From: Vincent Deffontaines Date: Thu, 26 Dec 2013 11:36:40 +0000 (+0000) Subject: [trunk][doc] mod/mod_authz_core : Re-ordering sections so the essential is stated... X-Git-Tag: 2.5.0-alpha~4748 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=3198873edef269395e802435ef4e6b46848b76e1;p=apache [trunk][doc] mod/mod_authz_core : Re-ordering sections so the essential is stated first git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1553469 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_authz_core.html.en b/docs/manual/mod/mod_authz_core.html.en index 10f91dd89b..58bb7770a9 100644 --- a/docs/manual/mod/mod_authz_core.html.en +++ b/docs/manual/mod/mod_authz_core.html.en @@ -24,7 +24,8 @@

Apache Module mod_authz_core

-

Available Languages:  en 

+

Available Languages:  en  | + fr 

@@ -55,61 +56,12 @@

Topics

top
-

Creating Authorization Provider Aliases

- -

Extended authorization providers can be created within the configuration - file and assigned an alias name. The alias providers can then be referenced - through the Require directive - in the same way as a base authorization provider. Besides the ability to - create and alias an extended provider, it also allows the same extended - authorization provider to be reference by multiple locations. -

- -

Example

-

The example below creates two different ldap authorization provider - aliases based on the ldap-group authorization provider. This example - allows a single authorization location to check group membership within - multiple ldap hosts: -

- -
-<AuthzProviderAlias ldap-group ldap-group-alias1 cn=my-group,o=ctx>
-    AuthLDAPBindDN cn=youruser,o=ctx
-    AuthLDAPBindPassword yourpassword
-    AuthLDAPURL ldap://ldap.host/o=ctx
-</AuthzProviderAlias>
-
-<AuthzProviderAlias ldap-group ldap-group-alias2 cn=my-other-group,o=dev>
-    AuthLDAPBindDN cn=yourotheruser,o=dev
-    AuthLDAPBindPassword yourotherpassword
-    AuthLDAPURL ldap://other.ldap.host/o=dev?cn
-</AuthzProviderAlias>
-
-Alias /secure /webpages/secure
-<Directory /webpages/secure>
-    Require all granted
-    
-    AuthBasicProvider file
-    
-    AuthType Basic
-    AuthName LDAP_Protected_Place
-    
-    #implied OR operation
-    Require ldap-group-alias1
-    Require ldap-group-alias2
-</Directory>
-        
- - - -
top
-

Authorization Containers

The authorization container directives @@ -259,6 +211,55 @@ SetEnvIf User-Agent ^KnockKnock/2\.0 let_me_in +

top
+
+

Creating Authorization Provider Aliases

+ +

Extended authorization providers can be created within the configuration + file and assigned an alias name. The alias providers can then be referenced + through the Require directive + in the same way as a base authorization provider. Besides the ability to + create and alias an extended provider, it also allows the same extended + authorization provider to be reference by multiple locations. +

+ +

Example

+

The example below creates two different ldap authorization provider + aliases based on the ldap-group authorization provider. This example + allows a single authorization location to check group membership within + multiple ldap hosts: +

+ +
+<AuthzProviderAlias ldap-group ldap-group-alias1 cn=my-group,o=ctx>
+    AuthLDAPBindDN cn=youruser,o=ctx
+    AuthLDAPBindPassword yourpassword
+    AuthLDAPURL ldap://ldap.host/o=ctx
+</AuthzProviderAlias>
+
+<AuthzProviderAlias ldap-group ldap-group-alias2 cn=my-other-group,o=dev>
+    AuthLDAPBindDN cn=yourotheruser,o=dev
+    AuthLDAPBindPassword yourotherpassword
+    AuthLDAPURL ldap://other.ldap.host/o=dev?cn
+</AuthzProviderAlias>
+
+Alias /secure /webpages/secure
+<Directory /webpages/secure>
+    Require all granted
+
+    AuthBasicProvider file
+
+    AuthType Basic
+    AuthName LDAP_Protected_Place
+
+    #implied OR operation
+    Require ldap-group-alias1
+    Require ldap-group-alias2
+</Directory>
+        
+ + +
top

AuthMerging Directive

@@ -503,12 +504,12 @@ Require group admin

Security Warning

Exercise caution when setting authorization directives in Location sections - that overlap with content served out of the filesystem. + that overlap with content served out of the filesystem. By default, these configuration sections overwrite authorization configuration - in Directory, + in Directory, and Files sections.

-

The AuthMerging directive - can be used to control how authorization configuration sections are +

The AuthMerging directive + can be used to control how authorization configuration sections are merged.

@@ -636,7 +637,8 @@ must succeed for the enclosing directive to not fail.
-

Available Languages:  en 

+

Available Languages:  en  | + fr 

top

Comments

Notice:
This is not a Q&A section. Comments placed here should be pointed towards suggestions on improving the documentation or server, and may be removed again by our moderators if they are either implemented or considered invalid/off-topic. Questions on how to manage the Apache HTTP Server should be directed at either our IRC channel, #httpd, on Freenode, or sent to our mailing lists.
Description:Core Authorization
Status:Base