diff options
author | Bradley Nicholes <bnicholes@apache.org> | 2005-05-04 01:07:43 +0200 |
---|---|---|
committer | Bradley Nicholes <bnicholes@apache.org> | 2005-05-04 01:07:43 +0200 |
commit | 3a3447622ca1e8cfb49b2fe7110d276ae3bb8c9f (patch) | |
tree | 10cda5dfc4cea0f99a12dac8065ef29c79b1206f /docs/manual/mod/mod_authnz_ldap.xml | |
parent | Add a little detail about merging of .htaccess with httpd.conf, (diff) | |
download | apache2-3a3447622ca1e8cfb49b2fe7110d276ae3bb8c9f.tar.xz apache2-3a3447622ca1e8cfb49b2fe7110d276ae3bb8c9f.zip |
Add the directive AuthLDAPAllowDNAuth to allow a user to authenticate against an LDAP directory using a full user DN. This directive allows a user to authenticate against a subcontext that may contain non-unique user IDs.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@168016 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'docs/manual/mod/mod_authnz_ldap.xml')
-rw-r--r-- | docs/manual/mod/mod_authnz_ldap.xml | 45 |
1 files changed, 40 insertions, 5 deletions
diff --git a/docs/manual/mod/mod_authnz_ldap.xml b/docs/manual/mod/mod_authnz_ldap.xml index 526de29f98..9b46e639b9 100644 --- a/docs/manual/mod/mod_authnz_ldap.xml +++ b/docs/manual/mod/mod_authnz_ldap.xml @@ -819,6 +819,38 @@ environment variable</description> the username that was passed by the client. It is turned off by default.</p> </usage> +<seealso><directive module="mod_authnz_ldap">AuthLDAPAllowDNAuth</directive></seealso> +</directivesynopsis> + +<directivesynopsis> +<name>AuthLDAPAllowDNAuth</name> +<description>Allow the user to authenticate by passing a fully distinguished +user name.</description> +<syntax>AuthLDAPAllowDNAuth on|off</syntax> +<default>AuthLDAPAllowDNAuth off</default> +<contextlist><context>directory</context><context>.htaccess</context> +</contextlist> +<override>AuthConfig</override> + +<usage> + <p>If this directive is set to ON, users are allowed to pass a fully + distinguished user name as the user ID. Regardless of this setting, + Auth_LDAP will still allow a contextless login. This directive is + turned off by default.</p> + + <note><title>Note</title> + <p>If a full user DN is allowed for authentication and the value of + <directive module="mod_authnz_ldap">AuthLDAPRemoteUserIsDN</directive> + is set to OFF, the value of the REMOTE_USER environment variable + will contain the actual user name value passed in the request. If + this directive is set to ON, the REMOTE_USER environment variable + will always be set to the user DN retrieved from the LDAP directory. + If a contextless user ID is required in all cases instead of a + full DN, it is possible to retrieve the desired attribute value + from the user object by specifying an attribute list in the + <directive module="mod_authnz_ldap">AuthLDAPUrl</directive> directive.</p> + </note> +</usage> </directivesynopsis> <directivesynopsis> @@ -874,13 +906,16 @@ environment variable</description> <dt>attribute</dt> - <dd>The attribute to search for. + <dd>The attribute to search for as well as additional attribute + values to extract from the authenticated user object. Although RFC 2255 allows a comma-separated list of attributes, only the first attribute will be used, no - matter how many are provided. If no attributes are - provided, the default is to use <code>uid</code>. It's a good - idea to choose an attribute that will be unique across all - entries in the subtree you will be using.</dd> + matter how many are provided. The values of all other listed + attributes will be extracted from the user object and assigned + to environment variables (AUTHENTICATE_<Attribute>=value). + If no attributes are provided, the default is to use <code>uid</code>. + It's a good idea to choose an attribute that will be unique across + all entries in the subtree you will be searching.</dd> <dt>scope</dt> |