The
is used to interact with clients using LDAP.
It provides full support for LDAPv3 and limited
support for LDAPv2.
A Key Manager Provider must be specified when this
is enabled and it is configured to use SSL or StartTLS.
A Trust Manager Provider must be specified when this
is enabled and it is configured to use SSL or StartTLS.
A
cannot be configured to support SSL and StartTLS at the same time.
Either SSL or StartTLS must be disabled in order for this
to be used.
ds-cfg-ldap-connection-handler
ds-cfg-connection-handler
org.opends.server.protocols.ldap.LDAPConnectionHandler
Specifies the name of the key manager that should be used with
this
.
Changes to this property take effect immediately, but
only for subsequent attempts to access the key manager
provider for associated client connections.
The referenced key manager provider must be enabled when
the
is enabled and configured to use SSL or StartTLS.
ds-cfg-key-manager-provider
Specifies the name of the trust manager that should be used with
the
.
Changes to this property take effect immediately, but
only for subsequent attempts to access the trust manager
provider for associated client connections.
The referenced trust manager provider must be enabled when
the
is enabled and configured to use SSL or StartTLS.
ds-cfg-trust-manager-provider
Specifies the address or set of addresses on which this
should listen for connections from LDAP clients.
Multiple addresses may be provided as separate values for this
attribute. If no values are provided, then the
listens on all interfaces.
0.0.0.0
ds-cfg-listen-address
Indicates whether connections from LDAPv2 clients are allowed.
If LDAPv2 clients are allowed, then only a minimal degree of
special support are provided for them to ensure that
LDAPv3-specific protocol elements (for example, Configuration Guide 25
controls, extended response messages, intermediate response
messages, referrals) are not sent to an LDAPv2 client.
true
ds-cfg-allow-ldap-v2
Indicates whether the
should keep statistics.
If enabled, the
maintains statistics about the number and types of operations
requested over LDAP and the amount of data sent and received.
true
ds-cfg-keep-stats
Indicates whether the
should send a notice of disconnection extended response message to
the client if a new connection is rejected for some reason.
The extended response message may provide an explanation
indicating the reason that the connection was rejected.
true
ds-cfg-send-rejection-notice
Specifies the size in bytes of the largest LDAP request message that will
be allowed by this LDAP Connection handler.
This property is analogous to the maxBERSize configuration
attribute of the Sun Java System Directory Server. This can help
prevent denial-of-service attacks by clients that indicate they
send extremely large requests to the server causing it to
attempt to allocate large amounts of memory.
5 megabytes
ds-cfg-max-request-size
Specifies the size in bytes of the LDAP response message write buffer.
This property specifies write buffer size allocated by the server for
each client connection and used to buffer LDAP response messages data
when writing.
4096 bytes
ds-cfg-buffer-size
Specifies the number of request handlers that are used to read
requests from clients.
The
uses one thread to accept new connections from clients, but uses
one or more additional threads to read requests from existing
client connections. This ensures that new requests are
read efficiently and that the connection handler itself does not
become a bottleneck when the server is under heavy load from many
clients at the same time.
Let the server decide.
ds-cfg-num-request-handlers
Indicates whether clients are allowed to use StartTLS.
If enabled, the
allows clients to use the StartTLS extended operation to
initiate secure communication over an otherwise insecure channel.
Note that this is only allowed if the
is not configured to use SSL, and if the server is configured with
a valid key manager provider and a valid trust manager provider.
false
ds-cfg-allow-start-tls
Specifies the policy that the
should use regarding client SSL certificates.
Clients can use the SASL EXTERNAL mechanism only if the
policy is set to "optional" or "required".
This is only applicable if clients are allowed to use SSL.
optional
Clients must not provide their own
certificates when performing SSL negotiation.
Clients are requested to provide their own certificates
when performing SSL negotiation. The connection is
nevertheless accepted if the client does not provide a
certificate.
Clients are required to provide their own certificates
when performing SSL negotiation and are refused access
if they do not provide a certificate.
ds-cfg-ssl-client-auth-policy
Specifies the maximum number of pending connection attempts that
are allowed to queue up in the accept backlog before the
server starts rejecting new connection attempts.
This is primarily an issue for cases in which a large number of
connections are established to the server in a very short period
of time (for example, a benchmark utility that creates a large number of
client threads that each have their own connection to the server)
and the connection handler is unable to keep up with the rate at
which the new connections are established.
128
connections
ds-cfg-accept-backlog
Specifies the names of the SSL protocols that are allowed for
use in SSL or StartTLS communication.
Changes to this property take effect immediately but only
impact new SSL/TLS-based sessions created after the
change.
Uses the default set of SSL protocols provided by the server's
JVM.
ds-cfg-ssl-protocol
Specifies the names of the SSL cipher suites that are allowed
for use in SSL or StartTLS communication.
Changes to this property take effect immediately but will
only impact new SSL/TLS-based sessions created after the
change.
Uses the default set of SSL cipher suites provided by the
server's JVM.
ds-cfg-ssl-cipher-suite
Specifies the maximum length of time that attempts to write data
to LDAP clients should be allowed to block.
If an attempt to write data to a client takes longer than this
length of time, then the client connection is terminated.
2 minutes
ds-cfg-max-blocked-write-time-limit