1# $Id: ldap-exerciser.properties 3946 2010-12-16 17:51:51Z unsaved $
2
3# This is a sample properties file for the utility program
4# org.hsqldb.auth.LdapAuthBean.  See the API Spec for
5# org.hsqldb.auth.LdapAuthBean for details about all of the settings you can use
6# here.
7
8# IMPORTANT:  Use ISO-8859-1 encoding for any extended characters, as you always
9# should for a Java properties file.
10
11# The ${...} construct (for system properties) is not supported.
12
13# All of these examples use a roleSchemaValuePattern setting to work with the
14# LDAP memberOf feature.  If you have a direct attribute for specifying roles
15# (and optional schema), then just skip that setting.
16
17# These settings are used for all sample setups
18# When startTls is true, ldapHost must match the CN in the server's cert.
19ldapHost=beyla.admc.com
20parentDn=ou=people,dc=admc,dc=com
21roleSchemaValuePattern=cn=([^,]+).*
22rolesSchemaAttribute=memberof
23accessAttribute=hyperSqlAccess
24
25# This block of settings works for an OpenLDAP server using the memberOf
26# feature for membership in roles, with DIGEST-MD5 SASL and StartTLS with a
27# private (non-commercial) SSL certificate.
28startTls=true
29trustStore=/home/blaine/ca/cacert.store
30securityMechanism=DIGEST-MD5
31
32# To use an LDAP server that is totally unsecured, comment out the settings in
33# the previous block and enable the one setting here.
34# An unsecured server can be useful for educational purposes, but not for a
35# real application!
36#principalTemplate=uid=${username},ou=people,dc=admc,dc=com
37
38# PLAIN authentication, but StartTLS-encrypted.  Disable the block above
39# starting with "startTls=true" and enable the settings in this block.
40#principalTemplate=uid=${username},ou=people,dc=admc,dc=com
41
42# SASL DIGEST-MD5 with no encryption.  Disable the block above
43# starting with "startTls=true" and enable the settings in this block.
44#securityMechanism=DIGEST-MD5
45