Package parameters: |
- RegisterAuthority
- The short name of the authority in which users are registered. Is best set in the Authentication admin UI. (default local, type string, scope instance)
- Batch Synchronization: AcknowledgementFileName
- Full file path to where we should drop the acknowledgement file for batch syncs. You can use these special values: {acs_root_di
r} will get replaced with the root directory for this OpenACS installation, e.g. '/var/lib/aolserver/service0' (no trailing slash). {ansi_date} will get replaced with today's date in ANSI format, e.g. '2003-10-29'. {authority} will get replaced with the short_name of the authority, e.g. 'rz_pam'. (default {acs_root_dir}/batch-sync-ack-{authority}-{ansi_date}.xml, type number, scope instance)
- Batch Synchronization: KeepBatchLogDays
- The number of days to keep the log for a batch user synchronization job around. Say 0 if you want to keep the log forever. (default 0, type number, scope instance)
- Batch Synchronization: SyncAddUsersToDotLrnP
- Should we add users to .LRN? This requires .LRN to be installed, and has serious performance implications. (default 0, type number, scope instance)
- Batch Synchronization: SyncDotLrnAccessLevel
- .LRN access level (if .LRN is installed). 1 = Full access user, 0 = Limited access user (default 1, type number, scope instance)
- Batch Synchronization: SyncDotLrnReadPrivateDataP
- .LRN user is guest (if .LRN is installed). 1 = Not a guest , 0 = Guest (default 1, type number, scope instance)
- Batch Synchronization: SyncDotLrnUserType
- .LRN user type for new user (if .LRN is installed) (default student, type string, scope instance)
- Batch Synchronization: SyncEmailConfirmationP
- Send out email confirmation when batch sync is complete. 1 = Yes, 0 = No. (default 0, type number, scope instance)
- acs-authentication: AllowSelfRegister
- Does the user can self register? 1 = Yes, 0 = No. (default 1, type number, scope instance)
- security: MaxConsecutiveFailedLoginAttempts
- Enables the tracking of consecutive failed login attempts per subsite and to slowdown brute force attacks. After reaching this threshold every further login attempt from is automatically rejected for a period of MaxConsecutiveFailedLoginAttemptsLockoutTime seconds . 0 for infinite attempts. (default 0, type number, scope instance)
- security: MaxConsecutiveFailedLoginAttemptsLockoutTime
- Timespan in seconds for which every login attempt is rejected after the limit set by MaxConsecutiveFailedLoginAttempts has been reached. This parameter is only in effect if MaxConsecutiveFailedLoginAttempts is greater than zero. (default 21600, type number, scope instance)
|