From: Christophe Jaillet
Date: Fri, 15 Feb 2019 20:51:16 +0000 (+0000)
Subject: - Be consistent with the case used for uniqueMember.
X-Git-Tag: 2.4.39~90
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=1523852ec90d7eeb734300b3c69383ea86b3b965;p=thirdparty%2Fapache%2Fhttpd.git
- Be consistent with the case used for uniqueMember.
- Be consistent with the case used for AuthLDAPURL. Use uppercase URL, as in the code in order to fix syntax highlight issues.
- Fix the case of AuthLDAPSubGroupAttribute in , so that quickreference.xsl works as expected
Fix some other small layout issues.
(r1853664 in trunk)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1853665 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_authnz_ldap.xml b/docs/manual/mod/mod_authnz_ldap.xml
index f810f707b5d..6447f235975 100644
--- a/docs/manual/mod/mod_authnz_ldap.xml
+++ b/docs/manual/mod/mod_authnz_ldap.xml
@@ -655,11 +655,11 @@ Require valid-user
Exposing Login Information
when this module performs authentication, ldap attributes specified
- in the authldapurl
+ in the AuthLDAPURL
directive are placed in environment variables with the prefix "AUTHENTICATE_".
when this module performs authorization, ldap attributes specified
- in the authldapurl
+ in the AuthLDAPURL
directive are placed in environment variables with the prefix "AUTHORIZE_".
If the attribute field contains the username, common name
@@ -1073,7 +1073,7 @@ AuthLDAPBindPassword "exec:/path/to/otherProgram argument1"
LDAP attributes used to identify the user members of
groups.
AuthLDAPGroupAttribute attribute
-AuthLDAPGroupAttribute member uniquemember
+AuthLDAPGroupAttribute member uniqueMember
directory.htaccess
AuthConfig
@@ -1083,7 +1083,7 @@ groups.
check for user members within groups. Multiple attributes can be used
by specifying this directive multiple times. If not specified,
then mod_authnz_ldap uses the member and
- uniquemember attributes.
+ uniqueMember attributes.
@@ -1157,7 +1157,8 @@ query to set the REMOTE_USER environment variable
If this directive is set, the value of the
REMOTE_USER environment variable will be set to the
value of the attribute specified. Make sure that this attribute is
- included in the list of attributes in the AuthLDAPUrl definition,
+ included in the list of attributes in the AuthLDAPURL definition,
otherwise this directive will have no effect. This directive, if
present, takes precedence over AuthLDAPRemoteUserIsDN. This
@@ -1224,7 +1225,7 @@ environment variable
directive line, used to distinguish the members of the current group that
are groups.
AuthLDAPSubGroupAttribute attribute
-AuthLDAPSubgroupAttribute member uniquemember
+AuthLDAPSubGroupAttribute member uniqueMember
directory.htaccess
AuthConfig
@@ -1271,9 +1272,9 @@ objects that are groups during sub-group processing.
-AuthLDAPUrl
+AuthLDAPURL
URL specifying the LDAP search parameters
-AuthLDAPUrl url [NONE|SSL|TLS|STARTTLS]
+AuthLDAPURL url [NONE|SSL|TLS|STARTTLS]
directory.htaccess
AuthConfig
@@ -1284,7 +1285,7 @@ objects that are groups during sub-group processing.
ldap://host:port/basedn?attribute?scope?filter
If you want to specify more than one LDAP URL that Apache should try in turn, the syntax is:
-AuthLDAPUrl "ldap://ldap1.example.com ldap2.example.com/dc=..."
+AuthLDAPURL "ldap://ldap1.example.com ldap2.example.com/dc=..."
Caveat: If you specify multiple servers, you need to enclose the entire URL string in quotes;
otherwise you will get an error: "AuthLDAPURL takes one argument, URL to define LDAP connection.."
@@ -1390,7 +1391,7 @@ You can of course use search parameters on each of these.
See above for examples of AuthLDAPUrl URLs.
+ module="mod_authnz_ldap">AuthLDAPURL URLs.