role_path ~ '/templates/ldif/' ~ folder ~ '/*.j2', wantlist=True) }}"
|
||||||
notify: Import LDIF files
|
notify: "Import {{ folder }} LDIF files"
|
||||||
|
@ -35,11 +35,57 @@
|
|||||||
|
|
||||||
- name: "Process all LDIF types"
|
- name: "Process all LDIF types"
|
||||||
include_tasks: create_ldif_files.yml
|
include_tasks: create_ldif_files.yml
|
||||||
loop: "{{ ldif_types }}"
|
loop:
|
||||||
|
- configuration
|
||||||
|
- schema
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: folder
|
loop_var: folder
|
||||||
|
|
||||||
- name: Force LDIF files import
|
- name: flush LDIF handlers
|
||||||
command: /bin/true
|
meta: flush_handlers
|
||||||
notify: Import LDIF files
|
|
||||||
when: applications.ldap.force_import | bool
|
- name: install python-ldap
|
||||||
|
community.general.pacman:
|
||||||
|
name:
|
||||||
|
- python-ldap
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: "Ensure LDAP users are present and up to date"
|
||||||
|
community.general.ldap_entry:
|
||||||
|
dn: "{{ ldap.attributes.user_id }}={{ item.key }},{{ ldap.dn.users }}"
|
||||||
|
server_uri: "ldap://127.0.0.1:{{ports.localhost.ldap.ldap}}"
|
||||||
|
bind_dn: "{{ ldap.dn.administrator }}"
|
||||||
|
bind_pw: "{{ ldap.bind_credential }}"
|
||||||
|
objectClass: "{{ ldap.user_objects }}"
|
||||||
|
attributes:
|
||||||
|
"{{ ldap.attributes.user_id }}": "{{ item.key }}"
|
||||||
|
sn: "{{ item.value.sn | default(item.key) }}"
|
||||||
|
cn: "{{ item.value.cn | default(item.key) }}"
|
||||||
|
userPassword: "{SSHA}{{ item.value.password }}"
|
||||||
|
loginShell: /bin/bash
|
||||||
|
homeDirectory: "/home/{{ item.key }}"
|
||||||
|
uidNumber: "{{ item.value.uid | int }}"
|
||||||
|
gidNumber: "{{ item.value.gid | int }}"
|
||||||
|
state: present
|
||||||
|
loop: "{{ users | dict2items }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: "Ensure container for application roles exists"
|
||||||
|
community.general.ldap_entry:
|
||||||
|
dn: "{{ ldap.dn.application_roles }}"
|
||||||
|
server_uri: "ldap://127.0.0.1:{{ ports.localhost.ldap.ldap }}"
|
||||||
|
bind_dn: "{{ ldap.dn.administrator }}"
|
||||||
|
bind_pw: "{{ ldap.bind_credential }}"
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
attributes:
|
||||||
|
ou: roles
|
||||||
|
description: Container for application access profiles
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: "Process all LDIF types"
|
||||||
|
include_tasks: create_ldif_files.yml
|
||||||
|
loop:
|
||||||
|
- data
|
||||||
|
loop_control:
|
||||||
|
loop_var: folder
|
@ -6,7 +6,7 @@ services:
|
|||||||
image: bitnami/openldap:{{ applications[application_id].version }}
|
image: bitnami/openldap:{{ applications[application_id].version }}
|
||||||
container_name: {{ applications[application_id].hostname }}
|
container_name: {{ applications[application_id].hostname }}
|
||||||
{% include 'roles/docker-compose/templates/services/base.yml.j2' %}
|
{% include 'roles/docker-compose/templates/services/base.yml.j2' %}
|
||||||
{% if applications[application_id].network.public | bool %}
|
{% if applications[application_id].network.public | bool or applications[application_id].network.local | bool %}
|
||||||
ports:
|
ports:
|
||||||
- 127.0.0.1:{{ports.localhost.ldap.ldap}}:{{ldap_docker_port}} # Expose just on localhost so that nginx stream proxy can use it
|
- 127.0.0.1:{{ports.localhost.ldap.ldap}}:{{ldap_docker_port}} # Expose just on localhost so that nginx stream proxy can use it
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -1,19 +1,4 @@
|
|||||||
|
{% for app, config in applications.items() %}
|
||||||
#######################################################################
|
|
||||||
# Generic container for Application roles
|
|
||||||
#######################################################################
|
|
||||||
dn: {{ldap.dn.application_roles}}
|
|
||||||
objectClass: organizationalUnit
|
|
||||||
ou: roles
|
|
||||||
description: Container for application access profiles
|
|
||||||
|
|
||||||
{#
|
|
||||||
This template generates two LDIF entries for each application in defaults_applications:
|
|
||||||
one for the administrator role and one for the standard user role.
