From 0239bc6ec6afc491fefe1f66ec3ab16fddee4d8a Mon Sep 17 00:00:00 2001
From: =?utf8?q?Andr=C3=A9=20Malo?= Apache HTTP Server Version 2.1 Available Languages: en This module provides authentication front-ends such as
+ When using There are two phases in granting access to a user. The first
+ phase is authentication, in which the During the authentication phase, The following directives are used during the search/bind
+ phase During the authorization phase, Other Apache's If this directive exists, The Because of the way that If the This directive specifies an LDAP group whose members are
+ allowed access. It takes the distinguished name of the LDAP
+ group. Note: Do not surround the group name with quotes.
+ For example, assume that the following entry existed in
+ the LDAP directory: The following directive would grant access to both Fred and
+ Barbara: Behavior of this directive is modified by the The The following directive would grant access to a specific
+ DN: Behavior of this directive is modified by the The next example demonstrates the power of using filters
+ to accomplish complicated administrative requirements.
+ Without filters, it would have been necessary to create a
+ new LDAP group and ensure that the group's members remain
+ synchronized with the pager users. This becomes trivial
+ with filters. The goal is to grant access to anyone who has
+ a filter, plus grant access to Joe Manager, who doesn't
+ have a pager, but does need to access the same
+ resource: This last may look confusing at first, so it helps to
+ evaluate what the search filter will look like based on who
+ connects, as shown below. The text in blue is the part that
+ is filled in using the attribute specified in the URL. The
+ text in red is the part that is filled in using the filter
+ specified in the URL. The text in green is filled in using
+ the information that is retrieved from the HTTP client. If
+ Fred User connects as The above search will only succeed if fuser has a
+ pager. When Joe Manager connects as jmanager, the
+ filter looks like The above search will succeed whether jmanager
+ has a pager or not. To use TLS, see the To use SSL, see the To specify a secure LDAP server, use ldaps:// in the
+ Normally, FrontPage uses FrontPage-web-specific user/group
+ files (i.e., the Once a FrontPage web has been created, adding LDAP
+ authentication to it is a matter of adding the following
+ directives to every FrontPage restricts access to a web by adding the Once directives have been added as specified above,
+ FrontPage users will be able to perform all management
+ operations from the FrontPage client. Set to An optional DN used to bind to the server when searching for
+ entries. If not provided, A bind password to use in conjunction with the bind DN. Note
+ that the bind password is probably sensitive data, and should be
+ properly protected. You should only use the The The file contains lines in the following format: The case of the extension does not matter. Blank lines, and lines
+ beginning with a hash character ( When set, This directive specifies when This directive specifies which LDAP attributes are used to
+ check for group membership. Multiple attributes can be used by
+ specifying this directive multiple times. If not specified,
+ then When set If this directive is set to on, the value of the
+ An RFC 2255 URL which specifies the LDAP search parameters
+ to use. The syntax of the URL is The name/port of the ldap server (defaults to
+ Once a connection has been made to a server, that
+ connection remains active for the life of the
+ If the LDAP server goes down and breaks an existing
+ connection, When doing searches, the attribute, filter and username passed
+ by the HTTP client are combined to create a search filter that
+ looks like
+ For example, consider an URL of
+ See above for examples of Available Languages: en The following is an example configuration that uses

Apache Module mod_authnz_ldap
+
+
+Description: Allows an LDAP directory to be used to store the database
+for HTTP Basic authentication.
+Status: Extension
+Module Identifier: authnz_ldap_module
+Source File: mod_authnz_ldap.c Compatibility: Available in version 2.1 and later Summary
+
+ mod_auth_basic to authenticate users through
+ an ldap directory.mod_authnz_ldap supports the following features:
+
+
+ mod_auth_basic, this module is invoked
+ via the AuthBasicProvider
+ directive with the ldap value.Directives
+
+
+
AuthLDAPAuthoritative
AuthLDAPBindDN
AuthLDAPBindPassword
AuthLDAPCharsetConfig
AuthLDAPCompareDNOnServer
AuthLDAPDereferenceAliases
AuthLDAPGroupAttribute
AuthLDAPGroupAttributeIsDN
AuthLDAPRemoteUserIsDN
AuthLDAPUrlTopics
+
+
Contents
Operation
The require Directives
Examples
Using TLS
Using SSL
Using Microsoft
+ FrontPage with mod_authnz_ldapSee also
+Contents
+
+
+
+mod_authnz_ldap
+
+
+
+ Operation
+
+ mod_authnz_ldap
+ authentication provider verifies that the user's credentials are valid.
