On Sep 5, 2006, at 11:49, Brad Nicholes wrote:

So it sounds like there are two questions being asked. First, what non-ldap usages are there for authnAlias and second why doesn't the configuration below work?

I'll answer the second question first. Given the configuration block below, I don't know why it doesn't work. I just retested the same configuration and everything worked as expected. The only issue that I see is setting 'AuthBasicAuthoritative off'. Since there doesn't appear to be any other authentication type specified (ie. digest), this directive should either be set to 'on' or removed and left as default (which is also 'on'). The error message that is showing up in the error_log is a result of the default authn handler being hit as a last resort with no auth type set as default. BTW, given the configuration below, I was also unable to duplicate the error message even with AuthBasicAuthoritative set to 'on' which implies that there is probably some other auth configuration somewhere that is conflicting.

I thought after I sent that I should mention that I tried various values for AuthBasicAuthoritative, because I am actually a little confused as to what this means in the context of aliases. Which Alias is it saying is authoritative?

Anyways, I tried with it on and off, with identical results. I'll try this on a server with less going on, to see if there is some kind of conflict with something else that I'm doing.


To answer the first question, the non-ldap example given here is a perfectly valid use of authnAlias. Basically authnAlias can be used to create extended providers that use the same base provider but with different parameters. Another possible example would be authnDBD:

<AuthnProviderAlias dbd dbd1>
AuthDBDUserPWQuery "select password from authn where username = %s"
</AuthnProviderAlias>

<AuthnProviderAlias dbd dbd2>
AuthDBDUserPWQuery "select password from authn where Aliasusername = %s"
</AuthnProviderAlias>

Of course you could craft a better SQL statement that would handle both situations at the same time, but you get the point. AuthAlias just appears to be more useful with LDAP because configuring authnzldap authentication usually requires more than a single directive that defines authentication criteria (ie. ldap server, bind user and password).

Thanks, this is a useful example.

--
They went to sea in a sieve, they did
In a sieve they went to see


Reply via email to