[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[LCFC2] templates://libpam-ldap/{templates}

(2nd LCFC, after including suggestions by Justin...you were right,
Justin, they had been eaten by CRM114).

This is the last call for comments for the review of debconf
templates for libpam-ldap.

The reviewed templates will be sent on Monday, June 01, 2009 to the package
maintainer as a bug report and a mail will be sent to this list with
"[BTS]" as a subject tag.


Template: libpam-ldap/rootbinddn
Type: string
Default: cn=manager,dc=example,dc=net
_Description: LDAP administrative account:
 Please enter the name of the LDAP administrative account.
 This account will be used automatically for database management, so
 it will be granted the appropriate privileges.

Template: libpam-ldap/rootbindpw
Type: password
# Translators: do not translate "${filename}"
_Description: LDAP administrative password:
 Please enter the password of the administrative account.
 The password will be stored in the file ${filename}.
 This will be made readable to root only, and will allow ${package}
 to carry out automatic database management logins.
 If this field is left empty, the previously stored password will
 be re-used.

Template: libpam-ldap/dblogin
Type: boolean
Default: false
_Description: Does the LDAP database require login?
 Please choose whether the LDAP server should enforce a login before
 retrieving entries.
 Such a setup is not usually needed.

Template: shared/ldapns/base-dn
Type: string
Default: dc=example,dc=net
_Description: Distinguished name of the search base:
 Please enter the distinguished name of the LDAP search base. Many sites
 use the components of their domain names for this purpose. For example,
 the domain "example.net" would use "dc=example,dc=net" as the
 distinguished name of the search base.

Template: libpam-ldap/pam_password
Type: select
__Choices: clear, crypt, nds, ad, exop, md5
Default: crypt
_Description: Local encryption algorithm to use for passwords:
 The PAM module can encrypt the password locally when changing it,
 which is recommended:
  * clear: no encryption. This should be chosen when LDAP servers
    automatically encrypt the userPassword entry;
  * crypt: make userPassword use the same format as the flat
    local password database. If in doubt, you should choose this option;
  * nds: use Novell Directory Services-style updating. The old
    password is first removed, then updated;
  * ad: Active Directory-style. This creates a Unicode password and
    updates the unicodePwd attribute;
  * exop: use the OpenLDAP password change extended operation to update the

Template: shared/ldapns/ldap_version
Type: select
Choices: 3, 2
Default: 3
_Description: LDAP version to use:
 Please choose the version of the LDAP protocol that should be used by
 ldapns. Using the highest available version number is recommended.

Template: libpam-ldap/binddn
Type: string
Default: cn=proxyuser,dc=example,dc=net
_Description: LDAP login user account:
 Please enter the name of the LDAP account that should be used for
 non-administrative (read-only) database logins.
 It is highly recommended to use an unprivileged account, because
 the configuration file that contains the account name and password
 must be world-readable.

Template: libpam-ldap/dbrootlogin
Type: boolean
Default: true
_Description: Allow LDAP admin account to behave like local root?
 This option will allow password utilities that use PAM to
 change local passwords.
 The LDAP admin account password will be stored in a separate file which will be made
 readable to root only.
 If /etc is mounted by NFS, this option should be disabled.

Template: shared/ldapns/ldap-server
Type: string
Default: ldapi:///
_Description: LDAP server URI:
 Please enter the Uniform Resource Identifier of the LDAP server.
 The format is 'ldap://<hostname_or_IP>:<port>/'. Alternatively,
 'ldaps://' or 'ldapi://' can be used. The port number is optional.
 Using an IP address is recommended to avoid failures when
 domain name services are unavailable.

Template: libpam-ldap/bindpw
Type: password
_Description: Password for LDAP login user:
 Please enter the password for the nonadministrative LDAP login account.

Template: libpam-ldap/override
Type: boolean
Default: true
_Description: Manage libpam-ldap configuration automatically?
 The libpam-ldap package configuration may be managed automatically
 using answers to questions asked during the configuration process.
 The resulting configuration file may overwrite local changes.
 If you do not choose this option, no further questions will be asked
 and the configuration will need to be done manually.

Source: libpam-ldap
Section: admin
Priority: extra
Maintainer: Richard A Nelson (Rick) <cowboy@debian.org>
Standards-Version: 3.7.2
Build-Depends: cdbs, patchutils, dh-buildinfo, debhelper (>= 4.1.3), autotools-dev, libldap2-dev, libpam0g-dev, po-debconf (>= 0.5.0)

Package: libpam-ldap
Architecture: any
Depends: ${shlibs:Depends}, debconf (>= 0.5) | debconf-2.0
Suggests: libnss-ldap 
Description: Pluggable Authentication Module for LDAP
 This package provides an interface between an LDAP server and the PAM
 user authentication system. Using it along with libnss-ldap allows
 LDAP to entirely replace other lookup methods (such as NIS or
 flat-file) for system account tables.

Attachment: signature.asc
Description: Digital signature

Reply to: