2021-06-15 23:59:41 +02:00
|
|
|
# You should not need to edit this file. Instead, use a drop-in file:
|
|
|
|
# systemctl edit kanidm-unixd.service
|
|
|
|
|
|
|
|
[Unit]
|
|
|
|
Description=Kanidm Local Client Resolver
|
|
|
|
After=chronyd.service ntpd.service network-online.target
|
2023-11-16 04:12:55 +01:00
|
|
|
Before=systemd-user-sessions.service nss-user-lookup.target
|
|
|
|
Wants=nss-user-lookup.target
|
2021-06-15 23:59:41 +02:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
DynamicUser=yes
|
2023-06-21 12:33:01 +02:00
|
|
|
SupplementaryGroups=tss
|
2021-06-15 23:59:41 +02:00
|
|
|
UMask=0027
|
|
|
|
CacheDirectory=kanidm-unixd
|
|
|
|
RuntimeDirectory=kanidm-unixd
|
2023-11-27 05:35:59 +01:00
|
|
|
StateDirectory=kanidm-unixd
|
2021-06-15 23:59:41 +02:00
|
|
|
|
|
|
|
Type=simple
|
|
|
|
ExecStart=/usr/sbin/kanidm_unixd
|
|
|
|
|
2023-11-27 05:35:59 +01:00
|
|
|
## If you wish to setup an external HSM pin you should set:
|
|
|
|
# LoadCredential=hsmpin:/etc/kanidm/kanidm-unixd-hsm-pin
|
|
|
|
# Environment=KANIDM_HSM_PIN_PATH=%d/hsmpin
|
|
|
|
|
2021-06-15 23:59:41 +02:00
|
|
|
# Implied by dynamic user.
|
|
|
|
# ProtectHome=
|
|
|
|
# ProtectSystem=strict
|
|
|
|
# ReadWritePaths=/var/run/kanidm-unixd /var/cache/kanidm-unixd
|
|
|
|
|
|
|
|
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
|
|
|
NoNewPrivileges=true
|
|
|
|
PrivateTmp=true
|
2023-06-21 12:33:01 +02:00
|
|
|
# We have to disable this to allow tpmrm0 access for tpm binding.
|
|
|
|
PrivateDevices=false
|
2021-06-15 23:59:41 +02:00
|
|
|
ProtectHostname=true
|
|
|
|
ProtectClock=true
|
|
|
|
ProtectKernelTunables=true
|
|
|
|
ProtectKernelModules=true
|
|
|
|
ProtectKernelLogs=true
|
|
|
|
ProtectControlGroups=true
|
|
|
|
MemoryDenyWriteExecute=true
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|