security: #Security configuration (LDAP, SAML, Password Policy, ...)
ldapSettings: #LDAP server(s) settings
ldap1: #The unique ID of the LDAP setting
emailAttribute: email1 #An attribute that can be used to map a user's email to a user created automatically by Artifactory
ldapPoisoningProtection: true #When set to true (recommended), Artifactory will protect against LDAP poisoning by filtering out users exposed to vulnerability
ldapUrl: ldap://myserver:myport/dc=sampledomain,dc=com #Location of the LDAP server in the following format: ldap://myserver:myport/dc=sampledomain,dc=com. The URL should include the base DN used to search for and/or authenticate users
search:
managerDn: manager1 #The full DN of a user with permissions that allow querying the LDAP server. When working with LDAP Groups, the user should have permissions for any extra group attributes such as memberOf
managerPassword: managerpass1 #The password of the user binding to the LDAP server when using "search" authentication
searchBase: searchbase1 #The Context name in which to search relative to the base DN in the LDAP URL. Multiple search bases may be specified separated by a pipe ( | ). This is parameter is optional
searchFilter: searchfilter1 #A filter expression used to search for the user DN that is used in LDAP authentication. Possible examples are: uid={0}) - this would search for a username match on the uid attribute. Authentication using LDAP is performed from the DN found if successful
searchSubTree: true #When set, enables deep search through the sub-tree of the LDAP URL + Search Base
userDnPattern: userppatt1 #A DN pattern used to log users directly in to the LDAP database. This pattern is used to create a DN string for "direct" user authentication, and is relative to the base DN in the LDAP URL. For example: uid={0},ou=People
allowUserToAccessProfile: false #When set, users created after logging in using LDAP will be able to access their profile page in Artifactory
autoCreateUser: true #When set, Artifactory will automatically create new users for those who have logged in using LDAP, and assign them to the default groups
enabled: true #When set, these settings are enabled