Skip to content

Commit ed512f2

Browse files
author
Anton Ustyuzhanin
committed
Update README.md
1 parent 2079d0e commit ed512f2

File tree

1 file changed

+64
-11
lines changed

1 file changed

+64
-11
lines changed

README.md

Lines changed: 64 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,69 @@ None
1313
Role Variables
1414
--------------
1515

16-
You can override variables in your group_vars
17-
18-
- `sssd_ldap_search_base: dc=example,dc=org`
19-
- `sssd_ldap_user_search_base: see sssd-ldap man page`
20-
- `sssd_ldap_group_search_base: see sssd-ldap man page`
21-
- `sssd_ldap_uri: ldap://example.org`
22-
- `sssd_ldap_default_bind_dn: cn=manager,dc=example,dc=org`
23-
- `sssd_ldap_default_authtok: bind_password`
24-
- `sssd_ldap_user_ssh_public_key: sshPublicKey`
25-
- `sssd_ldap_override_gid: 500`
16+
Role configuration aimed to be similar to SSSD configuration. But, not all configuration options,
17+
supported in `sssd.conf` are available in role variables with the same names. If you setup needs some options that not presented
18+
feel free to create pull requests. You can find available options in `defaults/main.yml` and `templates/sssd.conf.j2`
19+
20+
`[sssd]` section allows to configure following options options:
21+
22+
sssd_defaults:
23+
# Debug level for:
24+
# Fatal failures, Critical failures, Serious failures
25+
# Configuration settings, Function data
26+
debug_level: '0x0370'
27+
services: nss,pam,ssh
28+
29+
`[nss]` section allows to configure following options options:
30+
31+
sssd_nss:
32+
filter_users: root
33+
filter_groups: root
34+
35+
Some default values for domain specific configuration options are:
36+
37+
sssd_domain_defaults:
38+
id_provider: ldap
39+
auth_provider: ldap
40+
enumerate: 'false'
41+
ldap_uri: ldap://localhost
42+
ldap_id_use_start_tls: 'false'
43+
ldap_tls_reqcert: never
44+
ldap_default_bind_dn: cn=manager,dc=example,dc=org
45+
ldap_default_authtok_type: password
46+
ldap_default_authtok: bind_password
47+
ldap_search_base: dc=example,dc=org
48+
49+
Role supports configuring multiple domains using following syntax:
50+
(see sssd man pages for more information)
51+
52+
sssd_domains:
53+
- name: domain_name
54+
id_provider:
55+
auth_provider:
56+
ldap_uri:
57+
ldap_id_use_start_tls:
58+
ldap_tls_reqcert:
59+
ldap_default_bind_dn:
60+
ldap_default_authtok_type:
61+
ldap_default_authtok:
62+
ldap_search_base:
63+
ldap_user_search_base:
64+
ldap_user_object_class:
65+
ldap_user_name:
66+
ldap_user_uid_number:
67+
ldap_user_gid_number:
68+
ldap_user_ssh_public_key:
69+
ldap_user_email:
70+
override_gid:
71+
ldap_group_search_base:
72+
ldap_group_object_class:
73+
ldap_group_name:
74+
ldap_group_gid_number:
75+
ldap_group_member:
76+
77+
Options that are listed in `sssd_domain_defaults` will allways be present in `sssd.conf`,
78+
other options can be omitted.
2679

2780
Dependencies
2881
------------
@@ -36,7 +89,7 @@ An example of how to use the role:
3689

3790
- hosts: servers
3891
roles:
39-
- { role: sssd-ldap }
92+
- { role: ansible-sssd-ldap }
4093

4194
License
4295
-------

0 commit comments

Comments
 (0)