Sample broadcasts properties file
The following text represents a sample broadcasts.properties file, which is located in the TomcatInstallFolder/external-conf folder:
######################
# GENERAL PROPERTIES #
######################
# This optional property determines the default time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is 24 hours (or 86,400,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.default=86400000
broadcast.ttl.default=
# This optional property determines the minimum time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is five minutes (or 300,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.minimum=300000
broadcast.ttl.minimum=
# This optional property determines the maximum time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is 365 days (or 31,536,000,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.maximum=31536000000
broadcast.ttl.maximum=
# This optional property determines whether LDAP Distribution Groups are
# available as a selection option for broadcasts. If set to "true", then
# a call to the appropriate REST API will instruct the admin UI to include
# LDAP Distribution Groups as a selectable target for broadcasts. If set to
# "false", the REST API will instruct the admin UI not to include LDAP
# Distribution Groups as a selectable target for broadcasts. If not
# provided, the default value is "false".
# Example (of setting to "true", thus allowing LDAP):
### broadcast.avail.ldap=true
broadcast.avail.ldap=
###################
# LDAP PROPERTIES #
###################
# URL must be in the form of "ldap://host:port" or "ldaps://host:port".
# Default port for ldap and ldaps are 389 and 686, respectively.
# Example:
### ldap.url=ldap://ldap.acme.com
ldap.url=
# The two schemes are "none" and "simple", with "simple requiring credentials.
# Example:
### ldap.auth.type=simple
ldap.auth.type=
# Put the principal ldap user here, which must be the full distinguished name.
# Example:
### ldap.auth.user=CN\=<Your Username Here>,OU\=Domain Users,OU\=Security,DC\=ldap,DC\=acme,DC\=com
ldap.auth.user=
# For now password is plain text, but that will change.
ldap.auth.pswd=
# These timeouts and size limitations are for each partial query making up
# each functional call, and so do not represent the operation as a whole
# Maximum time is in milliseconds and Maximum size's units are per return record.
# The LDAP server also has preset limits configured, which normally cannot be
# overridden.
# Example of five minute maximum time and 10000 maximum retrievals:
### ldap.time.maximum=300000
### ldap.size.maximum=10000
ldap.querytime.maximum=
ldap.querysize.maximum=
# This specifies the DN search base for groups.
# Example:
### ldap.group.base=DC\=ldap,DC\=acme,DC\=com
ldap.group.base=
# This specifies filter for querying groups by a conditional search substitution
# string which will be inserted by the process. # %s should be provided at the point
# in which the conditional search will be inserted.
# Example:
### ldap.group.filter=(&(objectclass\=group)(%s))
ldap.group.filter=
# This specifies filter for querying subgroups contained within other groups
# by name using a search string. %s should be provided at the point in which
# the search string is substituted. If this filter query is empty or not
# provided, then it is assumed there are no subgroups and the recursive subgroup
# search is not performed.
# Example:
### ldap.subgroup.filter=(&(objectclass\=group)(memberOf\=%s))
ldap.subgroup.filter=
# This specifies group attributes to retrieve: for the unique ID and
# distinguished name.
# Example:
### ldap.group.attr.id=cn
### ldap.group.attr.dn=distinguishedName
ldap.group.attr.id=
ldap.group.attr.dn=
# This specifies the DN search base for users.
# Example:
### ldap.user.base=DC\=ldap,DC\=acme,DC\=com
ldap.user.base=
# This specifies filter for querying users by the groups to which they belong
# using the distinguished name of the group in question. %s should be
# provided at the point in which the search string is substituted.
# Example:
### ldap.user.filter=(&(objectClass\=user)(memberOf\=%s))
ldap.user.filter=
# This specifies user attributes to retrieve: for the unique ID and
# distinguished name.
# Example:
### ldap.user.attr.id=cn
### ldap.user.attr.dn=distinguishedName
ldap.user.attr.id=