+ This is also called the search/bind phase. The second phase is
+ authorization, in which mod_authnz_ldap determines
+ if the authenticated user is allowed access to the resource in
+ question. This is also known as the compare
+ phase.mod_authnz_ldap registers both an authn_ldap authentication
+ provider and an anthz_ldap authorization handler. The authn_ldap
+ authentication provider can be enabled through the
+ AuthBasicProvider directive
+ using the ldap value. The authz_ldap handler extends the
+ Require directive's authorization types
+ by adding ldap-user, ldap-dn and ldap-group
+ values.The Authentication
+ Phase
+
+ mod_authnz_ldap
+ searches for an entry in the directory that matches the username
+ that the HTTP client passes. If a single unique match is found,
+ then mod_authnz_ldap attempts to bind to the
+ directory server using the DN of the entry plus the password
+ provided by the HTTP client. Because it does a search, then a
+ bind, it is often referred to as the search/bind phase. Here are
+ the steps taken during the search/bind phase.
+
+
+ AuthLDAPURL directive with
+ the username passed by the HTTP client.
+
+
+
+
+
+
+
+
+
+ AuthLDAPURLSpecifies the LDAP server, the
+ base DN, the attribute to use in the search, as well as the
+ extra search filter to use.
+
+
+
+
+
+ AuthLDAPBindDNAn optional DN to bind with
+ during the search phase.
+
+
+
+
+ AuthLDAPBindPasswordAn optional password to bind
+ with during the search phase.
+ The Authorization Phase
+
+ mod_authnz_ldap
+ attempts to determine if the user is authorized to access the
+ resource. Many of these checks require
+ mod_authnz_ldap to do a compare operation on the
+ LDAP server. This is why this phase is often referred to as the
+ compare phase. mod_authnz_ldap accepts the
+ following Require
+ directives to determine if the credentials are acceptable:
+
+
+ require ldap-user directive, and the
+ username in the directive matches the username passed by the
+ client.require
+ ldap-dn directive, and the DN in the directive matches
+ the DN fetched from the LDAP directory.require ldap-group directive, and
+ the DN fetched from the LDAP directory (or the username
+ passed by the client) occurs in the LDAP group.Require values may also be
+ used which may require loading additional authorization modules.
+
+
+
+ require
+ valid-user directive. (requires
+ mod_authz_user)require group directive, and
+ mod_authz_groupfile has been loaded with the
+ AuthGroupFile
+ directive set.mod_authnz_ldap uses the following directives during the
+ compare phase:
+
+
+
+
+
+
+
+
+ AuthLDAPURL The attribute specified in the
+ URL is used in compare operations for the
+ require
+ user operation.
+
+
+
+
+ AuthLDAPCompareDNOnServerDetermines the behavior of the
+
+ require dn directive.
+
+
+
+
+ AuthLDAPGroupAttributeDetermines the attribute to
+ use for comparisons in the
+ require group
+ directive.
