Author: ahyoungryu
Date: Fri Dec  2 01:27:33 2016
New Revision: 1772294

URL: http://svn.apache.org/viewvc?rev=1772294&view=rev
Log: (empty)

Modified:
    zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html

Modified: zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html
URL: 
http://svn.apache.org/viewvc/zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html?rev=1772294&r1=1772293&r2=1772294&view=diff
==============================================================================
--- zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html 
(original)
+++ zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html Fri Dec 
 2 01:27:33 2016
@@ -252,7 +252,7 @@ user3 = password4, role2
 <h2>Groups and permissions (optional)</h2>
 
 <p>In case you want to leverage user groups and permissions, use one of the 
following configuration for LDAP or AD under <code>[main]</code> segment in 
<code>shiro.ini</code>.</p>
-<div class="highlight"><pre><code class="text language-text" 
data-lang="text">activeDirectoryRealm = 
org.apache.zeppelin.server.ActiveDirectoryGroupRealm
+<div class="highlight"><pre><code class="text language-text" 
data-lang="text">activeDirectoryRealm = 
org.apache.zeppelin.realm.ActiveDirectoryGroupRealm
 activeDirectoryRealm.systemUsername = userNameA
 activeDirectoryRealm.systemPassword = passwordA
 activeDirectoryRealm.searchBase = CN=Users,DC=SOME_GROUP,DC=COMPANY,DC=COM
@@ -282,7 +282,7 @@ To learn more about Apache Shiro Realm,
 <p>We also provide community custom Realms.</p>
 
 <h3>Active Directory</h3>
-<div class="highlight"><pre><code class="text language-text" 
data-lang="text">activeDirectoryRealm = 
org.apache.zeppelin.server.ActiveDirectoryGroupRealm
+<div class="highlight"><pre><code class="text language-text" 
data-lang="text">activeDirectoryRealm = 
org.apache.zeppelin.realm.ActiveDirectoryGroupRealm
 activeDirectoryRealm.systemUsername = userNameA
 activeDirectoryRealm.systemPassword = passwordA
 activeDirectoryRealm.hadoopSecurityCredentialPath = 
jceks://file/user/zeppelin/conf/zeppelin.jceks
@@ -299,7 +299,7 @@ Create a keystore file using the hadoop
 <code>activeDirectoryRealm.hadoopSecurityCredentialPath = 
jceks://file/user/zeppelin/conf/zeppelin.jceks</code></p>
 
 <h3>LDAP</h3>
-<div class="highlight"><pre><code class="text language-text" 
data-lang="text">ldapRealm = org.apache.zeppelin.server.LdapGroupRealm
+<div class="highlight"><pre><code class="text language-text" 
data-lang="text">ldapRealm = org.apache.zeppelin.realm.LdapGroupRealm
 # search base for ldap groups (only relevant for LdapGroupRealm):
 ldapRealm.contextFactory.environment[ldap.searchBase] = dc=COMPANY,dc=COM
 ldapRealm.contextFactory.url = ldap://ldap.test.com:389


Reply via email to