From 44d1d1bb36f5352464f30034ae29536dcfdf68e8 Mon Sep 17 00:00:00 2001 From: nd Date: Fri, 12 Mar 2021 23:12:57 +0100 Subject: [PATCH] fixup! added readme --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 73c2cba..192d995 100644 --- a/README.md +++ b/README.md @@ -48,9 +48,9 @@ web: # group_search: 'LDAPSearch("ou=groups,dc=example,dc=com", ldap.SCOPE_ONELEVEL, "(objectClass=groupOfUniqueNames)")' # group_type: 'GroupOfUniqueNamesType()' # a search that musst return **all** users and select the attribute containing the user name. Only used for ldap sync -# user_search_all_name: 'LDAPSearch("ou=users,dc=cccv,dc=de", ldap.SCOPE_ONELEVEL, "(&(objectClass=posixAccount)(memberOf=cn=service_mailman_access,ou=groups,dc=cccv,dc=de))", ["uid"])' +# user_search_all_name: 'LDAPSearch("ou=users,dc=example,dc=com", ldap.SCOPE_ONELEVEL, "(&(objectClass=posixAccount)(memberOf=cn=service_mailman_access,ou=groups,dc=example,dc=com))", ["uid"])' # see https://django-auth-ldap.readthedocs.io/en/latest/ -# user_filter: 'uid=%(user)s,ou=users,dc=cccv,dc=de' +# user_filter: 'uid=%(user)s,ou=users,dc=example,dc=com' # optionaly set a ca cert or other connection settings # options: "{ ldap.OPT_X_TLS_CACERTFILE: '/etc/ssl/myfancy.ca', ldap.OPT_X_TLS_REQUIRE_CERT: True, ldap.OPT_X_TLS_NEWCTX: 0 }" # map django roles