+
+
+
+ AuthLDAPGroupAttributeIsDNSpecifies whether to use the
+ user DN or the username when doing comparisons for the
+
+ require group directive.The require Directives
+
+ Require
+ directives are used during the authorization phase to ensure that
+ a user is allowed to access a resource. mod_authnz_ldap extends the
+ authorization types with ldap-user, ldap-dn
+ and ldap-group. Other authorization types may also be
+ used but may require that additional authorization modules be loaded.require valid-user
+
+ mod_authnz_ldap grants
+ access to any user that has successfully authenticated during the
+ search/bind phase. Requires that mod_authz_user be
+ loaded and that the
+ AuthLDAPAuthoritative
+ directive be set to off.require ldap-user
+
+ require ldap-user directive specifies what
+ usernames can access the resource. Once
+ mod_authnz_ldap has retrieved a unique DN from the
+ directory, it does an LDAP compare operation using the username
+ specified in the require ldap-user to see if that username
+ is part of the just-fetched LDAP entry. Multiple users can be
+ granted access by putting multiple usernames on the line,
+ separated with spaces. If a username has a space in it, then it
+ must be surrounded with double quotes. Multiple users can also be
+ granted access by using multiple require ldap-user
+ directives, with one user per line. For example, with a AuthLDAPURL of
+ ldap://ldap/o=Airius?cn (i.e., cn is
+ used for searches), the following require directives could be used
+ to restrict access:
+require ldap-user "Barbara Jenson"
+require ldap-user "Fred User"
+require ldap-user "Joe Manager"
+mod_authnz_ldap handles this
+ directive, Barbara Jenson could sign on as Barbara
+ Jenson, Babs Jenson or any other cn that
+ she has in her LDAP entry. Only the single require
+ ldap-user line is needed to support all values of the attribute
+ in the user's entry.uid attribute was used instead of the
+ cn attribute in the URL above, the above three lines
+ could be condensed torequire ldap-user bjenson fuser jmanagerrequire ldap-group
+
+
+dn: cn=Administrators, o=Airius
+objectClass: groupOfUniqueNames
+uniqueMember: cn=Barbara Jenson, o=Airius
+uniqueMember: cn=Fred User, o=Airius
+require ldap-group cn=Administrators, o=AiriusAuthLDAPGroupAttribute and
+ AuthLDAPGroupAttributeIsDN
+ directives.require ldap-dn
+
+ require ldap-dn directive allows the administrator
+ to grant access based on distinguished names. It specifies a DN
+ that must match for access to be granted. If the distinguished
+ name that was retrieved from the directory server matches the
+ distinguished name in the require ldap-dn, then
+ authorization is granted. Note: do not surround the distinguished
+ name with quotes.require ldap-dn cn=Barbara Jenson, o=AiriusAuthLDAPCompareDNOnServer
+ directive.Examples
+
+
+
+
+AuthLDAPURL ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)
+require valid-user
+AuthLDAPURL ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius
+require valid-user
+cn, because a search on cn
+ must return exactly one entry. That's why
+ this approach is not recommended: it's a better idea to
+ choose an attribute that is guaranteed unique in your
+ directory, such as uid.
+
+AuthLDAPURL ldap://ldap.airius.com/ou=People, o=Airius?cn
+require valid-user
+
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid
+require ldap-group cn=Administrators, o=Airius
+qpagePagerID. The example will grant access
+ only to people (authenticated via their UID) who have
+ alphanumeric pagers:
+
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)
+require valid-user
+
+AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))
+require valid-user
+fuser, the filter would look
+ like(&(|(qpagePagerID=*)(uid=jmanager))(uid=fuser))(&(|(qpagePagerID=*)(uid=jmanager))(uid=jmanager))Using TLS
+
+ mod_ldap directives LDAPTrustedCA and LDAPTrustedCAType.Using SSL
+
+ mod_ldap directives LDAPTrustedCA and LDAPTrustedCAType.AuthLDAPURL
+ directive, instead of ldap://.Using Microsoft
+ FrontPage with mod_authnz_ldap
+
+ mod_authn_file and
+ mod_authz_groupfile modules) to handle all
+ authentication. Unfortunately, it is not possible to just
+ change to LDAP authentication by adding the proper directives,
+ because it will break the Permissions forms in
+ the FrontPage client, which attempt to modify the standard
+ text-based authorization files..htaccess file
+ that gets created in the web
+AuthLDAPURL "the url"
+AuthLDAPAuthoritative off
+AuthGroupFile mygroupfile
+require group mygroupfile
+
AuthLDAPAuthoritative
+ must be off to allow mod_authnz_ldap to decline group
+ authentication so that Apache will fall back to file
+ authentication for checking group membership. This allows the
+ FrontPage-managed group file to be used.How It Works
+
+ require
+ valid-user directive to the .htaccess
+ files. The require valid-user directive will succeed for
+ any user who is valid as far as LDAP is
+ concerned. This means that anybody who has an entry in
+ the LDAP directory is considered a valid user, whereas FrontPage
+ considers only those people in the local user file to be
+ valid. By substituting the ldap-group with group file authorization,
+ Apache is allowed to consult the local user file (which is managed by
+ FrontPage) - instead of LDAP - when handling authorizing the user.Caveats
+
+
+
+
+mod_authn_file user file.
+ The user ID is ideal for this.mod_auth_basic,
+ mod_authn_file and
+ mod_authz_groupfile in order to
+ use FrontPage support. This is because Apache will still use
+ the mod_authz_groupfile group file for determine
+ the extent of a user's access to the FrontPage web..htaccess
+ files. Attempting to put them inside <Location> or <Directory> directives won't work. This
+ is because mod_authnz_ldap has to be able to grab
+ the AuthGroupFile
+ directive that is found in FrontPage .htaccess
+ files so that it knows where to look for the valid user list. If
+ the mod_authnz_ldap directives aren't in the same
+ .htaccess file as the FrontPage directives, then
+ the hack won't work, because mod_authnz_ldap will
+ never get a chance to process the .htaccess file,
+ and won't be able to find the FrontPage-managed user file.AuthLDAPAuthoritative Directive
+
+
+
+Description: Prevent other authentication modules from
+authenticating the user if this one fails
+Syntax: AuthLDAPAuthoritative on|off
+Default: AuthLDAPAuthoritative on
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap off if this module should let other
+ authentication modules attempt to authenticate the user, should
+ authentication with this module fail. Control is only passed on
+ to lower modules if there is no DN or rule that matches the
+ supplied user name (as passed by the client).AuthLDAPBindDN Directive
+
+
+
+Description: Optional DN to use in binding to the LDAP server
+Syntax: AuthLDAPBindDN distinguished-name
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap mod_authnz_ldap will use
+ an anonymous bind.AuthLDAPBindPassword Directive
+
+
+
+Description: Password used in conjuction with the bind DN
+Syntax: AuthLDAPBindPassword password
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap AuthLDAPBindDN and AuthLDAPBindPassword if you
+ absolutely need them to search the directory.AuthLDAPCharsetConfig Directive
+
+
+
+Description: Language to charset conversion configuration file
+Syntax: AuthLDAPCharsetConfig file-path
+Context: server config
+Status: Extension
+Module: mod_authnz_ldap AuthLDAPCharsetConfig directive sets the location
+ of the language to charset conversion configuration file. File-path is relative
+ to the ServerRoot. This file specifies
+ the list of language extensions to character sets.
+ Most administrators use the provided charset.conv
+ file, which associates common language extensions to character sets.
+ Language-Extension charset [Language-String] ...
+ #) are ignored.AuthLDAPCompareDNOnServer Directive
+
+
+
+Description: Use the LDAP server to compare the DNs
+Syntax: AuthLDAPCompareDNOnServer on|off
+Default: AuthLDAPCompareDNOnServer on
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap mod_authnz_ldap will use the LDAP
+ server to compare the DNs. This is the only foolproof way to
+ compare DNs. mod_authnz_ldap will search the
+ directory for the DN specified with the require dn directive, then,
+ retrieve the DN and compare it with the DN retrieved from the user
+ entry. If this directive is not set,
+ mod_authnz_ldap simply does a string comparison. It
+ is possible to get false negatives with this approach, but it is
+ much faster. Note the mod_ldap cache can speed up
+ DN comparison in most situations.AuthLDAPDereferenceAliases Directive
+
+
+
+Description: When will the module de-reference aliases
+Syntax: AuthLDAPDereferenceAliases never|searching|finding|always
+Default: AuthLDAPDereferenceAliases Always
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap mod_authnz_ldap will
+ de-reference aliases during LDAP operations. The default is
+ always.AuthLDAPGroupAttribute Directive
+
+
+
+Description: LDAP attributes used to check for group membership
+Syntax: AuthLDAPGroupAttribute attribute
