From: André Malo Date: Fri, 21 May 2004 18:44:29 +0000 (+0000) Subject: update transformation X-Git-Tag: 2.0.50~92 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a5292715a3ae153bfd1fe14af49f67c349d41b07;p=thirdparty%2Fapache%2Fhttpd.git update transformation git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/APACHE_2_0_BRANCH@103718 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_auth_ldap.html.en b/docs/manual/mod/mod_auth_ldap.html.en index 1d6f916dd23..6c313531f4c 100644 --- a/docs/manual/mod/mod_auth_ldap.html.en +++ b/docs/manual/mod/mod_auth_ldap.html.en @@ -315,7 +315,8 @@ require user "Joe Manager"

This directive specifies an LDAP group whose members are allowed access. It takes the distinguished name of the LDAP - group. For example, assume that the following entry existed in + group. Note: Do not surround the group name with quotes. + For example, assume that the following entry existed in the LDAP directory:

dn: cn=Administrators, o=Airius
@@ -326,7 +327,7 @@ uniqueMember: cn=Fred User, o=Airius

The following directive would grant access to both Fred and Barbara:

-

require group "cn=Administrators, o=Airius"

+

require group cn=Administrators, o=Airius

Behavior of this directive is modified by the AuthLDAPGroupAttribute and AuthLDAPGroupAttributeIsDN @@ -340,11 +341,12 @@ uniqueMember: cn=Fred User, o=Airius
that must match for access to be granted. If the distinguished name that was retrieved from the directory server matches the distinguished name in the require dn, then - authorization is granted.

+ authorization is granted. Note: do not surround the distinguished + name with quotes.

The following directive would grant access to a specific DN:

-

require dn "cn=Barbara Jenson, o=Airius"

+

require dn cn=Barbara Jenson, o=Airius

Behavior of this directive is modified by the AuthLDAPCompareDNOnServer directive.

@@ -358,8 +360,9 @@ uniqueMember: cn=Fred User, o=Airius
Grant access to anyone who exists in the LDAP directory, using their UID for searches. -

AuthLDAPURL "ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)"
-require valid-user +

+ AuthLDAPURL ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)
+ require valid-user

@@ -367,7 +370,7 @@ require valid-user The next example is the same as above; but with the fields that have useful defaults omitted. Also, note the use of a redundant LDAP server. -

AuthLDAPURL "ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius"
+

AuthLDAPURL ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius
require valid-user

@@ -382,7 +385,7 @@ require valid-user choose an attribute that is guaranteed unique in your directory, such as uid.

-AuthLDAPURL "ldap://ldap.airius.com/ou=People, o=Airius?cn"
+AuthLDAPURL ldap://ldap.airius.com/ou=People, o=Airius?cn
require valid-user

@@ -391,7 +394,7 @@ require valid-user Grant access to anybody in the Administrators group. The users must authenticate using their UID.

-AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid"
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid
require group cn=Administrators, o=Airius

@@ -403,7 +406,7 @@ require group cn=Administrators, o=Airius only to people (authenticated via their UID) who have alphanumeric pagers:

-AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)"
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)
require valid-user

@@ -419,7 +422,7 @@ require valid-user have a pager, but does need to access the same resource:

-AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))"
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))
require valid-user

diff --git a/docs/manual/mod/mod_auth_ldap.xml b/docs/manual/mod/mod_auth_ldap.xml index 2c7333ac35d..454a0828ac0 100644 --- a/docs/manual/mod/mod_auth_ldap.xml +++ b/docs/manual/mod/mod_auth_ldap.xml @@ -1,7 +1,7 @@ - + +