You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by rb...@apache.org on 2009/01/25 23:13:40 UTC
svn commit: r737588 - in /httpd/httpd/trunk/docs/manual/mod:
mod_authn_core.html.en mod_authn_core.xml
Author: rbowen
Date: Sun Jan 25 22:13:40 2009
New Revision: 737588
URL: http://svn.apache.org/viewvc?rev=737588&view=rev
Log:
Adds a mod_authn_file example to the AuthProviderAlias docs, since more
people understand mod_authn_file than understand LDAP.
Modified:
httpd/httpd/trunk/docs/manual/mod/mod_authn_core.html.en
httpd/httpd/trunk/docs/manual/mod/mod_authn_core.xml
Modified: httpd/httpd/trunk/docs/manual/mod/mod_authn_core.html.en
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_authn_core.html.en?rev=737588&r1=737587&r2=737588&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_authn_core.html.en (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_authn_core.html.en Sun Jan 25 22:13:40 2009
@@ -59,13 +59,44 @@
extended authentication provider to be reference by multiple
locations.</p>
- <h3><a name="example" id="example">Example</a></h3>
+ <h3><a name="example" id="example">Examples</a></h3>
+
+ <p>This example checks for passwords in two different text
+ files.</p>
+
+ <div class="example"><h3>Checking multiple text password files</h3><p><code>
+
+ # Check here first<br />
+ <AuthnProviderAlias file file1><br />
+ <span class="indent">
+ AuthUserFile /www/conf/passwords1<br />
+ </span>
+ </AuthnProviderAlias><br />
+ <br />
+ # Then check here<br />
+ <AuthnProviderAlias file file2> <br />
+ <span class="indent">
+ AuthUserFile /www/conf/passwords2<br />
+ </span>
+ </AuthnProviderAlias><br />
+ <br />
+ <Directory /var/web/pages/secure><br />
+ <span class="indent">
+ AuthBasicProvider file1 file2<br />
+ <br />
+ AuthType Basic<br />
+ AuthName "Protected Area"<br />
+ Require valid-user<br />
+ </span>
+ </Directory><br />
+ </code></p></div>
+
<p>The example below creates two different ldap authentication
provider aliases based on the ldap provider. This allows
a single authenticated location to be serviced by multiple ldap
hosts:</p>
- <div class="example"><h3>Example</h3><p><code>
+ <div class="example"><h3>Checking multiple LDAP servers</h3><p><code>
<AuthnProviderAlias ldap ldap-alias1><br />
<span class="indent">
AuthLDAPBindDN cn=youruser,o=ctx<br />
Modified: httpd/httpd/trunk/docs/manual/mod/mod_authn_core.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_authn_core.xml?rev=737588&r1=737587&r2=737588&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_authn_core.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_authn_core.xml Sun Jan 25 22:13:40 2009
@@ -48,13 +48,44 @@
extended authentication provider to be reference by multiple
locations.</p>
- <section id="example"><title>Example</title>
+ <section id="example"><title>Examples</title>
+
+ <p>This example checks for passwords in two different text
+ files.</p>
+
+ <example><title>Checking multiple text password files</title>
+
+ # Check here first<br />
+ <AuthnProviderAlias file file1><br />
+ <indent>
+ AuthUserFile /www/conf/passwords1<br />
+ </indent>
+ </AuthnProviderAlias><br />
+ <br />
+ # Then check here<br />
+ <AuthnProviderAlias file file2> <br />
+ <indent>
+ AuthUserFile /www/conf/passwords2<br />
+ </indent>
+ </AuthnProviderAlias><br />
+ <br />
+ <Directory /var/web/pages/secure><br />
+ <indent>
+ AuthBasicProvider file1 file2<br />
+ <br />
+ AuthType Basic<br />
+ AuthName "Protected Area"<br />
+ Require valid-user<br />
+ </indent>
+ </Directory><br />
+ </example>
+
<p>The example below creates two different ldap authentication
provider aliases based on the ldap provider. This allows
a single authenticated location to be serviced by multiple ldap
hosts:</p>
- <example><title>Example</title>
+ <example><title>Checking multiple LDAP servers</title>
<AuthnProviderAlias ldap ldap-alias1><br />
<indent>
AuthLDAPBindDN cn=youruser,o=ctx<br />