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap mod_authnz_ldap uses the member and
+ uniquemember attributes.AuthLDAPGroupAttributeIsDN Directive
+
+
+
+Description: Use the DN of the client username when checking for
+group membership
+Syntax: AuthLDAPGroupAttributeIsDN on|off
+Default: AuthLDAPGroupAttributeIsDN on
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap on, this directive says to use the
+ distinguished name of the client username when checking for group
+ membership. Otherwise, the username will be used. For example,
+ assume that the client sent the username bjenson,
+ which corresponds to the LDAP DN cn=Babs Jenson,
+ o=Airius. If this directive is set,
+ mod_authnz_ldap will check if the group has
+ cn=Babs Jenson, o=Airius as a member. If this
+ directive is not set, then mod_authnz_ldap will
+ check if the group has bjenson as a member.AuthLDAPRemoteUserIsDN Directive
+
+
+
+Description: Use the DN of the client username to set the REMOTE_USER
+environment variable
+Syntax: AuthLDAPRemoteUserIsDN on|off
+Default: AuthLDAPRemoteUserIsDN off
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap REMOTE_USER environment variable will be set to the full
+ distinguished name of the authenticated user, rather than just
+ the username that was passed by the client. It is turned off by
+ default.AuthLDAPUrl Directive
+
+
+
+Description: URL specifying the LDAP search parameters
+Syntax: AuthLDAPUrl url
+Context: directory, .htaccess
+Override: AuthConfig
+Status: Extension
+Module: mod_authnz_ldap ldap://host:port/basedn?attribute?scope?filter
+
+
+ ldap. For secure LDAP, use ldaps
+ instead. Secure LDAP is only available if Apache was linked
+ to an LDAP library with SSL support.localhost:389 for ldap, and
+ localhost:636 for ldaps). To
+ specify multiple, redundant LDAP servers, just list all
+ servers, separated by spaces. mod_authnz_ldap
+ will try connecting to each server in turn, until it makes a
+ successful connection.httpd process, or until the LDAP server goes
+ down.mod_authnz_ldap will attempt to
+ re-connect, starting with the primary server, and trying
+ each redundant server in turn. Note that this is different
+ than a true round-robin search.uid. It's a good
+ idea to choose an attribute that will be unique across all
+ entries in the subtree you will be using.one or
+ sub. Note that a scope of base is
+ also supported by RFC 2255, but is not supported by this
+ module. If the scope is not provided, or if base scope
+ is specified, the default is to use a scope of
+ sub.(objectClass=*), which
+ will search for all objects in the tree. Filters are
+ limited to approximately 8000 characters (the definition of
+ MAX_STRING_LEN in the Apache source code). This
+ should be than sufficient for any application.(&(filter)(attribute=username)).ldap://ldap.airius.com/o=Airius?cn?sub?(posixid=*). When
+ a client attempts to connect using a username of Babs
+ Jenson, the resulting search filter will be
+ (&(posixid=*)(cn=Babs Jenson)).AuthLDAPURL URLs.Example Configuration
mod_ldap to increase the performance of HTTP Basic
- authentication provided by mod_auth_ldap.mod_authnz_ldap.
# Enable the LDAP connection pool and shared
# memory cache. Enable the LDAP cache status
- # handler. Requires that mod_ldap and mod_auth_ldap
+ # handler. Requires that mod_ldap and mod_authnz_ldap
# be loaded. Change the "yourdomain.example.com" to
# match your domain.
@@ -127,7 +127,7 @@ by other LDAP modules
caching strategy to minimize the number of times that the LDAP
server must be contacted. Caching can easily double or triple
the throughput of Apache when it is serving pages protected
- with mod_auth_ldap. In addition, the load on the LDAP server
+ with mod_authnz_ldap. In addition, the load on the LDAP server
will be significantly decreased.