|
|
||||||
Please adjust the base DN (dc=example,dc=com) and other attributes as necessary.
|
|
||||||
#}
|
|
||||||
|
|
||||||
{% for app, config in defaults_applications.items() %}
|
|
||||||
dn: cn={{ app }}-administrator,{{ldap.dn.application_roles}}
|
dn: cn={{ app }}-administrator,{{ldap.dn.application_roles}}
|
||||||
objectClass: top
|
objectClass: top
|
||||||
objectClass: organizationalRole
|
objectClass: organizationalRole
|
||||||
@ -27,3 +12,31 @@ cn: {{ app }}-user
|
|||||||
description: Standard user role for {{ app }} (automatically generated)
|
description: Standard user role for {{ app }} (automatically generated)
|
||||||
|
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
||||||
|
{% for username, user in users.items() %}
|
||||||
|
|
||||||
|
#######################################################################
|
||||||
|
# Assign {{ username }} to application user roles
|
||||||
|
#######################################################################
|
||||||
|
{% for app, config in applications.items() %}
|
||||||
|
|
||||||
|
# Assign {{ username }} to {{ app }}-users
|
||||||
|
|
||||||
|
dn: cn={{ app }}-user,{{ ldap.dn.application_roles }}
|
||||||
|
changetype: modify
|
||||||
|
add: roleOccupant
|
||||||
|
roleOccupant: {{ ldap.attributes.user_id }}={{ username }},{{ ldap.dn.users }}
|
||||||
|
|
||||||
|
{% if users.is_admin | default(false) | bool %}
|
||||||
|
|
||||||
|
# Assign {{ username }} to {{ app }}-administrator
|
||||||
|
dn: cn={{ app }}-administrator,{{ ldap.dn.application_roles }}
|
||||||
|
changetype: modify
|
||||||
|
add: roleOccupant
|
||||||
|
roleOccupant: {{ ldap.attributes.user_id }}={{ users.administrator.username }},{{ ldap.dn.users }}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
{% endfor %}
|
@ -1,58 +0,0 @@
|
|||||||
{##
|
|
||||||
# Iterate over all users and create LDAP entries for each, then assign admin to application roles
|
|
||||||
# This template loops through a 'users' list variable where each user is a dict with keys:
|
|
||||||
# username, uid, gid, password (optional), sn (optional), cn (optional)
|
|
||||||
##}
|
|
||||||
#######################################################################
|
|
||||||
# Container for Application Roles (if not already created)
|
|
||||||
#######################################################################
|
|
||||||
dn: {{ ldap.dn.application_roles }}
|
|
||||||
objectClass: organizationalUnit
|
|
||||||
ou: roles
|
|
||||||
description: Container for application access profiles
|
|
||||||
|
|
||||||
{% for username, user in users.items() %}
|
|
||||||
#######################################################################
|
|
||||||
# Create User {{ username }}
|
|
||||||
#######################################################################
|
|
||||||
dn: {{ ldap.attributes.user_id }}={{ username }},{{ ldap.dn.users }}
|
|
||||||
{% for cls in ldap.user_objects %}
|
|
||||||
objectClass: {{ cls }}
|
|
||||||
{% endfor %}
|
|
||||||
{{ ldap.attributes.user_id }}: {{ username }}
|
|
||||||
sn: {{ username }}
|
|
||||||
cn: {{ username }}
|
|
||||||
userPassword: {SSHA}{{ user.password }}
|
|
||||||
loginShell: /bin/bash
|
|
||||||
homeDirectory: /home/{{ username }}
|
|
||||||
uidNumber: {{ user.uid }}
|
|
||||||
gidNumber: {{ user.gid }}
|
|
||||||
|
|
||||||
#######################################################################
|
|
||||||
# Assign {{ username }} to application user roles
|
|
||||||
#######################################################################
|
|
||||||
{% for app, config in defaults_applications.items() %}
|
|
||||||
dn: cn={{ app }}-user,{{ ldap.dn.application_roles }}
|
|
||||||
changetype: modify
|
|
||||||
add: roleOccupant
|
|
||||||
roleOccupant: {{ ldap.attributes.user_id }}={{ username }},{{ ldap.dn.users }}
|
|
||||||
|
|
||||||
{% endfor %}
|
|
||||||
{% endfor %}
|
|
||||||
|
|
||||||
#######################################################################
|
|
||||||
# Add Admin User to All Application Role Groups (unchanged)
|
|
||||||
