[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[LCFC] templates://libpam-ldap/{templates}

This is the last call for comments for the review of debconf
templates for libpam-ldap.

The reviewed templates will be sent on Monday, June 01, 2009 to the package
maintainer as a bug report and a mail will be sent to this list with
"[BTS]" as a subject tag.


Template: libpam-ldap/rootbinddn
Type: string
Default: cn=manager,dc=example,dc=net
_Description: LDAP account for root:
 Please enter the LDAP account that will be used when the local
 root account for this machine changes a password.
 This account has to be a privileged account.

Template: libpam-ldap/rootbindpw
Type: password
# Translators: do not translate "${filename}"
_Description: LDAP root account password:
 Please enter the password to use when ${package} tries to
 login to the LDAP directory using the LDAP account for root.
 The password will be stored in a separate file (${filename})
 which will be made readable to root only.
 If that field is left empty, the previously stored password will
 be re-used.

Template: libpam-ldap/dblogin
Type: boolean
Default: false
_Description: Does the LDAP database require login?
 Please choose whether the LDAP server enforces a login before
 retrieving entries.
 Such setup is unusual and therefore unneeded in most situations.

Template: shared/ldapns/base-dn
Type: string
Default: dc=example,dc=net
_Description: Distinguished name of the search base:
 Please enter the distinguished name of the LDAP search base. Many sites
 use the components of their domain names for this purpose. For example,
 the domain 'example.net' would use 'dc=example,dc=net' as the
 distinguished name of the search base.

Template: libpam-ldap/pam_password
Type: select
__Choices: clear, crypt, nds, ad, exop, md5
Default: crypt
_Description: Local encryption algorithm to use for passwords:
 The PAM module can encrypt the password locally when changing it,
 which is recommended:
  * clear: no encryption. This should be chosen when LDAP servers
    automatically encrypt the userPassword entry;
  * crypt: make userPassword use the same format as the flat
    local password database. If in doubt, you should choose this option;
  * nds: use Novell Directory Services-style updating. The old
    password is first removed, then updated;
  * ad: Active Directory-style. This creates a Unicode password and
    updates the unicodePwd attribute;
  * exop: use the OpenLDAP password change extended operation to update the

Template: shared/ldapns/ldap_version
Type: select
Choices: 3, 2
Default: 3
_Description: LDAP version to use:
 Please choose the version of the LDAP protocol that should be used by
 ldapns. Using the highest available version number is recommended.

Template: libpam-ldap/binddn
Type: string
Default: cn=proxyuser,dc=example,dc=net
_Description: Unprivileged database user:
 Please enter the name of the account that will be used to login to the LDAP
 It is highly recommended to use an unprivileged account because
 the configuration file that contains that account name and password
 has to be world-readable.

Template: libpam-ldap/dbrootlogin
Type: boolean
Default: true
_Description: Allow LDAP admin account to behave like local root?
 This option will allow password utilities that use PAM to
 change local passwords.
 The LDAP admin account password will be stored in a separate file which will be made
 readable to root only.
 If /etc is mounted by NFS, this option should be disabled.

Template: shared/ldapns/ldap-server
Type: string
Default: ldapi:///
_Description: LDAP server URI:
 Please enter the Uniform Resource Identifier of the LDAP server.
 The format is 'ldap://<hostname_or_IP>:<port>/'. Alternatively,
 'ldaps://' or 'ldapi://' can be used. The port number is optional.
 Using an IP address is recommended to avoid failures when
 domain name services are unavailable.

Template: libpam-ldap/bindpw
Type: password
_Description: Password for database login account:
 Please enter the password that will be used to login to the LDAP database.

Template: libpam-ldap/override
Type: boolean
Default: true
_Description: Manage libpam-ldap configuration automatically?
 The libpam-ldap package configuration may be managed automatically
 from answers to questions asked during the configuration process.
 The resulting configuration file may overwrite local changes.
 If you do not choose this option, no further questions will be asked
 and the configuration has to be done manually.
Source: libpam-ldap
Section: admin
Priority: extra
Maintainer: Richard A Nelson (Rick) <cowboy@debian.org>
Standards-Version: 3.7.2
Build-Depends: cdbs, patchutils, dh-buildinfo, debhelper (>= 4.1.3), autotools-dev, libldap2-dev, libpam0g-dev, po-debconf (>= 0.5.0)

Package: libpam-ldap
Architecture: any
Depends: ${shlibs:Depends}, debconf (>= 0.5) | debconf-2.0
Suggests: libnss-ldap 
Description: Pluggable Authentication Module for LDAP
 This package provides an interface between an LDAP server and the PAM
 user authentication system. Using it along with libnss-ldap allows
 LDAP to entirely replace other lookup methods (such as NIS or
 flat-file) for system account tables.

Attachment: signature.asc
Description: Digital signature

Reply to: