--- enable_backup: False ldap_entries: [] ldap_server_domain: "{{ ansible_domain }}" # Internal value, base DN. ldap_server_int_basedn: "{{ ldap_server_domain | regex_replace('\\.', ',dc=') | regex_replace('^', 'dc=') }}" ldap_server_organization: "Private" ldap_server_log_level: 256 ldap_server_tls_certificate: "{{ lookup('file', tls_certificate_dir + '/' + ansible_fqdn + '_ldap.pem') }}" ldap_server_tls_key: "{{ lookup('file', tls_private_key_dir + '/' + ansible_fqdn + '_ldap.key') }}" ldap_server_ssf: 128 ldap_server_consumers: [] ldap_server_groups: [] ldap_permissions: - > to * by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth manage by dn="cn=admin,{{ ldap_server_int_basedn }}" manage by * break - > to attrs=userPassword,shadowLastChange by self write by anonymous auth by * none - > to dn.base="" by * read - > to * by self write by dn="cn=admin,{{ ldap_server_int_basedn }}" write by users read by * none ldap_tls_ciphers: "NONE:+VERS-TLS1.2:+CTYPE-X509:+COMP-NULL:+SIGN-RSA-SHA256:+SIGN-RSA-SHA384:+SIGN-RSA-SHA512:+DHE-RSA:+ECDHE-RSA:+SHA256:+SHA384:+AEAD:+AES-128-GCM:+AES-128-CBC:+AES-256-GCM:+AES-256-CBC:+CURVE-ALL"