From: Graham Leggett Date: Wed, 22 Jan 2003 07:09:12 +0000 (+0000) Subject: Correct quote usage in mod_auth_ldap docs X-Git-Tag: pre_ajp_proxy~2224 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=426077face050da061b010710035c1e18130dc7e;p=apache Correct quote usage in mod_auth_ldap docs PR: 16261 Obtained from: Submitted by: Reviewed by: git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@98447 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_auth_ldap.xml b/docs/manual/mod/mod_auth_ldap.xml index ab21d9ee8c..9cf3a64bc2 100644 --- a/docs/manual/mod/mod_auth_ldap.xml +++ b/docs/manual/mod/mod_auth_ldap.xml @@ -246,17 +246,17 @@ for HTTP Basic authentication. is part of the just-fetched LDAP entry. Multiple users can be granted access by putting multiple usernames on the line, separated with spaces. If a username has a space in it, then it - must be the only user on the line. In this case, multiple users - can be granted access by using multiple require user + must be surrounded with double quotes. Multiple users can also be + granted access by using multiple require user directives, with one user per line. For example, with a AuthLDAPURL of ldap://ldap/o=Airius?cn (i.e., cn is used for searches), the following require directives could be used to restrict access:

-require user Barbara Jenson
-require user Fred User
-require user Joe Manager
+require user "Barbara Jenson"
+require user "Fred User"
+require user "Joe Manager"

Because of the way that mod_auth_ldap handles this @@ -287,7 +287,7 @@ uniqueMember: cn=Fred User, o=Airius

The following directive would grant access to both Fred and Barbara:

-require group cn=Administrators, o=Airius +require group "cn=Administrators, o=Airius"

Behavior of this directive is modified by the AuthLDAPGroupAttribute and @@ -307,7 +307,7 @@ uniqueMember: cn=Fred User, o=Airius

The following directive would grant access to a specific DN:

-require dn cn=Barbara Jenson, o=Airius +require dn "cn=Barbara Jenson, o=Airius"

Behavior of this directive is modified by the AuthLDAPCompareDNOnServer @@ -322,7 +322,7 @@ uniqueMember: cn=Fred User, o=Airius
Grant access to anyone who exists in the LDAP directory, using their UID for searches. -AuthLDAPURL ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)
+AuthLDAPURL "ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)"
require valid-user
@@ -331,7 +331,7 @@ require valid-user The next example is the same as above; but with the fields that have useful defaults omitted. Also, note the use of a redundant LDAP server. -AuthLDAPURL ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius
+AuthLDAPURL "ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius"
require valid-user
@@ -346,7 +346,7 @@ require valid-user choose an attribute that is guaranteed unique in your directory, such as uid. -AuthLDAPURL ldap://ldap.airius.com/ou=People, o=Airius?cn
+AuthLDAPURL "ldap://ldap.airius.com/ou=People, o=Airius?cn"
require valid-user
@@ -355,7 +355,7 @@ require valid-user Grant access to anybody in the Administrators group. The users must authenticate using their UID. -AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid"
require group cn=Administrators, o=Airius
@@ -367,7 +367,7 @@ require group cn=Administrators, o=Airius only to people (authenticated via their UID) who have alphanumeric pagers: -AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)"
require valid-user
@@ -383,7 +383,7 @@ require valid-user have a pager, but does need to access the same resource:

-AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))"
require valid-user
@@ -454,7 +454,7 @@ require valid-user directives to every .htaccess file that gets created in the web

-AuthLDAPURL            the url
+AuthLDAPURL            "the url"
 AuthLDAPAuthoritative  off
 AuthLDAPFrontPageHack  on