|
|
|
@ -106,24 +106,25 @@ synapse_app_name: Matrix |
|
|
|
|
# Log level |
|
|
|
|
synapse_log_level: ERROR |
|
|
|
|
|
|
|
|
|
# Can be internal, ldap, rest or oidc |
|
|
|
|
synapse_auth: internal |
|
|
|
|
# Can be internal, ldap, rest or oidc (several choices can be made) |
|
|
|
|
synapse_auth: |
|
|
|
|
- internal |
|
|
|
|
|
|
|
|
|
# If auth is ldap |
|
|
|
|
synapse_ldap_uri: ldap://ldap.example.com:389 |
|
|
|
|
synapse_ldap_uri: "{{ ldap_uri | default('ldap://ldap.example.com:389') }}" |
|
|
|
|
synapse_ldap_start_tls: True |
|
|
|
|
synapse_ldap_user_base: ou=Users,dc=example,dc=com |
|
|
|
|
synapse_ldap_attr_uid: uid |
|
|
|
|
synapse_ldap_user_base: "{{ ad_ldap_user_search_base | default(ad_auth | default(False) | ternary('DC=' + ad_realm | default(samba_realm) | default(ansible_domain) | regex_replace('\\.',',DC='), 'dc=example,dc=org')) }}" |
|
|
|
|
synapse_ldap_attr_uid: "{{ ad_auth | default(False) | ternary('sAMAccountName', 'uid') }}" |
|
|
|
|
synapse_ldap_attr_email: mail |
|
|
|
|
synapse_ldap_attr_name: cn |
|
|
|
|
synapse_ldap_filter: (objectClass=posixAccount) |
|
|
|
|
synapse_ldap_filter: "{{ ad_auth | default(False) | ternary('(&(objectCategory=person)(objectClass=user)(primaryGroupId=513))', '(objectClass=inetOrgPerson)') }}" |
|
|
|
|
|
|
|
|
|
# if auth is rest |
|
|
|
|
synapse_auth_rest_uri: http://localhost:8083 |
|
|
|
|
|
|
|
|
|
# if auth is oidc |
|
|
|
|
synapse_oidc_server: https://sso.domain.com |
|
|
|
|
synapse_oidc_client: matric |
|
|
|
|
synapse_oidc_client: matrix |
|
|
|
|
synapse_oidc_secret: XXXXX |
|
|
|
|
# Jinja2 template to for the local part of the MXID. |
|
|
|
|
synapse_oidc_localpart: "{{ '{{ user.sub }}' }}" |
|
|
|
|