fix#1584-custom_attr_allowlist (#1636)
Signed-off-by: cwillum <cwmmoore@amazon.com> Signed-off-by: cwillum <cwmmoore@amazon.com>
This commit is contained in:
parent
da65102881
commit
73f74366a5
|
@ -431,9 +431,11 @@ rolesearch_enabled: false
|
|||
|
||||
By default, the security plugin reads all LDAP user attributes and makes them available for index name variable substitution and DLS query variable substitution. If your LDAP entries have a lot of attributes, you might want to control which attributes should be made available. The fewer the attributes, the better the performance.
|
||||
|
||||
Note that this setting is made in the authentication `authc` section of the config.yml file.
|
||||
|
||||
Name | Description
|
||||
:--- | :---
|
||||
`custom_attr_whitelist` | String array. Specifies the LDAP attributes that should be made available for variable substitution.
|
||||
`custom_attr_allowlist` | String array. Specifies the LDAP attributes that should be made available for variable substitution.
|
||||
`custom_attr_maxval_len` | Integer. Specifies the maximum allowed length of each attribute. All attributes longer than this value are discarded. A value of `0` disables custom attributes altogether. Default is 36.
|
||||
|
||||
Example:
|
||||
|
@ -446,7 +448,7 @@ authc:
|
|||
authentication_backend:
|
||||
type: ldap
|
||||
config:
|
||||
custom_attr_whitelist:
|
||||
custom_attr_allowlist:
|
||||
- attribute1
|
||||
- attribute2
|
||||
custom_attr_maxval_len: 36
|
||||
|
|
Loading…
Reference in New Issue