From: Graham Leggett
Date: Wed, 22 Jan 2003 07:09:12 +0000 (+0000)
Subject: Correct quote usage in mod_auth_ldap docs
X-Git-Tag: pre_ajp_proxy~2224
X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=426077face050da061b010710035c1e18130dc7e;p=apache
Correct quote usage in mod_auth_ldap docs
PR: 16261
Obtained from:
Submitted by:
Reviewed by:
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@98447 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_auth_ldap.xml b/docs/manual/mod/mod_auth_ldap.xml
index ab21d9ee8c..9cf3a64bc2 100644
--- a/docs/manual/mod/mod_auth_ldap.xml
+++ b/docs/manual/mod/mod_auth_ldap.xml
@@ -246,17 +246,17 @@ for HTTP Basic authentication.
is part of the just-fetched LDAP entry. Multiple users can be
granted access by putting multiple usernames on the line,
separated with spaces. If a username has a space in it, then it
- must be the only user on the line. In this case, multiple users
- can be granted access by using multiple require user
+ must be surrounded with double quotes. Multiple users can also be
+ granted access by using multiple require user
directives, with one user per line. For example, with a AuthLDAPURL of
ldap://ldap/o=Airius?cn
(i.e., cn
is
used for searches), the following require directives could be used
to restrict access:
-require user Barbara Jenson
-require user Fred User
-require user Joe Manager
+require user "Barbara Jenson"
+require user "Fred User"
+require user "Joe Manager"
Because of the way that mod_auth_ldap handles this
@@ -287,7 +287,7 @@ uniqueMember: cn=Fred User, o=Airius
The following directive would grant access to both Fred and
Barbara:
-require group cn=Administrators, o=Airius
+require group "cn=Administrators, o=Airius"
Behavior of this directive is modified by the AuthLDAPGroupAttribute and
@@ -307,7 +307,7 @@ uniqueMember: cn=Fred User, o=Airius
The following directive would grant access to a specific
DN:
-require dn cn=Barbara Jenson, o=Airius
+require dn "cn=Barbara Jenson, o=Airius"
Behavior of this directive is modified by the AuthLDAPCompareDNOnServer
@@ -322,7 +322,7 @@ uniqueMember: cn=Fred User, o=Airius
Grant access to anyone who exists in the LDAP directory,
using their UID for searches.
-AuthLDAPURL ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)
+AuthLDAPURL "ldap://ldap1.airius.com:389/ou=People, o=Airius?uid?sub?(objectClass=*)"
require valid-user
@@ -331,7 +331,7 @@ require valid-user
The next example is the same as above; but with the fields
that have useful defaults omitted. Also, note the use of a
redundant LDAP server.
-AuthLDAPURL ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius
+AuthLDAPURL "ldap://ldap1.airius.com ldap2.airius.com/ou=People, o=Airius"
require valid-user
@@ -346,7 +346,7 @@ require valid-user
choose an attribute that is guaranteed unique in your
directory, such as uid
.
-AuthLDAPURL ldap://ldap.airius.com/ou=People, o=Airius?cn
+AuthLDAPURL "ldap://ldap.airius.com/ou=People, o=Airius?cn"
require valid-user
@@ -355,7 +355,7 @@ require valid-user
Grant access to anybody in the Administrators group. The
users must authenticate using their UID.
-AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid"
require group cn=Administrators, o=Airius
@@ -367,7 +367,7 @@ require group cn=Administrators, o=Airius
only to people (authenticated via their UID) who have
alphanumeric pagers:
-AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(qpagePagerID=*)"
require valid-user
@@ -383,7 +383,7 @@ require valid-user
have a pager, but does need to access the same
resource:
-AuthLDAPURL ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))
+AuthLDAPURL "ldap://ldap.airius.com/o=Airius?uid??(|(qpagePagerID=*)(uid=jmanager))"
require valid-user
@@ -454,7 +454,7 @@ require valid-user
directives to every .htaccess
file
that gets created in the web
-AuthLDAPURL the url
+AuthLDAPURL "the url"
AuthLDAPAuthoritative off
AuthLDAPFrontPageHack on