ldap.user.attr.dn=
# GENERAL PROPERTIES #
######################
# This optional property determines the default time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is 24 hours (or 86,400,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.default=86400000
broadcast.ttl.default=
# This optional property determines the minimum time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is five minutes (or 300,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.minimum=300000
broadcast.ttl.minimum=
# This optional property determines the maximum time to live for a
# broadcast. All provided values are normalized to seconds. If not
# provided, the default value is 365 days (or 31,536,000,000 milliseconds).
# Example (using the default value):
### broadcast.ttl.maximum=31536000000
broadcast.ttl.maximum=
# This optional property determines whether LDAP Distribution Groups are
# available as a selection option for broadcasts. If set to "true", then
# a call to the appropriate REST API will instruct the admin UI to include
# LDAP Distribution Groups as a selectable target for broadcasts. If set to
# "false", the REST API will instruct the admin UI not to include LDAP
# Distribution Groups as a selectable target for broadcasts. If not
# provided, the default value is "false".
# Example (of setting to "true", thus allowing LDAP):
### broadcast.avail.ldap=true
broadcast.avail.ldap=
###################
# LDAP PROPERTIES #
###################
# URL must be in the form of "ldap://host:port" or "ldaps://host:port".
# Default port for ldap and ldaps are 389 and 686, respectively.
# Example:
### ldap.url=ldap://ldap.acme.com
ldap.url=
# The two schemes are "none" and "simple", with "simple requiring credentials.
# Example:
### ldap.auth.type=simple
ldap.auth.type=
# Put the principal ldap user here, which must be the full distinguished name.
# Example:
### ldap.auth.user=CN\=<Your Username Here>,OU\=Domain Users,OU\=Security,DC\=ldap,DC\=acme,DC\=com
ldap.auth.user=
# For now password is plain text, but that will change.
ldap.auth.pswd=
# These timeouts and size limitations are for each partial query making up
# each functional call, and so do not represent the operation as a whole
# Maximum time is in milliseconds and Maximum size's units are per return record.
# The LDAP server also has preset limits configured, which normally cannot be
# overridden.
# Example of five minute maximum time and 10000 maximum retrievals:
### ldap.time.maximum=300000
### ldap.size.maximum=10000
ldap.querytime.maximum=
ldap.querysize.maximum=
# This specifies the DN search base for groups.
# Example:
### ldap.group.base=DC\=ldap,DC\=acme,DC\=com
ldap.group.base=
# This specifies filter for querying groups by a conditional search substitution
# string which will be inserted by the process. # %s should be provided at the point
# in which the conditional search will be inserted.
# Example:
### ldap.group.filter=(&(objectclass\=group)(%s))
ldap.group.filter=
# This specifies filter for querying subgroups contained within other groups
# by name using a search string. %s should be provided at the point in which
# the search string is substituted. If this filter query is empty or not
# provided, then it is assumed there are no subgroups and the recursive subgroup
# search is not performed.
# Example:
### ldap.subgroup.filter=(&(objectclass\=group)(memberOf\=%s))
ldap.subgroup.filter=
# This specifies group attributes to retrieve: for the unique ID and
# distinguished name.
# Example:
### ldap.group.attr.id=cn
### ldap.group.attr.dn=distinguishedName
ldap.group.attr.id=
ldap.group.attr.dn=
# This specifies the DN search base for users.
# Example:
### ldap.user.base=DC\=ldap,DC\=acme,DC\=com
ldap.user.base=
# This specifies filter for querying users by the groups to which they belong
# using the distinguished name of the group in question. %s should be
# provided at the point in which the search string is substituted.
# Example:
### ldap.user.filter=(&(objectClass\=user)(memberOf\=%s))
ldap.user.filter=
# This specifies user attributes to retrieve: for the unique ID and
# distinguished name.
# Example:
### ldap.user.attr.id=cn
### ldap.user.attr.dn=distinguishedName
ldap.user.attr.id=
ldap.user.attr.dn=
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*