3 default_login_user = CALLER
4 default_internal_group = CALLERGROUP
5 default_internal_user = CALLER
10 log_path = DIR/tmp/dovecot.log
15 unix_listener auth-client {
19 # this goes in base_dir
20 path = dovecot_auth_socket
26 unix_listener anvil-auth-penalty {
34 # /usr/share/doc/dovecot/example-config/conf.d/10-auth.conf
36 ## Authentication processes
39 # Disable LOGIN command and all other plaintext authentications unless
40 # SSL/TLS is used (LOGINDISABLED capability). Note that if the remote IP
41 # matches the local IP (ie. you're connecting from the same computer), the
42 # connection is considered secure and plaintext authentication is allowed.
43 # See also ssl=required setting.
44 disable_plaintext_auth = yes
46 # Authentication cache size (e.g. 10M). 0 means it's disabled. Note that
47 # bsdauth and PAM require cache_key to be set for caching to be used.
49 # Time to live for cached data. After TTL expires the cached record is no
50 # longer used, *except* if the main database lookup returns internal failure.
51 # We also try to handle password changes automatically: If user's previous
52 # authentication was successful, but this one wasn't, the cache isn't used.
53 # For now this works only with plaintext authentication.
54 #auth_cache_ttl = 1 hour
55 # TTL for negative hits (user not found, password mismatch).
56 # 0 disables caching them completely.
57 #auth_cache_negative_ttl = 1 hour
58 auth_cache_negative_ttl = 0
60 # Space separated list of realms for SASL authentication mechanisms that need
61 # them. You can leave it empty if you don't want to support multiple realms.
62 # Many clients simply use the first one listed here, so keep the default realm
66 # Default realm/domain to use if none was specified. This is used for both
67 # SASL realms and appending @domain to username in plaintext logins.
70 # List of allowed characters in username. If the user-given username contains
71 # a character not listed in here, the login automatically fails. This is just
72 # an extra check to make sure user can't exploit any potential quote escaping
73 # vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
74 # set this value to empty.
75 #auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@
77 # Username character translations before it's looked up from databases. The
78 # value contains series of from -> to characters. For example "#@/@" means
79 # that '#' and '/' characters are translated to '@'.
80 #auth_username_translation =
82 # Username formatting before it's looked up from databases. You can use
83 # the standard variables here, eg. %Lu would lowercase the username, %n would
84 # drop away the domain if it was given, or "%n-AT-%d" would change the '@' into
85 # "-AT-". This translation is done after auth_username_translation changes.
86 #auth_username_format = %Lu
88 # If you want to allow master users to log in by specifying the master
89 # username within the normal username string (ie. not using SASL mechanism's
90 # support for it), you can specify the separator character here. The format
91 # is then <username><separator><master username>. UW-IMAP uses "*" as the
92 # separator, so that could be a good choice.
93 #auth_master_user_separator =
95 # Username to use for users logging in with ANONYMOUS SASL mechanism
96 #auth_anonymous_username = anonymous
98 # Maximum number of dovecot-auth worker processes. They're used to execute
99 # blocking passdb and userdb queries (eg. MySQL and PAM). They're
100 # automatically created and destroyed as needed.
101 #auth_worker_max_count = 30
103 # Host name to use in GSSAPI principal names. The default is to use the
104 # name returned by gethostname(). Use "$ALL" (with quotes) to allow all keytab
106 #auth_gssapi_hostname =
108 # Kerberos keytab to use for the GSSAPI mechanism. Will use the system
109 # default (usually /etc/krb5.keytab) if not specified. You may need to change
110 # the auth service to run as root to be able to read this file.
113 # Do NTLM and GSS-SPNEGO authentication using Samba's winbind daemon and
114 # ntlm_auth helper. <doc/wiki/Authentication/Mechanisms/Winbind.txt>
115 #auth_use_winbind = no
117 # Path for Samba's ntlm_auth helper binary.
118 #auth_winbind_helper_path = /usr/bin/ntlm_auth
120 # Time to delay before replying to failed authentications.
121 #auth_failure_delay = 2 secs
122 auth_failure_delay = 0 secs
124 # Require a valid SSL client certificate or the authentication fails.
125 #auth_ssl_require_client_cert = no
127 # Take the username from client's SSL certificate, using
128 # X509_NAME_get_text_by_NID() which returns the subject's DN's
130 #auth_ssl_username_from_cert = no
132 # Space separated list of wanted authentication mechanisms:
133 # plain login digest-md5 cram-md5 ntlm rpa apop anonymous gssapi otp
135 # NOTE: See also disable_plaintext_auth setting.
136 auth_mechanisms = plain login
139 ## Password and user databases
143 # Password database is used to verify user's password (and nothing more).
144 # You can have multiple passdbs and userdbs. This is useful if you want to
145 # allow both system users (/etc/passwd) and virtual users to login without
146 # duplicating the system users into virtual database.
148 # <doc/wiki/PasswordDatabase.txt>
150 # User database specifies where mails are located and what user/group IDs
151 # own them. For single-UID configuration use "static" userdb.
153 # <doc/wiki/UserDatabase.txt>
157 args = DIR/aux-fixed/3550.dovecot.passwd
161 args = DIR/aux-fixed/3550.dovecot.passwd