#######################################################################
|
|
||||||
{% for app, config in defaults_applications.items() %}
|
|
||||||
dn: cn={{ app }}-administrator,{{ ldap.dn.application_roles }}
|
|
||||||
changetype: modify
|
|
||||||
add: roleOccupant
|
|
||||||
roleOccupant: {{ ldap.attributes.user_id }}={{ users.administrator.username }},{{ ldap.dn.users }}
|
|
||||||
|
|
||||||
dn: cn={{ app }}-user,{{ ldap.dn.application_roles }}
|
|
||||||
changetype: modify
|
|
||||||
add: roleOccupant
|
|
||||||
roleOccupant: {{ ldap.attributes.user_id }}={{ users.administrator.username }},{{ ldap.dn.users }}
|
|
||||||
|
|
||||||
{% endfor %}
|
|
||||||
|
|
@ -1193,4 +1193,9 @@ input.ng-empty::placeholder,.ng-empty::placeholder {
|
|||||||
|
|
||||||
.kanban-swimlane-title {
|
.kanban-swimlane-title {
|
||||||
border-bottom: none;
|
border-bottom: none;
|
||||||
|
}
|
||||||
|
|
||||||
|
.navbar-toggler {
|
||||||
|
background-color: rgba(var(--color-rgb-01-75), 0.9);
|
||||||
|
border-color: var(--color-01-67)
|
||||||
}
|
}
|
@ -4,7 +4,7 @@ networks:
|
|||||||
central_{{ database_type }}:
|
central_{{ database_type }}:
|
||||||
external: true
|
external: true
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if applications[application_id].get('features', {}).get('ldap', false) | bool and applications.ldap.network.local | bool %}
|
{% if applications[application_id].get('features', {}).get('ldap', false) | bool and applications.ldap.network.docker | bool %}
|
||||||
central_ldap:
|
central_ldap:
|
||||||
external: true
|
external: true
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
{% if applications | get_database_central_storage(application_id) | bool and database_type is defined %}
|
{% if applications | get_database_central_storage(application_id) | bool and database_type is defined %}
|
||||||
central_{{ database_type }}:
|
central_{{ database_type }}:
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if applications[application_id].get('features', {}).get('ldap', false) | bool and applications.ldap.network.local|bool %}
|
{% if applications[application_id].get('features', {}).get('ldap', false) | bool and applications.ldap.network.docker|bool %}
|
||||||
central_ldap:
|
central_ldap:
|
||||||
{% endif %}
|
{% endif %}
|
||||||
default:
|
default:
|
||||||
|
@ -249,7 +249,8 @@ defaults_applications:
|
|||||||
ldap:
|
ldap:
|
||||||
version: "latest"
|
version: "latest"
|
||||||
network:
|
network:
|
||||||
local: True # Activates local network to allow other docker containers to connect
|
local: True # Activates local network. Necessary for LDIF import routines
|
||||||
|
docker: True # Activates docker network to allow other docker containers to connect
|
||||||
public: False # Set to true in inventory file if you want to expose the LDAP port to the internet
|
public: False # Set to true in inventory file if you want to expose the LDAP port to the internet
|
||||||
hostname: "ldap" # Hostname of the LDAP Server in the central_ldap network
|
hostname: "ldap" # Hostname of the LDAP Server in the central_ldap network
|
||||||
webinterface: "lam" # The webinterface which should be used. Possible: lam and phpldapadmin
|
webinterface: "lam" # The webinterface which should be used. Possible: lam and phpldapadmin
|
||||||
@ -258,7 +259,6 @@ defaults_applications:
|
|||||||
username: "{{users.administrator.username}}" # Administrator username
|
username: "{{users.administrator.username}}" # Administrator username
|
||||||
# administrator_password: # CHANGE for security reasons in inventory file
|
# administrator_password: # CHANGE for security reasons in inventory file
|
||||||
# administrator_database_password: # CHANGE for security reasons in inventory file
|
# administrator_database_password: # CHANGE for security reasons in inventory file
|
||||||
force_import: False # Forces the import of the LDIF files
|
|
||||||
{% endraw %}{{ features.render_features({
|
{% endraw %}{{ features.render_features({
|
||||||
'ldap': true,
|
'ldap': true,
|
||||||
}) }}{% raw %}
|
}) }}{% raw %}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user