@@ -50,23 +50,23 @@ alpine.worker.threads=0
50
50
alpine.worker.thread.multiplier =4
51
51
52
52
# Required
53
- # Defines the path to the data directory. This directory will hold logs,
54
- # keys, and any database or index files along with application-specific
55
- # files or directories.
53
+ # Defines the path to the data directory. This directory will hold logs, keys,
54
+ # and any database or index files along with application-specific files or
55
+ # directories.
56
56
alpine.data.directory =~/.dependency-track
57
57
58
58
# Required
59
- # Defines the interval (in seconds) to log general heath information.
60
- # If value equals 0, watchdog logging will be disabled.
59
+ # Defines the interval (in seconds) to log general heath information. If value
60
+ # equals 0, watchdog logging will be disabled.
61
61
alpine.watchdog.logging.interval =0
62
62
63
63
# Required
64
64
# Defines the database mode of operation. Valid choices are:
65
65
# 'server', 'embedded', and 'external'.
66
- # In server mode, the database will listen for connections from remote
67
- # hosts. In embedded mode, the system will be more secure and slightly
68
- # faster. External mode should be used when utilizing an external
69
- # database server (i.e. mysql, postgresql, etc).
66
+ # In server mode, the database will listen for connections from remote hosts.
67
+ # In embedded mode, the system will be more secure and slightly faster.
68
+ # External mode should be used when utilizing an external database server
69
+ # (i.e. mysql, postgresql, etc).
70
70
alpine.database.mode =embedded
71
71
72
72
# Optional
@@ -94,16 +94,15 @@ alpine.database.username=sa
94
94
# alpine.database.password=
95
95
96
96
# Optional
97
- # When authentication is enforced, API keys are required for automation,
98
- # and the user interface will prevent anonymous access by prompting for login
97
+ # When authentication is enforced, API keys are required for automation, and
98
+ # the user interface will prevent anonymous access by prompting for login
99
99
# credentials.
100
100
alpine.enforce.authentication =true
101
101
102
102
# Optional
103
- # When authorization is enforced, team membership for both API keys and
104
- # user accounts are restricted to what the team itself has access to.
105
- # To enforce authorization, the enforce.authentication property (above)
106
- # must be true.
103
+ # When authorization is enforced, team membership for both API keys and user
104
+ # accounts are restricted to what the team itself has access to. To enforce
105
+ # authorization, the enforce.authentication property (above) must be true.
107
106
alpine.enforce.authorization =true
108
107
109
108
# Required
@@ -119,54 +118,100 @@ alpine.ldap.enabled=false
119
118
120
119
# Optional
121
120
# Specifies the LDAP server URL
121
+ # Example (Microsoft Active Directory):
122
+ # alpine.ldap.server.url=ldap://ldap.example.com:3268
123
+ # alpine.ldap.server.url=ldaps://ldap.example.com:3269
124
+ # Example (ApacheDS, Fedora 389 Directory, NetIQ/Novell eDirectory, etc):
125
+ # alpine.ldap.server.url=ldap://ldap.example.com:389
126
+ # alpine.ldap.server.url=ldaps://ldap.example.com:636
122
127
alpine.ldap.server.url =ldap://ldap.example.com:389
123
128
124
- # Optional
125
- # Specifies the LDAP server domain. This is normally appended to the end of the
126
- # username to form the userPrincipalName
127
- alpine.ldap.domain =example.com
128
-
129
129
# Optional
130
130
# Specifies the base DN that all queries should search from
131
131
alpine.ldap.basedn =dc =example,dc =com
132
132
133
133
# Optional
134
- # Specifies the LDAP security authentication level to use.
135
- # Its value is one of the following strings: "none", "simple", "strong".
136
- # If this property is empty or unspecified, the behaviour is determined by the service provider.
134
+ # Specifies the LDAP security authentication level to use. Its value is one of
135
+ # the following strings: "none", "simple", "strong". If this property is empty
136
+ # or unspecified, the behaviour is determined by the service provider.
137
137
alpine.ldap.security.auth =simple
138
138
139
139
# Optional
140
- # If anonymous access is not permitted, specify a username with limited
141
- # access to the directory. Just enough to perform searches.
140
+ # If anonymous access is not permitted, specify a username with limited access
141
+ # to the directory, just enough to perform searches. This should be the fully
142
+ # qualified DN of the user.
142
143
alpine.ldap.bind.username =
143
144
144
145
# Optional
145
- # If anonymous access is not permitted, specify a password for the
146
- # username used to bind.
146
+ # If anonymous access is not permitted, specify a password for the username
147
+ # used to bind.
147
148
alpine.ldap.bind.password =
148
149
149
150
# Optional
150
- # Specifies how to map the user identifier entered by the user to that passed through to LDAP.
