kanidm/examples/kanidm
2024-10-15 01:28:07 +00:00

44 lines
1.5 KiB
Plaintext

# This should be at /etc/kanidm/config or ~/.config/kanidm,
# and configures kanidm clients including the FreeRADIUS server
uri = "https://idm.example.com"
# TODO: document this
# verify_ca = true
# enable (default) or disable TLS certificate hostname verification
# verify_hostnames = true
# an optional path to the CA certificate for the server URI above
# ca_path = "/etc/kanidm/cacert.pem"
# when configuring the FreeRADIUS server, set the service account details here
# auth_token = "putyourtokenhere"
# radius_cert_path = "/certs/cert.pem" # the TLS certificate
# radius_key_path = "/certs/key.pem" # the signing key for radius TLS
# radius_ca_path = "/certs/ca.pem" # the CA certificate
# radius_dh_path = "/certs/dh.pem" # the diffie-hellman output
# A list of groups, if a user is in them, they're approved for RADIUS authentication
# radius_required_groups = [
# "radius_access_allowed",
# ]
# A mapping between Kanidm groups and VLANS
# radius_groups = [
# { spn = "radius_access_allowed", vlan = 10 },
# ]
# The default VLAN if the user does not fit into another group
# radius_default_vlan = 1
# A list of radius clients and their passwords, which are allowed to connect,
# typically network devices like switches and access points.
# radius_clients = [
# { name = "test", ipaddr = "127.0.0.1", secret = "testing123" },
# { name = "docker" , ipaddr = "172.17.0.0/16", secret = "testing123" },
# ]
# The client connection timeout, in seconds.
connect_timeout = 30