-
Notifications
You must be signed in to change notification settings - Fork 7
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #18 from zanox/master
Add LDAP config section
- Loading branch information
Showing
4 changed files
with
85 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
# Set to true to log user information returned from LDAP | ||
verbose_logging = false | ||
|
||
[[servers]] | ||
# Ldap server host (specify multiple hosts space separated) | ||
host = "127.0.0.1" | ||
# Default port is 389 or 636 if use_ssl = true | ||
port = 389 | ||
# Set to true if ldap server supports TLS | ||
use_ssl = false | ||
# set to true if you want to skip ssl cert validation | ||
ssl_skip_verify = false | ||
# set to the path to your root CA certificate or leave unset to use system defaults | ||
# root_ca_cert = /path/to/certificate.crt | ||
|
||
# Search user bind dn | ||
bind_dn = "cn=admin,dc=grafana,dc=org" | ||
# Search user bind password | ||
bind_password = 'grafana' | ||
|
||
# User search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)" | ||
search_filter = "(cn=%s)" | ||
|
||
# An array of base dns to search through | ||
search_base_dns = ["dc=grafana,dc=org"] | ||
|
||
# In POSIX LDAP schemas, without memberOf attribute a secondary query must be made for groups. | ||
# This is done by enabling group_search_filter below. You must also set member_of= "cn" | ||
# in [servers.attributes] below. | ||
|
||
## Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available) | ||
# group_search_filter = "(&(objectClass=posixGroup)(memberUid=%s))" | ||
## An array of the base DNs to search through for groups. Typically uses ou=groups | ||
# group_search_base_dns = ["ou=groups,dc=grafana,dc=org"] | ||
|
||
# Specify names of the ldap attributes your ldap uses | ||
[servers.attributes] | ||
name = "givenName" | ||
surname = "sn" | ||
username = "cn" | ||
member_of = "memberOf" | ||
email = "email" | ||
|
||
# Map ldap groups to grafana org roles | ||
[[servers.group_mappings]] | ||
group_dn = "cn=admins,dc=grafana,dc=org" | ||
org_role = "Admin" | ||
# The Grafana organization database id, optional, if left out the default org (id 1) will be used | ||
# org_id = 1 | ||
|
||
[[servers.group_mappings]] | ||
group_dn = "cn=users,dc=grafana,dc=org" | ||
org_role = "Editor" | ||
|
||
[[servers.group_mappings]] | ||
# If you want to match all (or no ldap groups) then you can use wildcard | ||
group_dn = "*" | ||
org_role = "Viewer" |