151
- # If is configured to a non-empty value, the substring %s in this value will be replaced
152
- # with the entered username.
153
- # The recommended format of this value depends on your LDAP server(Active Directory, OpenLDAP, etc.) .
154
- # Examples:
155
- # alpine.ldap.auth.username.format=%s
156
- # alpine.ldap.auth.username.format=%s@example.com
157
- # alpine.ldap.auth.username.format=uid=%s,ou=People,dc=example,dc=com
158
- # alpine.ldap.auth.username.format=userPrincipalName=%s,ou=People,dc=example,dc=com
159
- alpine.ldap.auth.username.format =
151
+ # Specifies if the username entered during login needs to be formatted prior
152
+ # to asserting credentials against the directory. For Active Directory, the
153
+ # userPrincipal attribute typically ends with the domain, whereas the
154
+ # samAccountName attribute and other directory server implementations do not .
155
+ # The %s variable will be substitued with the username asserted during login.
156
+ # Example (Microsoft Active Directory):
157
+ # alpine.ldap.auth.username.format=%s@example.com
158
+ # Example (ApacheDS, Fedora 389 Directory, NetIQ/Novell eDirectory, etc):
159
+ # alpine.ldap.auth.username.format=%s
160
+ alpine.ldap.auth.username.format =%s@example.com
160
161
161
162
# Optional
162
- # Specifies the Attribute that all queries should use
163
- # The default attribute is userPrincipalName
163
+ # Specifies the Attribute that identifies a users ID
164
+ # Example (Microsoft Active Directory):
165
+ # alpine.ldap.attribute.name=userPrincipalName
166
+ # Example (ApacheDS, Fedora 389 Directory, NetIQ/Novell eDirectory, etc):
167
+ # alpine.ldap.attribute.name=uid
164
168
alpine.ldap.attribute.name =userPrincipalName
165
169
166
170
# Optional
167
171
# Specifies the LDAP attribute used to store a users email address
168
172
alpine.ldap.attribute.mail =mail
169
173
174
+ # Optional
175
+ # Specifies the LDAP search filter used to retrieve all groups from the
176
+ # directory.
177
+ # Example (Microsoft Active Directory):
178
+ # alpine.ldap.groups.filter=(&(objectClass=group)(objectCategory=Group))
179
+ # Example (ApacheDS, Fedora 389 Directory, NetIQ/Novell eDirectory, etc):
180
+ # alpine.ldap.groups.filter=(&(objectClass=groupOfUniqueNames))
181
+ alpine.ldap.groups.filter =(&(objectClass =group)(objectCategory =Group))
182
+
183
+ # Optional
184
+ # Specifies the LDAP search filter to use to query a user and retrieve a list
185
+ # of groups the user is a member of. The {USER_DN} variable will be substituted
186
+ # with the actual value of the users DN at runtime.
187
+ # Example (Microsoft Active Directory):
188
+ # alpine.ldap.user.groups.filter=(&(objectClass=group)(objectCategory=Group)(member={USER_DN}))
189
+ # Example (Microsoft Active Directory - with nested group support):
190
+ # alpine.ldap.user.groups.filter=(member:1.2.840.113556.1.4.1941:={USER_DN})
191
+ # Example (ApacheDS, Fedora 389 Directory, NetIQ/Novell eDirectory, etc):
192
+ # alpine.ldap.user.groups.filter=(&(objectClass=groupOfUniqueNames)(uniqueMember={USER_DN}))
193
+ alpine.ldap.user.groups.filter =(member:1.2.840.113556.1.4.1941:={USER_DN})
194
+
195
+ # Optional
196
+ # Specifies if mapped LDAP accounts are automatically created upon successful
197
+ # authentication. When a user logs in with valid credentials but an account has
198
+ # not been previously provisioned, an authentication failure will be returned.
199
+ # This allows admins to control specifically which ldap users can access the
200
+ # system and which users cannot. When this value is set to true, a local ldap
201
+ # user will be created and mapped to the ldap account automatically. This
202
+ # automatic provisioning only affects authentication, not authorization.
203
+ alpine.ldap.user.provisioning =false
204
+
205
+ # Optional
206
+ # This option will ensure that team memberships for LDAP users are dynamic and
207
+ # synchronized with membership of LDAP groups. When a team is mapped to an LDAP
208
+ # group, all local LDAP users will automatically be assigned to the team if
209
+ # they are a member of the group the team is mapped to. If the user is later
210
+ # removed from the LDAP group, they will also be removed from the team. This
211
+ # option provides the ability to dynamically control user permissions via an
212
+ # external directory.
213
+ alpine.ldap.team.synchronization =false
214
+
170
215
# Optional
171
216
# HTTP proxy. If the address is set, then the port must be set too.
172
217
# alpine.http.proxy.address=proxy.example.com
0 commit comments