# Turn on security
dbms.security.auth_enabled=true
# Choose LDAP connector as security provider for both authentication and authorization
dbms.security.auth_provider=ldap
# Configure LDAP to point to the AD server
# Provide details on user structure within the LDAP system:
dbms.security.ldap.authorization.user_search_base=cn=dc=example,dc=net
dbms.security.ldap.authorization.user_search_filter=(&(objectClass=*)(sAMAccountName={0}))
dbms.security.ldap.authorization.group_membership_attributes=memberOf
# Configure the actual mapping between groups in the LDAP system and roles in Neo4j
dbms.security.ldap.authorization.group_to_role_mapping=\
"CN=A-BloodHound-RO,OU=Application Groups,OU=Users and Groups,DC=example,DC=net" = reader ;\
"CN=P-BloodHound-Admin,OU=Privileged Groups,OU=Users and Groups,DC=example,DC=net" = admin