Skip to content

Commit

Permalink
fix#1584-custom_attr_allowlist (opensearch-project#1636)
Browse files Browse the repository at this point in the history
Signed-off-by: cwillum <[email protected]>

Signed-off-by: cwillum <[email protected]>
  • Loading branch information
cwillum authored Oct 20, 2022
1 parent da65102 commit 73f7436
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions _security-plugin/configuration/ldap.md
Original file line number Diff line number Diff line change
Expand Up @@ -431,9 +431,11 @@ rolesearch_enabled: false

By default, the security plugin reads all LDAP user attributes and makes them available for index name variable substitution and DLS query variable substitution. If your LDAP entries have a lot of attributes, you might want to control which attributes should be made available. The fewer the attributes, the better the performance.

Note that this setting is made in the authentication `authc` section of the config.yml file.

Name | Description
:--- | :---
`custom_attr_whitelist` | String array. Specifies the LDAP attributes that should be made available for variable substitution.
`custom_attr_allowlist` | String array. Specifies the LDAP attributes that should be made available for variable substitution.
`custom_attr_maxval_len` | Integer. Specifies the maximum allowed length of each attribute. All attributes longer than this value are discarded. A value of `0` disables custom attributes altogether. Default is 36.

Example:
Expand All @@ -446,7 +448,7 @@ authc:
authentication_backend:
type: ldap
config:
custom_attr_whitelist:
custom_attr_allowlist:
- attribute1
- attribute2
custom_attr_maxval_len: 36
Expand Down

0 comments on commit 73f7436

Please sign in to comment.