From: Christophe Jaillet Date: Fri, 15 Feb 2019 20:51:16 +0000 (+0000) Subject: - Be consistent with the case used for uniqueMember. X-Git-Tag: 2.4.39~90 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=1523852ec90d7eeb734300b3c69383ea86b3b965;p=thirdparty%2Fapache%2Fhttpd.git - Be consistent with the case used for uniqueMember. - Be consistent with the case used for AuthLDAPURL. Use uppercase URL, as in the code in order to fix syntax highlight issues. - Fix the case of AuthLDAPSubGroupAttribute in , so that quickreference.xsl works as expected Fix some other small layout issues. (r1853664 in trunk) git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1853665 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_authnz_ldap.xml b/docs/manual/mod/mod_authnz_ldap.xml index f810f707b5d..6447f235975 100644 --- a/docs/manual/mod/mod_authnz_ldap.xml +++ b/docs/manual/mod/mod_authnz_ldap.xml @@ -655,11 +655,11 @@ Require valid-user
Exposing Login Information

when this module performs authentication, ldap attributes specified - in the authldapurl + in the AuthLDAPURL directive are placed in environment variables with the prefix "AUTHENTICATE_".

when this module performs authorization, ldap attributes specified - in the authldapurl + in the AuthLDAPURL directive are placed in environment variables with the prefix "AUTHORIZE_".

If the attribute field contains the username, common name @@ -1073,7 +1073,7 @@ AuthLDAPBindPassword "exec:/path/to/otherProgram argument1" LDAP attributes used to identify the user members of groups. AuthLDAPGroupAttribute attribute -AuthLDAPGroupAttribute member uniquemember +AuthLDAPGroupAttribute member uniqueMember directory.htaccess AuthConfig @@ -1083,7 +1083,7 @@ groups. check for user members within groups. Multiple attributes can be used by specifying this directive multiple times. If not specified, then mod_authnz_ldap uses the member and - uniquemember attributes.

+ uniqueMember attributes.

@@ -1157,7 +1157,8 @@ query to set the REMOTE_USER environment variable

If this directive is set, the value of the REMOTE_USER environment variable will be set to the value of the attribute specified. Make sure that this attribute is - included in the list of attributes in the AuthLDAPUrl definition, + included in the list of attributes in the AuthLDAPURL definition, otherwise this directive will have no effect. This directive, if present, takes precedence over AuthLDAPRemoteUserIsDN. This @@ -1224,7 +1225,7 @@ environment variable directive line, used to distinguish the members of the current group that are groups. AuthLDAPSubGroupAttribute attribute -AuthLDAPSubgroupAttribute member uniquemember +AuthLDAPSubGroupAttribute member uniqueMember directory.htaccess AuthConfig @@ -1271,9 +1272,9 @@ objects that are groups during sub-group processing. -AuthLDAPUrl +AuthLDAPURL URL specifying the LDAP search parameters -AuthLDAPUrl url [NONE|SSL|TLS|STARTTLS] +AuthLDAPURL url [NONE|SSL|TLS|STARTTLS] directory.htaccess AuthConfig @@ -1284,7 +1285,7 @@ objects that are groups during sub-group processing. ldap://host:port/basedn?attribute?scope?filter

If you want to specify more than one LDAP URL that Apache should try in turn, the syntax is:

-AuthLDAPUrl "ldap://ldap1.example.com ldap2.example.com/dc=..." +AuthLDAPURL "ldap://ldap1.example.com ldap2.example.com/dc=..."

Caveat: If you specify multiple servers, you need to enclose the entire URL string in quotes; otherwise you will get an error: "AuthLDAPURL takes one argument, URL to define LDAP connection.." @@ -1390,7 +1391,7 @@ You can of course use search parameters on each of these.

See above for examples of AuthLDAPUrl URLs.

+ module="mod_authnz_ldap">AuthLDAPURL URLs.