]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
AuthbasicProvider of something other then LDAP, with AuthLDAPURL in the per-dir config
authorEric Covener <covener@apache.org>
Sat, 4 Oct 2008 14:59:09 +0000 (14:59 +0000)
committerEric Covener <covener@apache.org>
Sat, 4 Oct 2008 14:59:09 +0000 (14:59 +0000)
behaves a little unintuitively. Document the behavior if/until LDAP can better step
out of the way during authorization.

PR#45946

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@701648 13f79535-47bb-0310-9956-ffa450edef68

docs/manual/mod/mod_authnz_ldap.html.en
docs/manual/mod/mod_authnz_ldap.xml

index ef5684c04653916d6bd644cbec0b5c2414499a85..51065919909b5d5ed270788f9c98344c0c82cbf0 100644 (file)
@@ -953,6 +953,14 @@ environment variable</td></tr>
 
     <p>See above for examples of <code class="directive"><a href="#authldapurl">AuthLDAPURL</a></code> URLs.</p>
 
+    <p> When <code class="directive"><a href="#authldapurl">AuthLDAPURL</a></code>
+    is enabled in a particular context, but some other module has performed
+    authentication for the request, the server will try to map the username to a DN
+    during authorization regardless of whether or not LDAP-specific requirements
+    are present. To ignore the failures to map a username to a DN during
+    authorization, set <code class="directive"><a href="#&#10;    authzldapautoritative">
+    AuthzLDAPAutoritative</a></code> to "off".</p>
+
 </div>
 <div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
 <div class="directive-section"><h2><a name="AuthzLDAPAuthoritative" id="AuthzLDAPAuthoritative">AuthzLDAPAuthoritative</a> <a name="authzldapauthoritative" id="authzldapauthoritative">Directive</a></h2>
index d3b2787d5a070c953342a8ac693385f75bd84c95..4d799d12adfddbd9d4154881d013459a91788b65 100644 (file)
@@ -974,6 +974,14 @@ environment variable</description>
 
     <p>See above for examples of <directive
     module="mod_authnz_ldap">AuthLDAPURL</directive> URLs.</p>
+
+    <p> When <directive module="mod_authnz_ldap">AuthLDAPURL</directive>
+    is enabled in a particular context, but some other module has performed
+    authentication for the request, the server will try to map the username to a DN
+    during authorization regardless of whether or not LDAP-specific requirements
+    are present. To ignore the failures to map a username to a DN during
+    authorization, set <directive module="mod_authnz_ldap">
+    AuthzLDAPAutoritative</directive> to "off".</p>
 </usage>
 </directivesynopsis>