Author: ahyoungryu Date: Fri Dec 2 01:27:33 2016 New Revision: 1772294 URL: http://svn.apache.org/viewvc?rev=1772294&view=rev Log: (empty)
Modified: zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html Modified: zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html URL: http://svn.apache.org/viewvc/zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html?rev=1772294&r1=1772293&r2=1772294&view=diff ============================================================================== --- zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html (original) +++ zeppelin/site/docs/0.7.0-SNAPSHOT/security/shiroauthentication.html Fri Dec 2 01:27:33 2016 @@ -252,7 +252,7 @@ user3 = password4, role2 <h2>Groups and permissions (optional)</h2> <p>In case you want to leverage user groups and permissions, use one of the following configuration for LDAP or AD under <code>[main]</code> segment in <code>shiro.ini</code>.</p> -<div class="highlight"><pre><code class="text language-text" data-lang="text">activeDirectoryRealm = org.apache.zeppelin.server.ActiveDirectoryGroupRealm +<div class="highlight"><pre><code class="text language-text" data-lang="text">activeDirectoryRealm = org.apache.zeppelin.realm.ActiveDirectoryGroupRealm activeDirectoryRealm.systemUsername = userNameA activeDirectoryRealm.systemPassword = passwordA activeDirectoryRealm.searchBase = CN=Users,DC=SOME_GROUP,DC=COMPANY,DC=COM @@ -282,7 +282,7 @@ To learn more about Apache Shiro Realm, <p>We also provide community custom Realms.</p> <h3>Active Directory</h3> -<div class="highlight"><pre><code class="text language-text" data-lang="text">activeDirectoryRealm = org.apache.zeppelin.server.ActiveDirectoryGroupRealm +<div class="highlight"><pre><code class="text language-text" data-lang="text">activeDirectoryRealm = org.apache.zeppelin.realm.ActiveDirectoryGroupRealm activeDirectoryRealm.systemUsername = userNameA activeDirectoryRealm.systemPassword = passwordA activeDirectoryRealm.hadoopSecurityCredentialPath = jceks://file/user/zeppelin/conf/zeppelin.jceks @@ -299,7 +299,7 @@ Create a keystore file using the hadoop <code>activeDirectoryRealm.hadoopSecurityCredentialPath = jceks://file/user/zeppelin/conf/zeppelin.jceks</code></p> <h3>LDAP</h3> -<div class="highlight"><pre><code class="text language-text" data-lang="text">ldapRealm = org.apache.zeppelin.server.LdapGroupRealm +<div class="highlight"><pre><code class="text language-text" data-lang="text">ldapRealm = org.apache.zeppelin.realm.LdapGroupRealm # search base for ldap groups (only relevant for LdapGroupRealm): ldapRealm.contextFactory.environment[ldap.searchBase] = dc=COMPANY,dc=COM ldapRealm.contextFactory.url = ldap://ldap.test.com:389