aboutsummaryrefslogtreecommitdiffstats
path: root/sonar-application
diff options
context:
space:
mode:
authorEric Hartmann <hartmann.eric@gmail.com>2018-05-23 10:43:49 +0200
committerSonarTech <sonartech@sonarsource.com>2018-06-12 20:20:58 +0200
commit8f2af01262397b3d5efc5faffdb3b7c2e9e342e5 (patch)
treed1ae42ee2cce8ae5881bb6d23a8103f73acc3186 /sonar-application
parentcbf8cf43e9b606681e63454dbfd83d2472c837c6 (diff)
downloadsonarqube-8f2af01262397b3d5efc5faffdb3b7c2e9e342e5.tar.gz
sonarqube-8f2af01262397b3d5efc5faffdb3b7c2e9e342e5.zip
SONAR-10688 Bundle LDAP plugin by default
Diffstat (limited to 'sonar-application')
-rw-r--r--sonar-application/build.gradle1
-rw-r--r--sonar-application/src/main/assembly/conf/sonar.properties60
2 files changed, 61 insertions, 0 deletions
diff --git a/sonar-application/build.gradle b/sonar-application/build.gradle
index 1e2b96d8979..0ad23e38625 100644
--- a/sonar-application/build.gradle
+++ b/sonar-application/build.gradle
@@ -58,6 +58,7 @@ dependencies {
bundledPlugin 'org.sonarsource.scm.svn:sonar-scm-svn-plugin:1.7.0.1017@jar'
bundledPlugin 'org.sonarsource.typescript:sonar-typescript-plugin:1.6.0.2388@jar'
bundledPlugin 'org.sonarsource.xml:sonar-xml-plugin:1.5.0.1373@jar'
+ bundledPlugin 'org.sonarsource.ldap:sonar-ldap-plugin:2.2.0.608@jar'
testCompile 'junit:junit'
testCompile 'org.assertj:assertj-core'
diff --git a/sonar-application/src/main/assembly/conf/sonar.properties b/sonar-application/src/main/assembly/conf/sonar.properties
index 4a254d6b4cf..5be7aa19bac 100644
--- a/sonar-application/src/main/assembly/conf/sonar.properties
+++ b/sonar-application/src/main/assembly/conf/sonar.properties
@@ -174,6 +174,66 @@
# During this interval, if for instance the name of the user is changed in the header, it will only be updated after X minutes.
#sonar.web.sso.refreshIntervalInMinutes=5
+#--------------------------------------------------------------------------------------------------
+# LDAP CONFIGURATION
+
+# Enable the LDAP feature
+# sonar.security.realm=LDAP
+
+# Set to true when connecting to a LDAP server using a case-insensitive setup.
+# sonar.authenticator.downcase=true
+
+# URL of the LDAP server. Note that if you are using ldaps, then you should install the server certificate into the Java truststore.
+# ldap.url=ldap://localhost:10389
+
+# Bind DN is the username of an LDAP user to connect (or bind) with. Leave this blank for anonymous access to the LDAP directory (optional)
+# ldap.bindDn=cn=sonar,ou=users,o=mycompany
+
+# Bind Password is the password of the user to connect with. Leave this blank for anonymous access to the LDAP directory (optional)
+# ldap.bindPassword=secret
+
+# Possible values: simple | CRAM-MD5 | DIGEST-MD5 | GSSAPI See http://java.sun.com/products/jndi/tutorial/ldap/security/auth.html (default: simple)
+# ldap.authentication=simple
+
+# See :
+# * http://java.sun.com/products/jndi/tutorial/ldap/security/digest.html
+# * http://java.sun.com/products/jndi/tutorial/ldap/security/crammd5.html
+# (optional)
+# ldap.realm=example.org
+
+# Context factory class (optional)
+# ldap.contextFactoryClass=com.sun.jndi.ldap.LdapCtxFactory
+
+# Enable usage of StartTLS (default : false)
+# ldap.StartTLS=true
+
+# Follow or not referrals. See http://docs.oracle.com/javase/jndi/tutorial/ldap/referral/jndi.html (default: true)
+# ldap.followReferrals=false
+
+# USER MAPPING
+
+# Distinguished Name (DN) of the root node in LDAP from which to search for users (mandatory)
+# ldap.user.baseDn=cn=users,dc=example,dc=org
+
+# LDAP user request. (default: (&(objectClass=inetOrgPerson)(uid={login})) )
+# ldap.user.request=(&(objectClass=user)(sAMAccountName={login}))
+
+# Attribute in LDAP defining the user’s real name. (default: cn)
+# ldap.user.realNameAttribute=name
+
+# Attribute in LDAP defining the user’s email. (default: mail)
+# ldap.user.emailAttribute=email
+
+# GROUP MAPPING
+
+# Distinguished Name (DN) of the root node in LDAP from which to search for groups. (optional, default: empty)
+# ldap.group.baseDn=cn=groups,dc=example,dc=org
+
+# LDAP group request (default: (&(objectClass=groupOfUniqueNames)(uniqueMember={dn})) )
+# ldap.group.request=(&(objectClass=group)(member={dn}))
+
+# Property used to specifiy the attribute to be used for returning the list of user groups in the compatibility mode. (default: cn)
+# ldap.group.idAttribute=sAMAccountName
#--------------------------------------------------------------------------------------------------
# COMPUTE ENGINE