Server IP : 85.214.239.14 / Your IP : 18.119.134.196 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/3/root/usr/share/augeas/lenses/dist/tests/ |
Upload File : |
(* Module Jaas *) (* Author: Simon Vocella <voxsim@gmail.com> *) module Test_jaas = let conf = " /* This is the JAAS configuration file used by the Shibboleth IdP. A JAAS configuration file is a grouping of LoginModules defined in the following manner: <LoginModuleClass> <Flag> <ModuleOptions>; LoginModuleClass - fully qualified class name of the LoginModule class Flag - indicates whether the requirement level for the modules; allowed values: required, requisite, sufficient, optional ModuleOptions - a space delimited list of name=\"value\" options For complete documentation on the format of this file see: http://java.sun.com/j2se/1.5.0/docs/api/javax/security/auth/login/Configuration.html For LoginModules available within the Sun JVM see: http://java.sun.com/j2se/1.5.0/docs/guide/security/jaas/tutorials/LoginConfigFile.html Warning: Do NOT use Sun's JNDI LoginModule to authentication against an LDAP directory, Use the LdapLoginModule that ships with Shibboleth and is demonstrated below. Note, the application identifier MUST be ShibUserPassAuth */ ShibUserPassAuth { // Example LDAP authentication // See: https://wiki.shibboleth.net/confluence/display/SHIB2/IdPAuthUserPass /* edu.vt.middleware.ldap.jaas.LdapLoginModule required ldapUrl=\"ldap://ldap.example.org\" baseDn=\"ou=people,dc=example,dc=org\" ssl=\"true\" userFilter=\"uid={0}\"; */ // Example Kerberos authentication, requires Sun's JVM // See: https://wiki.shibboleth.net/confluence/display/SHIB2/IdPAuthUserPass /* com.sun.security.auth.module.Krb5LoginModule required useKeyTab=\"true\" keyTab=\"/path/to/idp/keytab/file\"; */ edu.vt.middleware.ldap.jaas.LdapLoginModule required host = \"ldap://127.0.0.1:389\" base = \"dc=example,dc=com\" serviceUser = \"cn=admin,dc=example,dc=com\" serviceCredential = \"ldappassword\" ssl = \"false\" userField = \"uid\" // Example comment within definition subtreeSearch = \"true\"; }; NetAccountAuth { // Test of optionless flag nz.ac.auckland.jaas.Krb5LoginModule required; }; com.sun.security.jgss.krb5.initiate { // Test of omitted linebreaks and naked boolean com.sun.security.auth.module.Krb5LoginModule required useTicketCache=true; };" test Jaas.lns get conf = { } { "#mcomment" { "1" = "This is the JAAS configuration file used by the Shibboleth IdP." } { "2" = "A JAAS configuration file is a grouping of LoginModules defined in the following manner:" } { "3" = "<LoginModuleClass> <Flag> <ModuleOptions>;" } { "4" = "LoginModuleClass - fully qualified class name of the LoginModule class" } { "5" = "Flag - indicates whether the requirement level for the modules;" } { "6" = "allowed values: required, requisite, sufficient, optional" } { "7" = "ModuleOptions - a space delimited list of name=\"value\" options" } { "8" = "For complete documentation on the format of this file see:" } { "9" = "http://java.sun.com/j2se/1.5.0/docs/api/javax/security/auth/login/Configuration.html" } { "10" = "For LoginModules available within the Sun JVM see:" } { "11" = "http://java.sun.com/j2se/1.5.0/docs/guide/security/jaas/tutorials/LoginConfigFile.html" } { "12" = "Warning: Do NOT use Sun's JNDI LoginModule to authentication against an LDAP directory," } { "13" = "Use the LdapLoginModule that ships with Shibboleth and is demonstrated below." } { "14" = "Note, the application identifier MUST be ShibUserPassAuth" } } { } { } { "login" = "ShibUserPassAuth" { } { "#comment" = "Example LDAP authentication" } { "#comment" = "See: https://wiki.shibboleth.net/confluence/display/SHIB2/IdPAuthUserPass" } { "#mcomment" { "1" = "edu.vt.middleware.ldap.jaas.LdapLoginModule required" } { "2" = "ldapUrl=\"ldap://ldap.example.org\"" } { "3" = "baseDn=\"ou=people,dc=example,dc=org\"" } { "4" = "ssl=\"true\"" } { "5" = "userFilter=\"uid={0}\";" } } { } { "#comment" = "Example Kerberos authentication, requires Sun's JVM" } { "#comment" = "See: https://wiki.shibboleth.net/confluence/display/SHIB2/IdPAuthUserPass" } { "#mcomment" { "1" = "com.sun.security.auth.module.Krb5LoginModule required" } { "2" = "useKeyTab=\"true\"" } { "3" = "keyTab=\"/path/to/idp/keytab/file\";" } } { } { "loginModuleClass" = "edu.vt.middleware.ldap.jaas.LdapLoginModule" { "flag" = "required" { "host" = "\"ldap://127.0.0.1:389\"" } { "base" = "\"dc=example,dc=com\"" } { "serviceUser" = "\"cn=admin,dc=example,dc=com\"" } { "serviceCredential" = "\"ldappassword\"" } { "ssl" = "\"false\"" } { "userField" = "\"uid\"" } { "#comment" = "Example comment within definition" } { "subtreeSearch" = "\"true\"" } } } { } } { } { } { "login" = "NetAccountAuth" { "#comment" = "Test of optionless flag" } { "loginModuleClass" = "nz.ac.auckland.jaas.Krb5LoginModule" { "flag" = "required" } } { } } { } { } { "login" = "com.sun.security.jgss.krb5.initiate" { "#comment" = "Test of omitted linebreaks and naked boolean" } { "loginModuleClass" = "com.sun.security.auth.module.Krb5LoginModule" { "flag" = "required" { "useTicketCache" = "true" } } } { } }