kanidm/examples/kanidm
James Hodgkinson 60f9541cdd
RADIUS fixes (#942)
* actually writing cert files properly now
* Updated readme with config file, fixed check for config file.
* minor tweaks to actions, removing job limits and skipping login to registry if not going to push
* removing old config.ini file
* temporarily adding Williams fixed package
2022-07-22 13:04:36 +10:00

46 lines
1.6 KiB
Plaintext

# This should be at /etc/kanidm/config or ~/.config/kanidm,
# and configures kanidm clients including the FreeRADIUS server
uri = "https://idm.example.com"
# TODO: document this
# verify_ca = true
# enable (default) or disable TLS certificate verification
# verify_certificate = true
# enable (default) or disable TLS certificate hostname verification
# verify_hostnames = true
# an optional path to the CA certificate for the server URI above
# ca_path = "/etc/kanidm/cacert.pem"
# when configuring the FreeRADIUS server, set the service account details here
username = "radius_service_account"
password = "cr4bzr0ol"
radius_cert_path = "/certs/cert.pem" # the TLS certificate
radius_key_path = "/certs/key.pem" # the signing key for radius TLS
radius_dh_path = "/certs/dh.pem" # the diffie-hellman output
radius_ca_path = "/certs/ca.pem" # the CA certificate
# A list of groups, if a user is in them, they're approved for RADIUS authentication
radius_required_groups = [
"radius_access_allowed",
]
# A mapping between Kanidm groups and VLANS
radius_groups = [
{ name = "radius_access_allowed", vlan = 10 },
]
# The default VLAN if the user does not fit into another group
radius_default_vlan = 1
# A list of radius clients and their passwords, which are allowed to connect,
# typically network devices like switches and access points.
radius_clients = [
{ name = "test", ipaddr = "127.0.0.1", secret = "testing123" },
{ name = "docker" , ipaddr = "172.17.0.0/16", secret = "testing123" },
]
# The client connection timeout, in seconds.
connect_timeout = 30