1default.conf(5) IPA Manual Pages default.conf(5)
2
3
4
6 default.conf - IPA configuration file
7
9 /etc/ipa/default.conf, ~/.ipa/default.conf, /etc/ipa/server.conf,
10 /etc/ipa/cli.conf
11
13 The default.conf configuration file is used to set system-wide defaults
14 to be applied when running IPA clients and servers.
15
16 Users may create an optional configuration file in ~/.ipa/default.conf
17 which will be merged into the system-wide defaults file.
18
19 The following files are read, in order:
20 ~/.ipa/default.conf
21 /etc/ipa/<context>.conf
22 /etc/ipa/default.conf
23 built-in constants
24
25 The IPA server does not read ~/.ipa/default.conf.
26
27 The first setting wins.
28
30 The configuration options are not case sensitive. The values may be
31 case sensitive, depending on the option.
32
33 Blank lines are ignored. Lines beginning with # are comments and are
34 ignored.
35
36 Valid lines consist of an option name, an equals sign and a value. Spa‐
37 ces surrounding equals sign are ignored. An option terminates at the
38 end of a line.
39
40 Values should not be quoted, the quotes will not be stripped.
41
42 # Wrong - don't include quotes
43 verbose = "True"
44
45 # Right - Properly formatted options
46 verbose = True
47 verbose=True
48
49 Options must appear in the section named [global]. There are no other
50 sections defined or used currently.
51
52 Options may be defined that are not used by IPA. Be careful of mis‐
53 spellings, they will not be rejected.
54
56 The following options are relevant for the server:
57
58 basedn <base>
59 Specifies the base DN to use when performing LDAP operations.
60 The base must be in DN format (dc=example,dc=com).
61
62 ca_agent_port <port>
63 Specifies the secure CA agent port. The default is 8443.
64
65 ca_host <hostname>
66 Specifies the hostname of the dogtag CA server. The default is
67 the hostname of the IPA server.
68
69 ca_port <port>
70 Specifies the insecure CA end user port. The default is 8080.
71
72 certmonger_wait_timeout <seconds>
73 The time to wait for a certmonger request to complete during in‐
74 stallation. The default value is 300 seconds.
75
76 context <context>
77 Specifies the context that IPA is being executed in. IPA may op‐
78 erate differently depending on the context. The current defined
79 contexts are cli, server and dns. Additionally this value is
80 used to load /etc/ipa/context.conf to provide context-specific
81 configuration. For example, if you want to always perform client
82 requests in verbose mode but do not want to have verbose enabled
83 on the server, add the verbose option to /etc/ipa/cli.conf.
84
85 debug <boolean>
86 When True provides detailed information. Specifically this set
87 the global log level to "debug". Default is False.
88
89 dogtag_version <version>
90 Stores the version of Dogtag. Value 9 is assumed if not speci‐
91 fied otherwise.
92
93 domain <domain>
94 The domain of the IPA server e.g. example.com.
95
96 enable_ra <boolean>
97 Specifies whether the CA is acting as an RA agent, such as when
98 dogtag is being used as the Certificate Authority. This setting
99 only applies to the IPA server configuration.
100
101 fallback <boolean>
102 Specifies whether an IPA client should attempt to fall back and
103 try other services if the first connection fails.
104
105 host <hostname>
106 Specifies the local system hostname.
107
108 http_timeout <seconds>
109 Timeout for HTTP blocking requests (e.g. connection). The de‐
110 fault value is 30 seconds.
111
112 in_server <boolean>
113 Specifies whether requests should be forwarded to an IPA server
114 or handled locally. This is used internally by IPA in a similar
115 way as context. The same IPA framework is used by the ipa com‐
116 mand-line tool and the server. This setting tells the framework
117 whether it should execute the command as if on the server or
118 forward it via XML-RPC to a remote server.
119
120 in_tree <boolean>
121 This is used in development and is generally a detected value.
122 It means that the code is being executed within a source tree.
123
124 interactive <boolean>
125 Specifies whether values should be prompted for or not. The de‐
126 fault is True.
127
128 kinit_lifetime <time duration spec>
129 Controls the lifetime of ticket obtained by users authenticating
130 to the WebGUI using login/password. The expected format is a
131 time duration string. Examples are "2 hours", "1h:30m", "10 min‐
132 utes", "5min, 30sec". When the parameter is not set in de‐
133 fault.conf, the ticket will have a duration inherited from the
134 default value for kerberos clients, that can be set as
135 ticket_lifetime in krb5.conf. When the ticket lifetime has ex‐
136 pired, the ticket is not valid anymore and the GUI will prompt
137 to re-login with a message "Your session has expired. Please re-
138 login."
