# Audit only works if ldap.server.type == openldap:
enable.audit=true
# Used for SSL Connection to LDAP Server:
enable.ldap.ssl=true
#enable.ldap.ssl.debug=${enable.ldap.ssl.debug}
#trust.store=${trust.store}
#trust.store.password=${trust.store.password}
#trust.store.set.prop=${trust.store.set.prop}
# Used for SSL Demo with Tomcat:
#key.store=${key.store}
#key.store.password=${key.store.password}
# These credentials are used for read/write access to all nodes under suffix:
admin.user=cn=admin,dc=psu,dc=edu
# LDAP admin root pass is encrypted using 'encrypt' target in build.xml:
admin.pw=secret
# This is min/max settings for LDAP administrator pool connections that have read/write access to all nodes under suffix:
min.admin.conn=1
max.admin.conn=10
# This is min/max connection pool settings for LDAP User authentication connection pool:
min.user.conn=1
max.user.conn=10
# This node contains fortress properties stored on behalf of connecting LDAP clients:
config.realm=DEFAULT
config.root=ou=Config,dc=psu,dc=edu
# enable this to see trace statements when connection pool allocates new connections:
debug.ldap.pool=true
# Default for pool reconnect flag is false:
enable.pool.reconnect=true
crypto.prop=${crypto.prop}
ehcache.config.file=ehcache.xml
# If for any reason echcache must be DISABLED for DSD, make sure this parameter is set to 'true' which is the default. Otherwise performance penalty will be incurred during multi-role activations.
disable.dsd.cache=false
# This will override default LDAP manager implementations for the RESTful ones: