Provided by: libnfsidmap1_2.6.1-1ubuntu1.2_amd64 bug

NAME

       idmapd.conf - configuration file for libnfsidmap

SYNOPSIS

       Configuration  file  for libnfsidmap.  Used by idmapd and svcgssd to map NFSv4 name to and
       from ids.

DESCRIPTION

       The idmapd.conf configuration file consists of several sections, initiated by  strings  of
       the form [General] and [Mapping].  Each section may contain lines of the form
         variable = value
       The recognized sections and their recognized variables are as follows:

   [General] section variables
       Verbosity
              Verbosity level of debugging (Default: 0)

       Domain The  local  NFSv4  domain  name.   An  NFSv4  domain  is  a namespace with a unique
              username<->UID and groupname<->GID mapping.  (Default: Host's  fully-qualified  DNS
              domain name)

       No-Strip
              In  multi-domain environments, some NFS servers will append the identity management
              domain to the owner and owner_group in lieu of a true NFSv4  domain.   This  option
              can  facilitate lookups in such environments.  If set to a value other than "none",
              the nsswitch  plugin will first pass the name to the password/group lookup function
              without  stripping  the domain off.  If that mapping fails then the plugin will try
              again using the old method (comparing the domain in the string to the Domain value,
              stripping  it  if  it  matches,  and passing the resulting short name to the lookup
              function).  Valid values  are  "user",  "group",  "both",  and  "none".   (Default:
              "none")

       Reformat-Group
              Winbind   has   a   quirk  whereby  doing  a  group  lookup  in  UPN  format  (e.g.
              staff@americas.example.com) will cause the group to be displayed prefixed with  the
              full  domain  in  uppercase  (e.g.  AMERICAS.EXAMPLE.COM\staff)  instead  of in the
              familiar netbios name format (e.g. AMERICAS\staff).  Setting this  option  to  true
              causes the name to be reformatted before passing it to the group lookup function in
              order to work around this.  This setting is  ignored  unless  No-Strip  is  set  to
              either "both" or "group".  (Default: "false")

       Local-Realms
              A comma-separated list of Kerberos realm names that may be considered equivalent to
              the local realm name.  For example, users juser@ORDER.EDU and  juser@MAIL.ORDER.EDU
              may  be  considered  to  be  the  same user in the specified Domain.  (Default: the
              host's default realm name)
              Note: If a value is specified here, the default local realm  must  be  included  as
              well.

   [Mapping] section variables
       Nobody-User
              Local user name to be used when a mapping cannot be completed.

       Nobody-Group
              Local group name to be used when a mapping cannot be completed.

   [Translation] section variables
       Method A  comma-separated,  ordered list of mapping methods (plug-ins) to use when mapping
              between NFSv4 names and local IDs.  Each specified method is tried in order until a
              mapping is found, or there are no more methods to try.  The methods included in the
              default distribution include "nsswitch",  "umich_ldap",  and  "static".   (Default:
              nsswitch)

       GSS-Methods
              An optional comma-separated, ordered list of mapping methods (plug-ins) to use when
              mapping between GSS Authenticated names and local IDs.  (Default: the same list  as
              specified for Method)

   [Static] section variables
       The  "static"  translation  method  uses a static list of GSS-Authenticated names to local
       user names.  Entries in the list are of the form:
        principal@REALM = localusername

   [REGEX] section variables
       In Ubuntu, the regex plugin is shipped in the libnfsidmap-regex package. If  you  want  to
       use this plugin, please install that package and consult the libnfsidmap-regex(5) manpage.

   [UMICH_SCHEMA] section variables
       If  the  "umich_ldap"  translation method is specified, the following variables within the
       [UMICH_SCHEMA] section are used.

