httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
Subject cvs commit: httpd-2.0/docs/manual/mod mod_auth_ldap.xml
Date Wed, 22 Jan 2003 07:09:12 GMT
minfrin     2003/01/21 23:09:12

  Modified:    docs/manual/mod mod_auth_ldap.xml
  Correct quote usage in mod_auth_ldap docs
  PR: 16261
  Revision  Changes    Path
  1.11      +14 -14    httpd-2.0/docs/manual/mod/mod_auth_ldap.xml
  Index: mod_auth_ldap.xml
  RCS file: /home/cvs/httpd-2.0/docs/manual/mod/mod_auth_ldap.xml,v
  retrieving revision 1.10
  retrieving revision 1.11
  diff -u -r1.10 -r1.11
  --- mod_auth_ldap.xml	19 Jan 2003 03:35:01 -0000	1.10
  +++ mod_auth_ldap.xml	22 Jan 2003 07:09:12 -0000	1.11
  @@ -246,17 +246,17 @@
       is part of the just-fetched LDAP entry.  Multiple users can be
       granted access by putting multiple usernames on the line,
       separated with spaces. If a username has a space in it, then it
  -    must be the only user on the line. In this case, multiple users
  -    can be granted access by using multiple <code>require user</code>
  +    must be surrounded with double quotes. Multiple users can also be
  +    granted access by using multiple <code>require user</code>
       directives, with one user per line. For example, with a <directive
       module="mod_auth_ldap">AuthLDAPURL</directive> of
       <code>ldap://ldap/o=Airius?cn</code> (i.e., <code>cn</code>
       used for searches), the following require directives could be used
       to restrict access:</p>
  -require user Barbara Jenson<br />
  -require user Fred User<br />
  -require user Joe Manager<br />
  +require user "Barbara Jenson"<br />
  +require user "Fred User"<br />
  +require user "Joe Manager"<br />
       <p>Because of the way that <module>mod_auth_ldap</module> handles
  @@ -287,7 +287,7 @@
       <p>The following directive would grant access to both Fred and
  -<example>require group cn=Administrators, o=Airius</example>
  +<example>require group "cn=Administrators, o=Airius"</example>
       <p>Behavior of this directive is modified by the <directive
       module="mod_auth_ldap">AuthLDAPGroupAttribute</directive> and
  @@ -307,7 +307,7 @@
       <p>The following directive would grant access to a specific
  -<example>require dn cn=Barbara Jenson, o=Airius</example>
  +<example>require dn "cn=Barbara Jenson, o=Airius"</example>
       <p>Behavior of this directive is modified by the <directive
  @@ -322,7 +322,7 @@
           Grant access to anyone who exists in the LDAP directory,
           using their UID for searches. 
  -AuthLDAPURL ldap://, o=Airius?uid?sub?(objectClass=*)<br
  +AuthLDAPURL "ldap://, o=Airius?uid?sub?(objectClass=*)"<br
   require valid-user
  @@ -331,7 +331,7 @@
           The next example is the same as above; but with the fields
           that have useful defaults omitted. Also, note the use of a
           redundant LDAP server. 
  -<example>AuthLDAPURL ldap://, o=Airius<br
  +<example>AuthLDAPURL "ldap://, o=Airius"<br
   require valid-user
  @@ -346,7 +346,7 @@
           choose an attribute that is guaranteed unique in your
           directory, such as <code>uid</code>. 
  -AuthLDAPURL ldap://, o=Airius?cn<br />
  +AuthLDAPURL "ldap://, o=Airius?cn"<br />
   require valid-user
  @@ -355,7 +355,7 @@
           Grant access to anybody in the Administrators group. The
           users must authenticate using their UID. 
  -AuthLDAPURL ldap://<br />
  +AuthLDAPURL "ldap://"<br />
   require group cn=Administrators, o=Airius
  @@ -367,7 +367,7 @@
           only to people (authenticated via their UID) who have
           alphanumeric pagers: 
  -AuthLDAPURL ldap://*)<br />
  +AuthLDAPURL "ldap://*)"<br />
   require valid-user
  @@ -383,7 +383,7 @@
           have a pager, but does need to access the same
  -AuthLDAPURL ldap://|(qpagePagerID=*)(uid=jmanager))<br
  +AuthLDAPURL "ldap://|(qpagePagerID=*)(uid=jmanager))"<br
   require valid-user
  @@ -454,7 +454,7 @@
       directives to <em>every</em> <code>.htaccess</code> file
       that gets created in the web</p>
  -AuthLDAPURL            the url
  +AuthLDAPURL            "the url"
   AuthLDAPAuthoritative  off
   AuthLDAPFrontPageHack  on

View raw message