You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ja...@apache.org on 2019/02/15 20:50:17 UTC

svn commit: r1853664 - /httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml

Author: jailletc36
Date: Fri Feb 15 20:50:17 2019
New Revision: 1853664

URL: http://svn.apache.org/viewvc?rev=1853664&view=rev
Log:
- Be consistent with the case used for uniqueMember.
- Be consistent with the case used for AuthLDAPURL. Use uppercase URL, as in the code in order to fix syntax highlight issues.
- Fix the case of AuthLDAPSubGroupAttribute in <default>, so that quickreference.xsl works as expected

Fix some other small layout issues.

Modified:
    httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml

Modified: httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml?rev=1853664&r1=1853663&r2=1853664&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_authnz_ldap.xml Fri Feb 15 20:50:17 2019
@@ -692,11 +692,11 @@ Require valid-user
 <section id="exposed"><title>Exposing Login Information</title>
 
     <p>when this module performs <em>authentication</em>, ldap attributes specified
-    in the <directive module="mod_authnz_ldap">authldapurl</directive>
+    in the <directive module="mod_authnz_ldap">AuthLDAPURL</directive>
     directive are placed in environment variables with the prefix "AUTHENTICATE_".</p>
 
     <p>when this module performs <em>authorization</em>, ldap attributes specified
-    in the <directive module="mod_authnz_ldap">authldapurl</directive>
+    in the <directive module="mod_authnz_ldap">AuthLDAPURL</directive>
     directive are placed in environment variables with the prefix "AUTHORIZE_".</p>
 
     <p>If the attribute field contains the username, common name
@@ -1110,7 +1110,7 @@ AuthLDAPBindPassword "exec:/path/to/othe
 <description>LDAP attributes used to identify the user members of
 groups.</description>
 <syntax>AuthLDAPGroupAttribute <em>attribute</em></syntax>
-<default>AuthLDAPGroupAttribute member uniquemember</default>
+<default>AuthLDAPGroupAttribute member uniqueMember</default>
 <contextlist><context>directory</context><context>.htaccess</context>
 </contextlist>
 <override>AuthConfig</override>
@@ -1120,7 +1120,7 @@ groups.</description>
     check for user members within groups. Multiple attributes can be used
     by specifying this directive multiple times. If not specified,
     then <module>mod_authnz_ldap</module> uses the <code>member</code> and
-    <code>uniquemember</code> attributes.</p>
+    <code>uniqueMember</code> attributes.</p>
 </usage>
 </directivesynopsis>
 
@@ -1194,7 +1194,8 @@ query to set the REMOTE_USER environment
     <p>If this directive is set, the value of the
     <code>REMOTE_USER</code> environment variable will be set to the
     value of the attribute specified. Make sure that this attribute is
-    included in the list of attributes in the AuthLDAPUrl definition,
+    included in the list of attributes in the <directive module="mod_authnz_ldap"
+    >AuthLDAPURL</directive> definition,
     otherwise this directive will have no effect. This directive, if
     present, takes precedence over <directive module="mod_authnz_ldap"
     >AuthLDAPRemoteUserIsDN</directive>. This
@@ -1265,7 +1266,7 @@ environment variable</description>
 directive line, used to distinguish the members of the current group that
 are groups.</description>
 <syntax>AuthLDAPSubGroupAttribute <em>attribute</em></syntax>
-<default>AuthLDAPSubgroupAttribute member uniquemember</default>
+<default>AuthLDAPSubGroupAttribute member uniqueMember</default>
 <contextlist><context>directory</context><context>.htaccess</context>
 </contextlist>
 <override>AuthConfig</override>
@@ -1312,9 +1313,9 @@ objects that are groups during sub-group
 </directivesynopsis>
 
 <directivesynopsis>
-<name>AuthLDAPUrl</name>
+<name>AuthLDAPURL</name>
 <description>URL specifying the LDAP search parameters</description>
-<syntax>AuthLDAPUrl <em>url [NONE|SSL|TLS|STARTTLS]</em></syntax>
+<syntax>AuthLDAPURL <em>url</em> [NONE|SSL|TLS|STARTTLS]</syntax>
 <contextlist><context>directory</context><context>.htaccess</context>
 </contextlist>
 <override>AuthConfig</override>
@@ -1325,7 +1326,7 @@ objects that are groups during sub-group
 <example>ldap://host:port/basedn?attribute?scope?filter</example>
     <p>If you want to specify more than one LDAP URL that Apache should try in turn, the syntax is:</p>
 <highlight language="config">
-AuthLDAPUrl "ldap://ldap1.example.com ldap2.example.com/dc=..."
+AuthLDAPURL "ldap://ldap1.example.com ldap2.example.com/dc=..."
 </highlight>
 <p><em><strong>Caveat: </strong>If you specify multiple servers, you need to enclose the entire URL string in quotes;
 otherwise you will get an error: "AuthLDAPURL takes one argument, URL to define LDAP connection.." </em>
@@ -1431,7 +1432,7 @@ You can of course use search parameters
 </dl>
 
     <p>See above for examples of <directive
-    module="mod_authnz_ldap">AuthLDAPUrl</directive> URLs.</p>
+    module="mod_authnz_ldap">AuthLDAPURL</directive> URLs.</p>
 </usage>
 </directivesynopsis>