certmap.conf.5 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. .\" Hey, EMACS: -*- nroff -*-
  2. .\" First parameter, NAME, should be all caps
  3. .\" Second parameter, SECTION, should be 1-8, maybe w/ subsection
  4. .\" other parameters are allowed: see man(7), man(1)
  5. .TH CERTMAP.CONF 5 "Jun 26, 2018"
  6. .\" Please adjust this date whenever revising the manpage.
  7. .\"
  8. .\" Some roff macros, for reference:
  9. .\" .nh disable hyphenation
  10. .\" .hy enable hyphenation
  11. .\" .ad l left justify
  12. .\" .ad b justify to both left and right margins
  13. .\" .nf disable filling
  14. .\" .fi enable filling
  15. .\" .br insert line break
  16. .\" .sp <n> insert n+1 empty lines
  17. .\" for manpage-specific macros, see man(7)
  18. .SH NAME
  19. /etc/dirsrv/config/certmap.conf - Configuration file for TLS client authentication in 389 Directory Server.
  20. .SH SYNOPSIS
  21. /etc/dirsrv/config/certmap.conf
  22. .SH DESCRIPTION
  23. certmap.conf
  24. This file configures how a certificate is mapped to an LDAP entry. See the
  25. documentation for more information on this file: https://access.redhat.com/documentation/en-us/red_hat_directory_server/10/html/configuration_command_and_file_reference/configuration_file_reference#certmap_conf
  26. .SH SYNTAX
  27. The format of this file is as follows:
  28. .br
  29. certmap <name> <issuerDN>
  30. .br
  31. <name>:<prop1> [<val1>]
  32. .br
  33. <name>:<prop2> [<val2>]
  34. .br
  35. Notes:
  36. 1. Mapping can be defined per issuer of a certificate. If mapping doesn't
  37. exists for a particular 'issuerDN' then the server uses the default
  38. mapping.
  39. 2. There must be an entry for <name>=default and issuerDN "default".
  40. This mapping is the default mapping.
  41. 3. '#' can be used to comment out a line.
  42. 4. DNComps & FilterComps are used to form the base DN and filter responsible for
  43. performing an LDAP search while mapping the certificate to a user entry.
  44. .SH OPTIONS
  45. .IP DNComps
  46. The DNComps parameter determines how Directory Server generates the base DN
  47. used to search for a user in the directory. This setting accepts a comma
  48. separated list of attributes to form a DN. However, the order of the
  49. attributes in the DNComps parameter must match the order in the subject of the
  50. certificate. For example, if your certificate's subject is
  51. "[email protected],cn=user_name,o=Example Inc.,c=US", and you want
  52. Directory Server to use "cn=user_name,o=Example Inc.,c=US" as the base DN when
  53. searching for the user, set the DNComps parameter to "cn, o, c".
  54. Comment out or do not set this parameter, if either the subject field of the
  55. certificate matches exactly the DN of the user in Directory Server or if you
  56. want to use the setting from the CmapLdapAttr parameter.
  57. If the value is empty, it will search the entire LDAP tree by using the
  58. FilterComps parameter.
  59. .IP FilterComps
  60. This parameter sets which attributes from the subject field of the certificate
  61. Directory Server uses to generate the search filter to locate the user.
  62. Set this parameter to a comma-separated list of attributes used in the
  63. certificate's subject. Directory Server will use these attributes in an AND
  64. operation in the filter.
  65. Note - Certificate Subjects use the e attribute for the email address, which
  66. does not exist in the default Directory Server schema. For this reason,
  67. Directory Server automatically maps this attribute to the mail attribute. This
  68. means, if you use the mail attribute in the FilterComps parameter, Directory
  69. Server reads the value of the e attribute from the subject of the certificate.
  70. For example, if the subject of a certificate is
  71. "[email protected],cn=user_name,dc=example,dc=com,o=Example Inc.,c=US"
  72. and you want to dynamically generate the
  73. "(&(mail=username@domain)(cn=user_name))" filter, set the FilterComps parameter
  74. to "mail, cn".
  75. If the parameter is commented out or set to an empty value, the (objectclass=*) filter will be used.
  76. .IP verifycert
  77. Directory Server always verifies if the certificate has been issued by a
  78. trusted Certificate Authority (CA). However, if you additionally set the
  79. verifycert parameter to on, Directory Server additionally verifies that the
  80. certificate matches the Distinguished Encoding Rules (DER)-formatted
  81. certificate stored in the userCertificate binary attribute of the user.
  82. If you do not set this parameter, verifycert is disabled
  83. .IP CmapLdapAttr
  84. If your user entries contain an attribute that stores the subject DN of the
  85. user certificate, set the CmapLdapAttr to this attribute name. Directory Server
  86. will use this attribute and the subject DN to locate the user. In this case the
  87. no filter is generated based on the attributes in the FilterComps parameter.
  88. .SH EXAMPLES
  89. certmap default default
  90. .br
  91. default:DNComps cn, o, c
  92. .br
  93. #default:FilterComps e, uid
  94. .br
  95. #default:verifycert on
  96. .br
  97. #default:CmapLdapAttr certSubjectDN
  98. .br
  99. .sp 1
  100. certmap example o=Example Inc.,c=US
  101. .br
  102. example:DNComps
  103. .br
  104. .SH AUTHOR
  105. certmap.conf was written by the 389 Project.
  106. .SH "REPORTING BUGS"
  107. Report bugs to https://github.com/389ds/389-ds-base/issues/new
  108. .SH COPYRIGHT
  109. Copyright \(co 2018 Red Hat, Inc.