mod_ldap supports two types of LDAP caching during
@@ -211,7 +211,7 @@ by other LDAP modules
# Establish an SSL LDAP connection. Requires that
- # mod_ldap and mod_auth_ldap be loaded. Change the
+ # mod_ldap and mod_authnz_ldap be loaded. Change the
# "yourdomain.example.com" to match your domain.
LDAPTrustedCA /certs/certfile.der
diff --git a/docs/manual/mod/quickreference.html.de b/docs/manual/mod/quickreference.html.de
index a958d10af38..909f7763966 100644
--- a/docs/manual/mod/quickreference.html.de
+++ b/docs/manual/mod/quickreference.html.de
@@ -165,21 +165,19 @@ authentication
of clients
AuthGroupFile file-path dh B
-Sets the name of a text file containing the list
of user groups for authentication AuthLDAPAuthoritative on|off on dh X Prevent other authentication modules from
+ AuthLDAPAuthoritative on|off on dh E
-Prevent other authentication modules from
authenticating the user if this one fails AuthLDAPBindDN distinguished-name dh X
-Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh X
-Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s X
-Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh X
-Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh X
-When will the module de-reference aliases AuthLDAPEnabled on|off on dh X
-Turn on or off LDAP authentication AuthLDAPFrontPageHack on|off off dh X
-Allow LDAP authentication to work with MS FrontPage AuthLDAPGroupAttribute attribute dh X
-LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh X Use the DN of the client username when checking for
+ AuthLDAPBindDN distinguished-name dh E
+Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh E
+Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s E
+Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh E
+Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh E
+When will the module de-reference aliases AuthLDAPGroupAttribute attribute dh E
+LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh E
-Use the DN of the client username when checking for
group membership AuthLDAPRemoteUserIsDN on|off off dh X Use the DN of the client username to set the REMOTE_USER
+ AuthLDAPRemoteUserIsDN on|off off dh E
-Use the DN of the client username to set the REMOTE_USER
environment variable AuthLDAPUrl url dh X
+URL specifying the LDAP search parameters AuthLDAPUrl url dh E URL specifying the LDAP search parameters AuthName auth-Bereich dh C Autorisierungsbereich zur Verwendung in der
HTTP-Authentisierung AuthType Basic|Digest dh C
diff --git a/docs/manual/mod/quickreference.html.en b/docs/manual/mod/quickreference.html.en
index 8690f11deb0..3372acb3405 100644
--- a/docs/manual/mod/quickreference.html.en
+++ b/docs/manual/mod/quickreference.html.en
@@ -161,21 +161,19 @@ authentication
of clients
Art der Authentisierung AuthGroupFile file-path dh B
-Sets the name of a text file containing the list
of user groups for authentication AuthLDAPAuthoritative on|off on dh X Prevent other authentication modules from
+ AuthLDAPAuthoritative on|off on dh E
-Prevent other authentication modules from
authenticating the user if this one fails AuthLDAPBindDN distinguished-name dh X
-Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh X
-Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s X
-Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh X
-Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh X
-When will the module de-reference aliases AuthLDAPEnabled on|off on dh X
-Turn on or off LDAP authentication AuthLDAPFrontPageHack on|off off dh X
-Allow LDAP authentication to work with MS FrontPage AuthLDAPGroupAttribute attribute dh X
-LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh X Use the DN of the client username when checking for
+ AuthLDAPBindDN distinguished-name dh E
+Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh E
+Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s E
+Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh E
+Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh E
+When will the module de-reference aliases AuthLDAPGroupAttribute attribute dh E
+LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh E
-Use the DN of the client username when checking for
group membership AuthLDAPRemoteUserIsDN on|off off dh X Use the DN of the client username to set the REMOTE_USER
+ AuthLDAPRemoteUserIsDN on|off off dh E
-Use the DN of the client username to set the REMOTE_USER
environment variable AuthLDAPUrl url dh X
+URL specifying the LDAP search parameters AuthLDAPUrl url dh E URL specifying the LDAP search parameters AuthName auth-domain dh C Authorization realm for use in HTTP
authentication AuthType Basic|Digest dh C
diff --git a/docs/manual/mod/quickreference.html.es b/docs/manual/mod/quickreference.html.es
index 443965e6698..a0aa5b81bc1 100644
--- a/docs/manual/mod/quickreference.html.es
+++ b/docs/manual/mod/quickreference.html.es
@@ -164,21 +164,19 @@ authentication
of clients
Type of user authentication AuthGroupFile file-path dh B
-Sets the name of a text file containing the list
of user groups for authentication AuthLDAPAuthoritative on|off on dh X Prevent other authentication modules from
+ AuthLDAPAuthoritative on|off on dh E
-Prevent other authentication modules from
authenticating the user if this one fails AuthLDAPBindDN distinguished-name dh X
-Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh X
-Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s X
-Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh X
-Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh X
-When will the module de-reference aliases AuthLDAPEnabled on|off on dh X
-Turn on or off LDAP authentication AuthLDAPFrontPageHack on|off off dh X
-Allow LDAP authentication to work with MS FrontPage AuthLDAPGroupAttribute attribute dh X
-LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh X Use the DN of the client username when checking for
+ AuthLDAPBindDN distinguished-name dh E
+Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh E
+Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s E
+Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh E
+Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh E
+When will the module de-reference aliases AuthLDAPGroupAttribute attribute dh E
+LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh E
-Use the DN of the client username when checking for
group membership AuthLDAPRemoteUserIsDN on|off off dh X Use the DN of the client username to set the REMOTE_USER
+ AuthLDAPRemoteUserIsDN on|off off dh E
-Use the DN of the client username to set the REMOTE_USER
environment variable AuthLDAPUrl url dh X
+URL specifying the LDAP search parameters AuthLDAPUrl url dh E URL specifying the LDAP search parameters AuthName auth-domain dh C Authorization realm for use in HTTP
authentication AuthType Basic|Digest dh C
diff --git a/docs/manual/mod/quickreference.html.ja.euc-jp b/docs/manual/mod/quickreference.html.ja.euc-jp
index 4d0ea2038f4..6e38dd53676 100644
--- a/docs/manual/mod/quickreference.html.ja.euc-jp
+++ b/docs/manual/mod/quickreference.html.ja.euc-jp
@@ -157,21 +157,19 @@ authentication
of clients
Type of user authentication AuthGroupFile file-path dh B
-ǧ¾Ú¤Ë»ÈÍѤ¹¤ë¥æ¡¼¥¶¥°¥ë¡¼¥×¤Î°ìÍ÷¤¬³ÊǼ¤µ¤ì¤Æ¤¤¤ë¡¢
¥Æ¥¥¹¥È¥Õ¥¡¥¤¥ë¤Î̾Á°¤òÀßÄꤹ¤ë AuthLDAPAuthoritative on|off on dh X Prevent other authentication modules from
+ AuthLDAPAuthoritative on|off on dh E
-Prevent other authentication modules from
authenticating the user if this one fails AuthLDAPBindDN distinguished-name dh X
-Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh X
-Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s X
-Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh X
-Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh X
-When will the module de-reference aliases AuthLDAPEnabled on|off on dh X
-Turn on or off LDAP authentication AuthLDAPFrontPageHack on|off off dh X
-Allow LDAP authentication to work with MS FrontPage AuthLDAPGroupAttribute attribute dh X
-LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh X Use the DN of the client username when checking for
+ AuthLDAPBindDN distinguished-name dh E
+Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh E
+Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s E
+Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh E
+Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh E
+When will the module de-reference aliases AuthLDAPGroupAttribute attribute dh E
+LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh E
-Use the DN of the client username when checking for
group membership AuthLDAPRemoteUserIsDN on|off off dh X Use the DN of the client username to set the REMOTE_USER
+ AuthLDAPRemoteUserIsDN on|off off dh E
-Use the DN of the client username to set the REMOTE_USER
environment variable AuthLDAPUrl url dh X
+URL specifying the LDAP search parameters AuthLDAPUrl url dh E URL specifying the LDAP search parameters AuthName auth-domain dh C HTTP ǧ¾Ú¤Îǧ²ÄÎΰè (ÌõÃí: realm) AuthType Basic|Digest dh C ¥æ¡¼¥¶Ç§¾Ú¤Î¼ïÎà AuthUserFile file-path dh B ǧ¾Ú¤Ë»ÈÍѤ¹¤ë¥æ¡¼¥¶¤È¥Ñ¥¹¥ï¡¼¥É¤Î°ìÍ÷¤¬³ÊǼ¤µ¤ì¤Æ¤¤¤ë¡¢
diff --git a/docs/manual/mod/quickreference.html.ko.euc-kr b/docs/manual/mod/quickreference.html.ko.euc-kr
index 587cceca710..8091fdc22eb 100644
--- a/docs/manual/mod/quickreference.html.ko.euc-kr
+++ b/docs/manual/mod/quickreference.html.ko.euc-kr
@@ -149,21 +149,19 @@ URI
AuthDigestShmemSize size 1000 s X Ŭ¶óÀÌ¾ðÆ®¸¦ ÃßÀûÇϱâÀ§ÇØ ÇÒ´çÇÏ´Â °øÀ¯¸Þ¸ð¸®·® AuthGroupFile file-path dh B
-ÀÎÁõ¿¡ »ç¿ëÇÒ »ç¿ëÀÚ ±×·ì ¸ñ·ÏÀ» ÀúÀåÇÏ´Â ¹®ÀÚÆÄÀϸíÀ»
ÁöÁ¤ÇÑ´Ù AuthLDAPAuthoritative on|off on dh X Prevent other authentication modules from
+ AuthLDAPAuthoritative on|off on dh E
-Prevent other authentication modules from
authenticating the user if this one fails AuthLDAPBindDN distinguished-name dh X
-Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh X
-Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s X
-Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh X
-Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh X
-When will the module de-reference aliases AuthLDAPEnabled on|off on dh X
-Turn on or off LDAP authentication AuthLDAPFrontPageHack on|off off dh X
-Allow LDAP authentication to work with MS FrontPage AuthLDAPGroupAttribute attribute dh X
-LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh X Use the DN of the client username when checking for
+ AuthLDAPBindDN distinguished-name dh E
+Optional DN to use in binding to the LDAP server AuthLDAPBindPassword password dh E
+Password used in conjuction with the bind DN AuthLDAPCharsetConfig file-path s E
+Language to charset conversion configuration file AuthLDAPCompareDNOnServer on|off on dh E
+Use the LDAP server to compare the DNs AuthLDAPDereferenceAliases never|searching|finding|always Always dh E
+When will the module de-reference aliases AuthLDAPGroupAttribute attribute dh E
+LDAP attributes used to check for group membership AuthLDAPGroupAttributeIsDN on|off on dh E
-Use the DN of the client username when checking for
group membership AuthLDAPRemoteUserIsDN on|off off dh X Use the DN of the client username to set the REMOTE_USER
+ AuthLDAPRemoteUserIsDN on|off off dh E
-Use the DN of the client username to set the REMOTE_USER
environment variable AuthLDAPUrl url dh X
+URL specifying the LDAP search parameters AuthLDAPUrl url dh E URL specifying the LDAP search parameters AuthName auth-domain dh C Authorization realm for use in HTTP
authentication AuthType Basic|Digest dh C
diff --git a/docs/manual/programs/configure.html.en b/docs/manual/programs/configure.html.en
index a7938a4670a..17edfa20ae7 100644
--- a/docs/manual/programs/configure.html.en
+++ b/docs/manual/programs/configure.html.en
@@ -410,9 +410,9 @@
Type of user authentication mod_auth_digest. This module uses plain text files
to store the credentials.
- --enable-auth-ldap--enable-authnz-ldapmod_auth_ldap.mod_authnz_ldap.
--enable-cache
configure ½ºÅ©¸³Æ®´Â ƯÁ¤ Ç÷¡Æû¿¡¼ ¾ÆÆÄÄ¡
À¥¼¹ö¸¦ ÄÄÆÄÀÏÇÏ°í ¼³Ä¡ÇϱâÀ§ÇØ ¼Ò½º Æ®¸®¸¦ ±¸¼ºÇÑ´Ù. ¿©·¯
diff --git a/docs/manual/programs/configure.xml.ko b/docs/manual/programs/configure.xml.ko
index 80f4afe8339..70c7c4a215b 100644
--- a/docs/manual/programs/configure.xml.ko
+++ b/docs/manual/programs/configure.xml.ko
@@ -1,7 +1,7 @@
-
+