| | |
| | | # .. |
| | | # } |
| | | #listen = * |
| | | listen = *,[::] |
| | | |
| | | # Disable LOGIN command and all other plaintext authentications unless |
| | | # SSL/TLS is used (LOGINDISABLED capability). Note that if the remote IP |
| | |
| | | # root. |
| | | #ssl_cert_file = /etc/ssl/certs/dovecot.pem |
| | | #ssl_key_file = /etc/ssl/private/dovecot.pem |
| | | |
| | | ssl_cert_file = /etc/postfix/smtpd.cert |
| | | ssl_key_file = /etc/postfix/smtpd.key |
| | | |
| | | # If key file is password protected, give the password here. Alternatively |
| | | # give it when starting dovecot with -p parameter. |
| | |
| | | # database (passwd usually), you can use static userdb. |
| | | # REMEMBER: You'll need /etc/pam.d/dovecot file created for PAM |
| | | # authentication to actually work. <doc/wiki/PasswordDatabase.PAM.txt> |
| | | passdb pam { |
| | | # passdb pam { |
| | | # [blocking=yes] [session=yes] [setcred=yes] |
| | | # [cache_key=<key>] [<service name>] |
| | | # |
| | |
| | | # args = session=yes * |
| | | # args = cache_key=%u dovecot |
| | | #args = dovecot |
| | | } |
| | | # } |
| | | |
| | | # System users (NSS, /etc/passwd, or similiar) |
| | | # In many systems nowadays this uses Name Service Switch, which is |
| | |
| | | # This can be made to work with SQL and LDAP databases, see their example |
| | | # configuration files for more information how to do it. |
| | | # <doc/wiki/UserDatabase.Prefetch.txt> |
| | | #userdb prefetch { |
| | | #} |
| | | userdb prefetch { |
| | | } |
| | | |
| | | # User to use for the process. This user needs access to only user and |
| | | # password databases, nothing else. Only shadow and pam authentication |