You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by el...@apache.org on 2013/04/13 09:00:18 UTC

svn commit: r1467568 - in /directory/site/trunk/content/apacheds/advanced-ug: 4.1.2.2-sasl-cram-md5-authn.mdtext 4.1.2.3-sasl-digest-md5-authn.mdtext 4.3-password-policy.mdtext

Author: elecharny
Date: Sat Apr 13 07:00:17 2013
New Revision: 1467568

URL: http://svn.apache.org/r1467568
Log:
Fixed a wrong warining DIV

Modified:
    directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext
    directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext
    directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext

Modified: directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.1.2.2-sasl-cram-md5-authn.mdtext Sat Apr 13 07:00:17 2013
@@ -28,7 +28,7 @@ The **CRAM-MD5** **SASL** mechanism is d
 
 We will have an exchange between the client, which will send an empty _Bind request_ (ie, the username and credentials won't be sent the first time), and the server will return a challenge.
 
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
 It's not recommanded to use this mechanism.
 </DIV>
 
@@ -78,6 +78,6 @@ When the server receives a **SASL PLAIN*
 ApacheDS expect the given name to be stored in the **UID** Attribute. This is not configurable in this version of the server.
 </DIV>
 
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
 The password must be stored in clear text on the server. This is a serious weakness...
 </DIV>

Modified: directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.1.2.3-sasl-digest-md5-authn.mdtext Sat Apr 13 07:00:17 2013
@@ -26,7 +26,7 @@ Notice: Licensed to the Apache Software 
 
 The **DIGEST-MD5** **SASL** mechanism is defined by [RFC 2829](http://www.ietf.org/rfc/rfc2829.txt), which has been moved to an _historic_ status by [RFC 6331](http://www.ietf.org/rfc/rfc6631.txt), due to its intrinsec weaknesses.
 
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
 It's not recommanded to use this mechanism.
 </DIV>
 
@@ -109,6 +109,6 @@ You also have to configure the **SaslRea
 ApacheDS expect the given name to be stored in the **UID** Attribute. This is not configurable in this version of the server.
 </DIV>
 
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
 The password must be stored in clear text on the server. This is a serious weakness...
 </DIV>

Modified: directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext?rev=1467568&r1=1467567&r2=1467568&view=diff
==============================================================================
--- directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext (original)
+++ directory/site/trunk/content/apacheds/advanced-ug/4.3-password-policy.mdtext Sat Apr 13 07:00:17 2013
@@ -141,7 +141,7 @@ Impacted Attributes : ads-pwdLockout, ad
 
 Each failed attempt will be logged in the entry, in the _ads-pwdFailureTime_ Attribute (it will contain the date of the attempt). When the Attribute contains more values than the maximum number of failed attempts, the entry will be locked (the _ads-pwdAccountLockedTime_ Attribute will contain the date the entry has been locked).
 
-<DIV class="warn" markdown="1">
+<DIV class="warning" markdown="1">
 In order to activate this control the ads-pwdLockout parameter must be set to TRUE.
 </DIV>