@@ -164,12 +164,35 @@ enabled = true
164
164
port = 389
165
165
166
166
# Security mode for LDAP connection to this server.
167
- # The recommended security is set "starttls" by default. This uses an initial unencrypted connection
168
- # and upgrades to TLS as the first action against the server,
169
- # per the LDAPv3 standard.
170
- # Other options are "starttls+insecure" to behave the same as starttls
171
- # but skip server certificate verification, or "none" to use an unencrypted connection.
167
+ # Valid settings: none, starttls, starttls+insecure, ldaps, ldaps+insecure.
168
+ # The recommended security is "starttls", which is the default. This uses
169
+ # an initial unencrypted connection and upgrades to TLS as the first action
170
+ # against the server, per the LDAPv3 standard.
171
+ # Another secure option is "ldaps", which starts the connection over
172
+ # TLS instead of upgrading like "starttls". This generally requires a
173
+ # dedicated port (usually 636). "starttls" is generally preferred
174
+ # to "ldaps".
175
+ # Other options are "starttls+insecure" and "ldaps+insecure" which behave
176
+ # the same as "starttls" and and "ldaps" respectively, except they ignore
177
+ # server certificate verification errors.
178
+ # Finally, "none" does not use TLS. This is not recommended for
179
+ # production systems.
172
180
security = "starttls"
181
+
182
+ # Client certificates to present to the LDAP server are supported with
183
+ # "client-tls-certificate" and "client-tls-private-key" configurations.
184
+ # These are paths to the X.509 client certificate and corresponding private
185
+ # key, respectively. If "client-tls-certificate" is set but
186
+ # "client-tls-private-key" is not, then "client-tls-certificate" is assumed
187
+ # to bundle both the certificate and private key.
188
+ # The LDAP server may request and require valid client certificates
189
+ # even when InfluxDB is configured with an insecure TLS mode that ignores
190
+ # LDAP server certificate errors.
191
+ # Not all LDAP servers will request a client certificate. It is not
192
+ # necessary to set "client-tls-certificate" and "client-tls-private-key"
193
+ # if the LDAP server does not require client certificates.
194
+ client-tls-certificate = "/var/run/secrets/ldapClient.pem"
195
+ client-tls-private-key = "/var/run/secrets/ldapClient.key"
173
196
174
197
# Credentials to use when searching for a user or group.
175
198
bind-dn = "cn=read-only-admin,dc=example,dc=com"
0 commit comments