Apache-AuthenN2
view release on metacpan or search on metacpan
AuthenN2.pm view on Meta::CPAN
__END__
=pod
=head1 NAME
Apache::AuthenN2 - Authenticate into the NT and NIS+ domains
=head1 SYNOPSIS
Allow windows and unix users to use their familiar credentials to
gain authenticated access to restricted applications and files
offered via apache.
#httpd.conf
<Files *challenge*>
AuthName 'your nt or nis+ account'
AuthType Basic
PerlSetVar NISPlus_Passwd_Table passwd.org_dir.yoyodyne.com
PerlSetVar NISPlus_Group_Table group.org_dir.yoyodyne.com
PerlSetVar NT_Default_Domains 'eng corporate'
AuthenN2.pm view on Meta::CPAN
Authenticate to one or more pdc:bdc controller pairs; these can be
true nt controllers or properly configured samba servers. Only one
pdc:bdc pair is required by the module; you can add pairs to increase
reliability, or to circumvent domain trust wars. If the user has
specified a domain, e.g., sales\john, then just try against that
domain; if no domain was specified by the user, try all of the
default domains listed in the above config. Failing nt
authentication, try nis+. This order (nt then nis+) is simply to
boost average apparent performance because the nt population is much
larger than the unix population at the author's company. If your
population has an opposite demographic, feel free to reverse the
order of checking.
Note that this scheme is quite permissive. Valid nt credentials
against any of the controllers or domains, or valid nis+ credentials
will allow access. This multiplies exposure to poorly selected
passwords.
<Files *challenge*> is just a way of specifying which files should be
protected by this authenticator. In this example, a script named
NAME
Apache::AuthenN2 - Authenticate into the NT and NIS+ domains
SYNOPSIS
Allow windows and unix users to use their familiar credentials to gain
authenticated access to restricted applications and files offered via
apache.
#httpd.conf
<Files *challenge*>
AuthName 'your nt or nis+ account'
AuthType Basic
PerlSetVar NISPlus_Passwd_Table passwd.org_dir.yoyodyne.com
PerlSetVar NISPlus_Group_Table group.org_dir.yoyodyne.com
PerlSetVar NT_Default_Domains 'eng corporate'
DESCRIPTION
Authenticate to one or more pdc:bdc controller pairs; these can be true
nt controllers or properly configured samba servers. Only one pdc:bdc
pair is required by the module; you can add pairs to increase
reliability, or to circumvent domain trust wars. If the user has
specified a domain, e.g., sales\john, then just try against that domain;
if no domain was specified by the user, try all of the default domains
listed in the above config. Failing nt authentication, try nis+. This
order (nt then nis+) is simply to boost average apparent performance
because the nt population is much larger than the unix population at the
author's company. If your population has an opposite demographic, feel
free to reverse the order of checking.
Note that this scheme is quite permissive. Valid nt credentials against
any of the controllers or domains, or valid nis+ credentials will allow
access. This multiplies exposure to poorly selected passwords.
<Files *challenge*> is just a way of specifying which files should be
protected by this authenticator. In this example, a script named newbug-
challenge.pl would be protected, regardless of where it is located in
( run in 0.968 second using v1.01-cache-2.11-cpan-39bf76dae61 )