1# $Id: ldap-exerciser.properties 3946 2010-12-16 17:51:51Z unsaved $ 2 3# This is a sample properties file for the utility program 4# org.hsqldb.auth.LdapAuthBean. See the API Spec for 5# org.hsqldb.auth.LdapAuthBean for details about all of the settings you can use 6# here. 7 8# IMPORTANT: Use ISO-8859-1 encoding for any extended characters, as you always 9# should for a Java properties file. 10 11# The ${...} construct (for system properties) is not supported. 12 13# All of these examples use a roleSchemaValuePattern setting to work with the 14# LDAP memberOf feature. If you have a direct attribute for specifying roles 15# (and optional schema), then just skip that setting. 16 17# These settings are used for all sample setups 18# When startTls is true, ldapHost must match the CN in the server's cert. 19ldapHost=beyla.admc.com 20parentDn=ou=people,dc=admc,dc=com 21roleSchemaValuePattern=cn=([^,]+).* 22rolesSchemaAttribute=memberof 23accessAttribute=hyperSqlAccess 24 25# This block of settings works for an OpenLDAP server using the memberOf 26# feature for membership in roles, with DIGEST-MD5 SASL and StartTLS with a 27# private (non-commercial) SSL certificate. 28startTls=true 29trustStore=/home/blaine/ca/cacert.store 30securityMechanism=DIGEST-MD5 31 32# To use an LDAP server that is totally unsecured, comment out the settings in 33# the previous block and enable the one setting here. 34# An unsecured server can be useful for educational purposes, but not for a 35# real application! 36#principalTemplate=uid=${username},ou=people,dc=admc,dc=com 37 38# PLAIN authentication, but StartTLS-encrypted. Disable the block above 39# starting with "startTls=true" and enable the settings in this block. 40#principalTemplate=uid=${username},ou=people,dc=admc,dc=com 41 42# SASL DIGEST-MD5 with no encryption. Disable the block above 43# starting with "startTls=true" and enable the settings in this block. 44#securityMechanism=DIGEST-MD5 45