From: Christophe Jaillet Date: Fri, 15 Feb 2019 20:50:17 +0000 (+0000) Subject: - Be consistent with the case used for uniqueMember. X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=8da4f0933ad2bdae56259f48a8146e5488b298b0;p=apache - Be consistent with the case used for uniqueMember. - Be consistent with the case used for AuthLDAPURL. Use uppercase URL, as in the code in order to fix syntax highlight issues. - Fix the case of AuthLDAPSubGroupAttribute in , so that quickreference.xsl works as expected Fix some other small layout issues. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1853664 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_authnz_ldap.xml b/docs/manual/mod/mod_authnz_ldap.xml index 26a8623c9e..a25221b564 100644 --- a/docs/manual/mod/mod_authnz_ldap.xml +++ b/docs/manual/mod/mod_authnz_ldap.xml @@ -692,11 +692,11 @@ Require valid-user
Exposing Login Information

when this module performs authentication, ldap attributes specified - in the authldapurl + in the AuthLDAPURL directive are placed in environment variables with the prefix "AUTHENTICATE_".

when this module performs authorization, ldap attributes specified - in the authldapurl + in the AuthLDAPURL directive are placed in environment variables with the prefix "AUTHORIZE_".

If the attribute field contains the username, common name @@ -1110,7 +1110,7 @@ AuthLDAPBindPassword "exec:/path/to/otherProgram argument1" LDAP attributes used to identify the user members of groups. AuthLDAPGroupAttribute attribute -AuthLDAPGroupAttribute member uniquemember +AuthLDAPGroupAttribute member uniqueMember directory.htaccess AuthConfig @@ -1120,7 +1120,7 @@ groups. check for user members within groups. Multiple attributes can be used by specifying this directive multiple times. If not specified, then mod_authnz_ldap uses the member and - uniquemember attributes.

+ uniqueMember attributes.

@@ -1194,7 +1194,8 @@ query to set the REMOTE_USER environment variable

If this directive is set, the value of the REMOTE_USER environment variable will be set to the value of the attribute specified. Make sure that this attribute is - included in the list of attributes in the AuthLDAPUrl definition, + included in the list of attributes in the AuthLDAPURL definition, otherwise this directive will have no effect. This directive, if present, takes precedence over AuthLDAPRemoteUserIsDN. This @@ -1265,7 +1266,7 @@ environment variable directive line, used to distinguish the members of the current group that are groups. AuthLDAPSubGroupAttribute attribute -AuthLDAPSubgroupAttribute member uniquemember +AuthLDAPSubGroupAttribute member uniqueMember directory.htaccess AuthConfig @@ -1312,9 +1313,9 @@ objects that are groups during sub-group processing. -AuthLDAPUrl +AuthLDAPURL URL specifying the LDAP search parameters -AuthLDAPUrl url [NONE|SSL|TLS|STARTTLS] +AuthLDAPURL url [NONE|SSL|TLS|STARTTLS] directory.htaccess AuthConfig @@ -1325,7 +1326,7 @@ objects that are groups during sub-group processing. ldap://host:port/basedn?attribute?scope?filter

If you want to specify more than one LDAP URL that Apache should try in turn, the syntax is:

-AuthLDAPUrl "ldap://ldap1.example.com ldap2.example.com/dc=..." +AuthLDAPURL "ldap://ldap1.example.com ldap2.example.com/dc=..."

Caveat: If you specify multiple servers, you need to enclose the entire URL string in quotes; otherwise you will get an error: "AuthLDAPURL takes one argument, URL to define LDAP connection.." @@ -1431,7 +1432,7 @@ You can of course use search parameters on each of these.

See above for examples of AuthLDAPUrl URLs.

+ module="mod_authnz_ldap">AuthLDAPURL URLs.