Files
configpolicy/roles/grafana/templates/ldap.toml.j2
Dustin C. Hatch 7c654031f0 r/grafana: Allow configuring LDAP CA cert
The `grafana_ldap_root_ca_cert` can be used to set the path to the root
CA certificate (bundle) Grafana uses to validate the certificate
presented by the configured LDAP server.  By default, Grafana uses the
system root CA trust store, but this variable can be used in situations
where this is not suitable.
2022-08-11 21:40:19 -05:00

61 lines
2.3 KiB
Django/Jinja

# To troubleshoot and get more log info enable ldap debug logging in grafana.ini
# [log]
# filters = ldap:debug
[[servers]]
# Ldap server host (specify multiple hosts space separated)
host = "{{ grafana_ldap_host }}"
# Default port is 389 or 636 if use_ssl = true
port = {{ grafana_ldap_port|int }}
# Set to true if ldap server supports TLS
use_ssl = {{ grafana_ldap_ssl|bool|string|lower }}
# Set to true if connect ldap server with STARTTLS pattern (create connection in insecure, then upgrade to secure connection with TLS)
start_tls = {{ grafana_ldap_start_tls|bool|string|lower }}
# set to true if you want to skip ssl cert validation
ssl_skip_verify = false
# set to the path to your root CA certificate or leave unset to use system defaults
{% if grafana_ldap_root_ca_cert|d %}
root_ca_cert = "{{ grafana_ldap_root_ca_cert }}"
{% else %}
# root_ca_cert = "/path/to/certificate.crt"
{% endif %}
# Authentication against LDAP servers requiring client certificates
# client_cert = "/path/to/client.crt"
# client_key = "/path/to/client.key"
# Search user bind dn
bind_dn = "{{ grafana_ldap_bind_dn }}"
# Search user bind password
# If the password contains # or ; you have to wrap it with triple quotes. Ex """#password;"""
bind_password = '{{ grafana_ldap_bind_password }}'
# User search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)"
search_filter = "{{ grafana_ldap_search_filter }}"
# An array of base dns to search through
search_base_dns = {{ grafana_ldap_search_base_dns|to_json }}
## For Posix or LDAP setups that does not support member_of attribute you can define the below settings
## Please check grafana LDAP docs for examples
# group_search_filter = "(&(objectClass=posixGroup)(memberUid=%s))"
# group_search_base_dns = ["ou=groups,dc=grafana,dc=org"]
# group_search_filter_user_attribute = "uid"
# Specify names of the ldap attributes your ldap uses
[servers.attributes]
name = "{{ grafana_ldap_attr_name }}"
surname = "{{ grafana_ldap_attr_surname }}"
username = "{{ grafana_ldap_attr_username }}"
member_of = "{{ grafana_ldap_attr_member_of }}"
email = "{{ grafana_ldap_attr_email }}"
# Map ldap groups to grafana org roles
{% for mapping in grafana_ldap_group_mappings %}
[[servers.group_mappings]]
group_dn = "{{ mapping.group_dn }}"
org_role = "{{ mapping.org_role }}"
{% if mapping.grafana_admin|d %}
grafana_admin = true
{% endif %}
{% endfor %}