So it sounds like there are two questions being asked.  First, what non-ldap 
usages are there for authnAlias and second why doesn't the configuration below 
work?  

   I'll answer the second question first.  Given the configuration block below, 
I don't know why it doesn't work.  I just retested the same configuration and 
everything worked as expected.  The only issue that I see is setting 
'AuthBasicAuthoritative off'.  Since there doesn't appear to be any other 
authentication type specified (ie. digest), this directive should either be set 
to 'on' or removed and left as default (which is also 'on').  The error message 
that is showing up in the error_log is a result of the default authn handler 
being hit as a last resort with no auth type set as default.  BTW, given the 
configuration below, I was also unable to duplicate the error message even with 
AuthBasicAuthoritative set to 'on' which implies that there is probably some 
other auth configuration somewhere that is conflicting.

  To answer the first question, the non-ldap example given here is a perfectly 
valid use of authnAlias.  Basically authnAlias can be used to create extended 
providers that use the same base provider but with different parameters.  
Another possible example would be authnDBD:

<AuthnProviderAlias dbd dbd1>
    AuthDBDUserPWQuery "select password from authn where username = %s"
</AuthnProviderAlias>

<AuthnProviderAlias dbd dbd2>
    AuthDBDUserPWQuery "select password from authn where Aliasusername = %s"
</AuthnProviderAlias>

Of course you could craft a better SQL statement that would handle both 
situations at the same time, but you get the point.  AuthAlias just appears to 
be more useful with LDAP because configuring authnzldap authentication usually 
requires more than a single directive that defines authentication criteria (ie. 
ldap server, bind user and password).  

Brad


>>> On 9/5/2006 at 6:54 AM, in message
<[EMAIL PROTECTED]>, Rich Bowen
<[EMAIL PROTECTED]> wrote:
> This went first to users@, but it appears that the auth-fu isn't  
> strong there right now. ;-)
> 
> I was hoping that someone (Brad?) might be able to assist me with  
> this. I was trying to come up with a non-LDAP example for the  
> documentation, since this seems a really useful feature that should  
> be accessible to folks that don't use LDAP. But so far no joy.
> 
> Begin forwarded message:
> 
>> From: Rich Bowen <[EMAIL PROTECTED]>
>> Date: September 4, 2006 16:34:45 EDT
>> To: [email protected] 
>> Subject: [EMAIL PROTECTED] AuthProviderAlias and mod_authn_file
>> Reply-To: [email protected] 
>>
>> I'm trying to come up with a working example of using  
>> AuthProviderAlias with something other than LDAP. I'm sure I'm  
>> overlooking something simple, but I can't get it working, and could  
>> use some advice. Here's what I've got:
>>
>> <AuthnProviderAlias file file1>
>>     AuthUserFile /tmp/auth1
>> </AuthnProviderAlias>
>>
>> <AuthnProviderAlias file file2>
>>     AuthUserFile /tmp/auth2
>> </AuthnProviderAlias>
>>
>>     <Directory /usr/local/apache/vhosts/drbacchus/x>
>>         AuthType Basic
>>         AuthName 'wooga'
>>         AuthBasicAuthoritative off
>>         AuthBasicProvider file1 file2
>>
>>         Require valid-user
>>     </Directory>
>>
>> On trying to authenticate, I get the following in the error log:
>>
>> access to /x failed, reason: require directives present and no  
>> Authoritative handler.
>>
>> Any advice would be greatly appreciated. With any luck, I'll figure  
>> it out as soon as I press send ...
> 
> --
> They went to sea in a sieve, they did
> In a sieve they went to se



Reply via email to