You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by bu...@apache.org on 2013/04/13 09:00:22 UTC

svn commit: r858307 - in /websites/staging/directory/trunk/content: ./ apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.html apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.html apacheds/advanced-ug/4.3-password-policy.html

Author: buildbot
Date: Sat Apr 13 07:00:22 2013
New Revision: 858307

Log:
Staging update by buildbot for directory

Modified:
    websites/staging/directory/trunk/content/   (props changed)
    websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.html
    websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.html
    websites/staging/directory/trunk/content/apacheds/advanced-ug/4.3-password-policy.html

Propchange: websites/staging/directory/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Sat Apr 13 07:00:22 2013
@@ -1 +1 @@
-1467564
+1467568

Modified: websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.html
==============================================================================
--- websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.html (original)
+++ websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.html Sat Apr 13 07:00:22 2013
@@ -140,7 +140,7 @@
 <h1 id="4122-sasl-cram-md5-authentication">4.1.2.2 - SASL CRAM-MD5 Authentication</h1>
 <p>The <strong>CRAM-MD5</strong> <strong>SASL</strong> mechanism is defined by <a href="http://www.ietf.org/rfc/rfc2195.txt">RFC 2195</a>.</p>
 <p>We will have an exchange between the client, which will send an empty <em>Bind request</em> (ie, the username and credentials won't be sent the first time), and the server will return a challenge.</p>
-<p><DIV class="warn" markdown="1">
+<p><DIV class="warning" markdown="1">
 It's not recommanded to use this mechanism.
 </DIV></p>
 <h2 id="usage">Usage</h2>
@@ -185,7 +185,7 @@ Message ID : 2
 <p><DIV class="note" markdown="1">
 ApacheDS expect the given name to be stored in the <strong>UID</strong> Attribute. This is not configurable in this version of the server.
 </DIV></p>
-<p><DIV class="warn" markdown="1">
+<p><DIV class="warning" markdown="1">
 The password must be stored in clear text on the server. This is a serious weakness...
 </DIV></p>
 

Modified: websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.html
==============================================================================
--- websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.html (original)
+++ websites/staging/directory/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.html Sat Apr 13 07:00:22 2013
@@ -139,7 +139,7 @@
 
 <h1 id="4123-sasl-digest-md5-authentication">4.1.2.3 - SASL DIGEST-MD5 Authentication</h1>
 <p>The <strong>DIGEST-MD5</strong> <strong>SASL</strong> mechanism is defined by <a href="http://www.ietf.org/rfc/rfc2829.txt">RFC 2829</a>, which has been moved to an <em>historic</em> status by <a href="http://www.ietf.org/rfc/rfc6631.txt">RFC 6331</a>, due to its intrinsec weaknesses.</p>
-<p><DIV class="warn" markdown="1">
+<p><DIV class="warning" markdown="1">
 It's not recommanded to use this mechanism.
 </DIV></p>
 <h2 id="usage">Usage</h2>
@@ -213,7 +213,7 @@ qop = auth
 <p><DIV class="note" markdown="1">
 ApacheDS expect the given name to be stored in the <strong>UID</strong> Attribute. This is not configurable in this version of the server.
 </DIV></p>
-<p><DIV class="warn" markdown="1">
+<p><DIV class="warning" markdown="1">
 The password must be stored in clear text on the server. This is a serious weakness...
 </DIV></p>
 

Modified: websites/staging/directory/trunk/content/apacheds/advanced-ug/4.3-password-policy.html
==============================================================================
--- websites/staging/directory/trunk/content/apacheds/advanced-ug/4.3-password-policy.html (original)
+++ websites/staging/directory/trunk/content/apacheds/advanced-ug/4.3-password-policy.html Sat Apr 13 07:00:22 2013
@@ -320,7 +320,7 @@ ads-pwdSafeModify: FALSE
 Impacted Attributes : ads-pwdLockout, ads-pwdMaxFailure, ads-pwdLockoutDuration
 </DIV></p>
 <p>Each failed attempt will be logged in the entry, in the <em>ads-pwdFailureTime</em> Attribute (it will contain the date of the attempt). When the Attribute contains more values than the maximum number of failed attempts, the entry will be locked (the <em>ads-pwdAccountLockedTime</em> Attribute will contain the date the entry has been locked).</p>
-<p><DIV class="warn" markdown="1">
+<p><DIV class="warning" markdown="1">
 In order to activate this control the ads-pwdLockout parameter must be set to TRUE.
 </DIV></p>
 <p>The following table expose the various possible cases, with three failed attempts : </p>