139
140 ldap_cache <boolean>
141 Enable a per-request LDAP cache. The default is True.
142
143 ldap_cache_size <integer>
144 The maximum number of entries cached if ldap_cache is True.
145 Since this cache is per-request it is not expected to be very
146 large. The default is 100. Setting the value < 1 effectively
147 disables the cache regardless of the ldap_cache setting
148
149 ldap_cache_debug <boolean>
150 Log details on hits, misses, etc. for the LDAP cache if the
151 cache is enabled.
152
153 ldap_uri <URI>
154 Specifies the URI of the IPA LDAP server to connect to. The URI
155 scheme may be one of ldap or ldapi. The default is to use ldapi,
156 e.g. ldapi://%2fvar%2frun%2fslapd-EXAMPLE-COM.socket
157
158 log_logger_XXX <comma separated list of regexps>
159 loggers matching regexp will be assigned XXX level.
160
161 Logger levels can be explicitly specified for specific loggers
162 as opposed to a global logging level. Specific loggers are indi‐
163 cated by a list of regular expressions bound to a level. If a
164 logger's name matches the regexp then it is assigned that level.
165 This config item must begin with "log_logger_level_" and then be
166 followed by a symbolic or numeric log level, for example:
167
168 log_logger_level_debug = ipalib\.dn\..*
169
170 log_logger_level_35 = ipalib\.plugins\.dogtag
171
172 The first line says any logger belonging to the ipalib.dn module
173 will have it's level configured to debug.
174
175 The second line say the ipa.plugins.dogtag logger will be con‐
176 figured to level 35.
177
178 This config item is useful when you only want to see the log
179 output from one or more selected loggers. Turning on the global
180 debug flag will produce an enormous amount of output. This al‐
181 lows you to leave the global debug flag off and selectively en‐
182 able output from a specific logger. Typically loggers are bound
183 to classes and plugins.
184
185 Note: logger names are a dot ('.') separated list forming a path
186 in the logger tree. The dot character is also a regular expres‐
187 sion metacharacter (matches any character) therefore you will
188 usually need to escape the dot in the logger names by preceding
189 it with a backslash.
190
191 mode <mode>
192 Specifies the mode the server is running in. The currently sup‐
193 port values are production and developer. When running in pro‐
194 duction mode some self-tests are skipped to improve performance.
195
196 mount_ipa <URI>
197 Specifies the mount point that the development server will reg‐
198 ister. The default is /ipa/
199
200 oidc_child_debug_level <debuglevel>
201 Specifies the debug level of oidc_child, a helper process used
202 by ipa-otpd for OIDC/OAuth2 authentication. Level can be between
203 0 and 10, the higher the more details. If the level is 6 or
204 higher HTTP debug output is added as well.
205
206 prompt_all <boolean>
207 Specifies that all options should be prompted for in the IPA
208 client, even optional values. Default is False.
209
210 ra_plugin <name>
211 Specifies the name of the CA back end to use. The current op‐
212 tions are dogtag and none. This is a server-side setting. Chang‐
213 ing this value is not recommended as the CA back end is only set
214 up during initial installation.
215
216 realm <realm>
217 Specifies the Kerberos realm.
218
219 replication_wait_timeout <seconds>
220 The time to wait for a new entry to be replicated during replica
221 installation. The default value is 300 seconds.
222
223 schema_ttl <seconds>
224 The number of seconds for the ipa tool to cache the IPA API and
225 help schema. Reducing this value during development is helpful
226 so that API changes are seen sooner in the tool. Setting this on
227 a server will define the TTL for all client versions > 4.3.1.
228 Client versions > 4.3.1 that connect to IPA servers older than
229 4.3.1 will use the client-side configuration value. The default
230 is 3600 seconds. 0 disables the cache. A change in the ttl will
231 not be immediately recognized by clients. They will use the new
232 value once their current cache expires.
233
234 server <hostname>
235 Specifies the IPA Server hostname.
236
237 skip_version_check <boolean>
238 Skip client vs. server API version checking. Can lead to er‐
239 rors/strange behavior when newer clients talk to older servers.
240 Use with caution.
241
242 startup_timeout <time in seconds>
243 Controls the amount of time waited when starting a service. The
244 default value is 120 seconds.
245
246 startup_traceback <boolean>
247 If the IPA server fails to start and this value is True the
248 server will attempt to generate a python traceback to make iden‐
249 tifying the underlying problem easier.
