/etc/ldap.conf (for PAM)

#
# This is the configuration file for the LDAP nameservice
# switch library, the LDAP PAM module and the shadow package.
#

# Your LDAP server. Must be resolvable without using LDAP.
host	127.0.0.1

# The distinguished name of the search base.
base	dc=example,dc=com

# The LDAP version to use (defaults to 3
# if supported by client library)
ldap_version	3

# Hash password locally; required for University of
# Michigan LDAP server, and works with Netscape
# Directory Server if you're using the UNIX-Crypt
# hash mechanism and not using the NT Synchronization
# service. 
pam_password	crypt

# The distinguished name to bind to the server with.
# Optional: default is to bind anonymously.
binddn cn=ldapadmin,dc=example,dc=com

# The credentials to bind with. 
# Optional: default is no credential.
bindpw secret

nss_map_attribute	uniqueMember member

#--- SSL/TLS setting ---#
# OpenLDAP SSL mechanism
# 2007-07-20, chhaas: wegen den folgenden Fehlern in /var/log/messages
# pam_ldap: ldap_starttls_s: Connect error
# saslauthd: pam_ldap: ldap_result Can't contact LDAP server
# pam_ldap: ldap_simple_bind Can't contact LDAP server
# muss SSL explizit deaktiviert werden:
# ssl on
# start_tls mechanism uses the normal LDAP port, LDAPS typically 636
# ssl start_tls
# 2007-07-20, chhaas:
ssl off

# OpenLDAP SSL options
# Require and verify server certificate (yes/no)
# Default is "no"
# tls_checkpeer yes
tls_checkpeer no

# CA certificates for server certificate verification
# At least one of these are required if tls_checkpeer is "yes"
tls_cacertdir /etc/ssl/certs
tls_cacertfile /etc/ssl/certs/ca_cert.pem
# SSL cipher suite
# See man ciphers for syntax
tls_ciphers ALL:TLSv1:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP

# Client certificate and key
# Use these, if your server requires client authentication.
tls_cert /etc/ssl/certs/station7_cert.pem
tls_key /etc/ssl/private/station7_key.pem