]> granicus.if.org Git - apache/commitdiff
Adds a mod_authn_file example to the AuthProviderAlias docs, since more
authorRich Bowen <rbowen@apache.org>
Sun, 25 Jan 2009 22:13:40 +0000 (22:13 +0000)
committerRich Bowen <rbowen@apache.org>
Sun, 25 Jan 2009 22:13:40 +0000 (22:13 +0000)
people understand mod_authn_file than understand LDAP.

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@737588 13f79535-47bb-0310-9956-ffa450edef68

docs/manual/mod/mod_authn_core.html.en
docs/manual/mod/mod_authn_core.xml

index f98dbd3fbdf5bbe9f2ae79697ca1d8e9d56d6519..755b9dc96a649a018c6ff267239e6ddc7b47b67b 100644 (file)
     extended authentication provider to be reference by multiple 
     locations.</p>
 
-    <h3><a name="example" id="example">Example</a></h3>
+    <h3><a name="example" id="example">Examples</a></h3>
+
+        <p>This example checks for passwords in two different text
+        files.</p>
+
+        <div class="example"><h3>Checking multiple text password files</h3><p><code>
+
+        # Check here first<br />
+        &lt;AuthnProviderAlias file file1&gt;<br />
+        <span class="indent">
+            AuthUserFile /www/conf/passwords1<br />
+        </span>
+        &lt;/AuthnProviderAlias&gt;<br />
+        <br />
+        # Then check here<br />
+        &lt;AuthnProviderAlias file file2&gt;   <br />
+        <span class="indent">
+            AuthUserFile /www/conf/passwords2<br />
+        </span>
+        &lt;/AuthnProviderAlias&gt;<br />
+        <br />
+        &lt;Directory /var/web/pages/secure&gt;<br />
+        <span class="indent">
+            AuthBasicProvider file1 file2<br />
+            <br />
+            AuthType Basic<br />
+            AuthName "Protected Area"<br />
+            Require valid-user<br />
+        </span>
+        &lt;/Directory&gt;<br />
+        </code></p></div>
+
         <p>The example below creates two different ldap authentication 
         provider aliases based on the ldap provider.  This allows
         a single authenticated location to be serviced by multiple ldap
         hosts:</p>
     
-        <div class="example"><h3>Example</h3><p><code>
+        <div class="example"><h3>Checking multiple LDAP servers</h3><p><code>
           &lt;AuthnProviderAlias ldap ldap-alias1&gt;<br />
           <span class="indent">
              AuthLDAPBindDN cn=youruser,o=ctx<br />
index 88d9c5da5e7f70eea41bea10c27d0e2b017b1693..fd3284cdc6b5f4a474d32421a398be213c01197f 100644 (file)
     extended authentication provider to be reference by multiple 
     locations.</p>
 
-    <section id="example"><title>Example</title>
+    <section id="example"><title>Examples</title>
+
+        <p>This example checks for passwords in two different text
+        files.</p>
+
+        <example><title>Checking multiple text password files</title>
+
+        # Check here first<br />
+        &lt;AuthnProviderAlias file file1&gt;<br />
+        <indent>
+            AuthUserFile /www/conf/passwords1<br />
+        </indent>
+        &lt;/AuthnProviderAlias&gt;<br />
+        <br />
+        # Then check here<br />
+        &lt;AuthnProviderAlias file file2&gt;   <br />
+        <indent>
+            AuthUserFile /www/conf/passwords2<br />
+        </indent>
+        &lt;/AuthnProviderAlias&gt;<br />
+        <br />
+        &lt;Directory /var/web/pages/secure&gt;<br />
+        <indent>
+            AuthBasicProvider file1 file2<br />
+            <br />
+            AuthType Basic<br />
+            AuthName "Protected Area"<br />
+            Require valid-user<br />
+        </indent>
+        &lt;/Directory&gt;<br />
+        </example>
+
         <p>The example below creates two different ldap authentication 
         provider aliases based on the ldap provider.  This allows
         a single authenticated location to be serviced by multiple ldap
         hosts:</p>
     
-        <example><title>Example</title>
+        <example><title>Checking multiple LDAP servers</title>
           &lt;AuthnProviderAlias ldap ldap-alias1&gt;<br />
           <indent>
              AuthLDAPBindDN cn=youruser,o=ctx<br />