250
251 validate_api <boolean>
252 Used internally in the IPA source package to verify that the API
253 has not changed. This is used to prevent regressions. If it is
254 true then some errors are ignored so enough of the IPA framework
255 can be loaded to verify all of the API, even if optional compo‐
256 nents are not installed. The default is False.
257
258 verbose <boolean>
259 When True provides more information. Specifically this sets the
260 global log level to "info".
261
262 wait_for_dns <number of attempts>
263 Controls whether the IPA commands dnsrecord-{add,mod,del} work
264 synchronously or not. The DNS commands will repeat DNS queries
265 up to the specified number of attempts until the DNS server re‐
266 turns an up-to-date answer to a query for modified records. De‐
267 lay between retries is one second.
268
269 The DNS commands will raise a DNSDataMismatch exception if the
270 answer doesn't match the expected value even after the specified
271 number of attempts.
272
273 The DNS queries will be sent to the resolver configured in
274 /etc/resolv.conf on the IPA server.
275
276 Do not enable this in production! This will cause problems if
277 the resolver on IPA server uses a caching server instead of a
278 local authoritative server or e.g. if DNS answers are modified
279 by DNS64. The default is disabled (the option is not present).
280
281 xmlrpc_uri <URI>
282 Specifies the URI of the XML-RPC server for a client. This may
283 be used by IPA, and is used by some external tools, such as
284 ipa-getcert. Example: https://ipa.example.com/ipa/xml
285
286 jsonrpc_uri <URI>
287 Specifies the URI of the JSON server for a client. This is used
288 by IPA. If not given, it is derived from xmlrpc_uri. Example:
289 https://ipa.example.com/ipa/json
290
291 rpc_protocol <URI>
292 Specifies the type of RPC calls IPA makes: 'jsonrpc' or 'xml‐
293 rpc'. Defaults to 'jsonrpc'.
294
295 The following define the containers for the IPA server. Containers de‐
296 fine where in the DIT that objects can be found. The full location is
297 the value of container + basedn.
298 container_accounts: cn=accounts
299 container_applications: cn=applications,cn=configs,cn=policies
300 container_automount: cn=automount
301 container_configs: cn=configs,cn=policies
302 container_dns: cn=dns
303 container_group: cn=groups,cn=accounts
304 container_hbac: cn=hbac
305 container_hbacservice: cn=hbacservices,cn=hbac
306 container_hbacservicegroup: cn=hbacservicegroups,cn=hbac
307 container_host: cn=computers,cn=accounts
308 container_hostgroup: cn=hostgroups,cn=accounts
309 container_netgroup: cn=ng,cn=alt
310 container_permission: cn=permissions,cn=pbac
311 container_policies: cn=policies
312 container_policygroups: cn=policygroups,cn=configs,cn=policies
313 container_policylinks: cn=policylinks,cn=configs,cn=policies
314 container_privilege: cn=privileges,cn=pbac
315 container_rolegroup: cn=roles,cn=accounts
316 container_roles: cn=roles,cn=policies
317 container_service: cn=services,cn=accounts
318 container_sudocmd: cn=sudocmds,cn=sudo
319 container_sudocmdgroup: cn=sudocmdgroups,cn=sudo
320 container_sudorule: cn=sudorules,cn=sudo
321 container_user: cn=users,cn=accounts
322 container_vault: cn=vaults,cn=kra
323 container_virtual: cn=virtual operations,cn=etc
324
325
327 /etc/ipa/default.conf
328 system-wide IPA configuration file
329
330 $HOME/.ipa/default.conf
331 user IPA configuration file
332
333 It is also possible to define context-specific configuration files. The
334 context is set when the IPA api is initialized. The currently defined
335 contexts in IPA are cli, server and dns. This is helpful, for example,
336 if you only want debug enabled on the server and not in the client. If
337 this is set to True in default.conf it will affect both the ipa client
338 tool and the IPA server. If it is only set in server.conf then only the
339 server will have debug set. These files will be loaded if they exist:
340
341 /etc/ipa/cli.conf
342 system-wide IPA client configuration file
343
344 /etc/ipa/server.conf
345 system-wide IPA server configuration file
346
348 An example of a context-specific configuration file is
349 /etc/ipa/dns.conf to be used to increase debug output of the IPA DNSSEC
350 daemons.
351
352 [global]
353 debug = True
354
356 ipa(1)
357
358
359
360IPA Feb 21 2011 default.conf(5)