You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by el...@apache.org on 2013/04/13 09:00:18 UTC
svn commit: r1467568 - in /directory/site/trunk/content/apacheds/advanced-ug:
4.1.2.2-sasl-cram-md5-authn.mdtext 4.1.2.3-sasl-digest-md5-authn.mdtext
4.3-password-policy.mdtext
Author: elecharny
Date: Sat Apr 13 07:00:17 2013
New Revision: 1467568
URL: http://svn.apache.org/r1467568
Log:
Fixed a wrong warining DIV
Modified:
directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext
directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext
directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext
Modified: directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext Sat Apr 13 07:00:17 2013
@@ -28,7 +28,7 @@ The **CRAM-MD5** **SASL** mechanism is d
We will have an exchange between the client, which will send an empty _Bind request_ (ie, the username and credentials won't be sent the first time), and the server will return a challenge.
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
It's not recommanded to use this mechanism.
</DIV>
@@ -78,6 +78,6 @@ When the server receives a **SASL PLAIN*
ApacheDS expect the given name to be stored in the **UID** Attribute. This is not configurable in this version of the server.
</DIV>
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
The password must be stored in clear text on the server. This is a serious weakness...
</DIV>
Modified: directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext Sat Apr 13 07:00:17 2013
@@ -26,7 +26,7 @@ Notice: Licensed to the Apache Software
The **DIGEST-MD5** **SASL** mechanism is defined by [RFC 2829](http://www.ietf.org/rfc/rfc2829.txt), which has been moved to an _historic_ status by [RFC 6331](http://www.ietf.org/rfc/rfc6631.txt), due to its intrinsec weaknesses.
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
It's not recommanded to use this mechanism.
</DIV>
@@ -109,6 +109,6 @@ You also have to configure the **SaslRea
ApacheDS expect the given name to be stored in the **UID** Attribute. This is not configurable in this version of the server.
</DIV>
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
The password must be stored in clear text on the server. This is a serious weakness...
</DIV>
Modified: directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext Sat Apr 13 07:00:17 2013
@@ -141,7 +141,7 @@ Impacted Attributes : ads-pwdLockout, ad
Each failed attempt will be logged in the entry, in the _ads-pwdFailureTime_ Attribute (it will contain the date of the attempt). When the Attribute contains more values than the maximum number of failed attempts, the entry will be locked (the _ads-pwdAccountLockedTime_ Attribute will contain the date the entry has been locked).
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
In order to activate this control the ads-pwdLockout parameter must be set to TRUE.
</DIV>