       LDAP_server
              LDAP server name or address (Required if using UMICH_LDAP)

       LDAP_base
              Absolute LDAP search base.  (Required if using UMICH_LDAP)

       LDAP_people_base
              Absolute LDAP search base for people accounts.  (Default: The LDAP_base value)

       LDAP_group_base
              Absolute LDAP search base for group accounts.  (Default: The LDAP_base value)

       LDAP_canonicalize_name
              Whether or not to perform name canonicalization on the name  given  as  LDAP_server
              (Default: "true")

       LDAP_follow_referrals
              Whether or not to follow ldap referrals. (Default: "true")

       LDAP_use_ssl
              Set to "true" to enable SSL communication with the LDAP server.  (Default: "false")

       LDAP_ca_cert
              Location  of  a  trusted  CA  certificate  used  when  SSL  is enabled (Required if
              LDAP_use_ssl is true and LDAP_tls_reqcert is not set to never)

       LDAP_tls_reqcert
              Controls the LDAP server certificate validation behavior.  It  can  take  the  same
              values as ldap.conf(5)'s TLS_REQCERT tunable.  (Default: "hard")

       LDAP_timeout_seconds
              Number of seconds before timing out an LDAP request (Default: 4)

       LDAP_sasl_mech
              SASL  mechanism to be used for sasl authentication.  Required if SASL auth is to be
              used (Default: None)

       LDAP_realm
              SASL realm to be used for sasl authentication. (Default: None)

       LDAP_sasl_authcid
              Authentication identity to be used for sasl authentication. (Default: None)

       LDAP_sasl_authzid
              Authorization identity to be used for sasl authentication. (Default: None)

       LDAP_sasl_secprops
              Cyrus  SASL  security  properties.  It  can   the  same  values  as  ldap.conf(5)'s
              sasl_secprops.

       LDAP_sasl_canonicalize
              Specifies  whether the LDAP server hostname should be canonicalised.  If set to yes
              LDAP lib with do a reverse hostname lookup.  If this is not set the LDAP  library's
              default will be used. (Default: None)

       LDAP_sasl_krb5_ccname
              Path  to  kerberos credential cache. If it is not set then the value of environment
              variable KRB5CCNAME will be used. If the environment variable is not set  then  the
              default mechanism of kerberos library will be used.

       NFSv4_person_objectclass
              The  object  class  name  for  people  accounts in your local LDAP schema (Default:
              NFSv4RemotePerson)

       NFSv4_name_attr
              Your local schema's attribute name to  be  used  for  NFSv4  user  names  (Default:
              NFSv4Name)

       NFSv4_uid_attr
              Your local schema's attribute name to be used for uidNumber (Default: uidNumber)

       GSS_principal_attr
              Your   local   schema's   attribute  name  for  GSSAPI  Principal  names  (Default:
              GSSAuthName)

       NFSv4_acctname_attr
              Your local schema's attribute name to be used for account names (Default: uid)

       NFSv4_group_objectclass
              The object class name for group  accounts  in  your  local  LDAP  schema  (Default:
              NFSv4RemoteGroup)

       NFSv4_gid_attr
              Your local schema's attribute name to be used for gidNumber (Default: gidNumber)

       NFSv4_group_attr
              Your  local  schema's  attribute  name  to  be used for NFSv4 group names (Default:
              NFSv4Name)

       LDAP_use_memberof_for_groups
              Some LDAP servers do a better job with indexing where  searching  through  all  the
              groups  searching for the user in the memberuid list.  Others like SunOne directory
              that search can takes  minutes  if  there  are  thousands  of  groups.  So  setting
              LDAP_use_memberof_for_groups  to  true  in  the  configuration  file  will  use the
              memberof lists of the account and search through only those groups to obtain  gids.
              (Default: false)

       NFSv4_member_attr
              If  LDAP_use_memberof_for_groups is true, this is the attribute to be searched for.
              (Default: memberUid)

       NFSv4_grouplist_filter
              An optional search filter for determining group membership.  (No Default)

EXAMPLES

       An example /etc/idmapd.conf file:

       [General]

       Verbosity = 0
       Domain = domain.org
       Local-Realms = DOMAIN.ORG,MY.DOMAIN.ORG,YOUR.DOMAIN.ORG

       [Mapping]

       Nobody-User = nfsnobody
       Nobody-Group = nfsnobody

       [Translation]

       Method = umich_ldap,nsswitch
       GSS-Methods = umich_ldap,static

       [Static]

       johndoe@OTHER.DOMAIN.ORG = johnny

       [UMICH_SCHEMA]

       LDAP_server = ldap.domain.org
       LDAP_base = dc=org,dc=domain

SEE ALSO

       idmapd(8) svcgssd(8)

BUGS

       Report bugs to <nfsv4@linux-nfs.org>

                                           19 Nov 2008                             idmapd.conf(5)