Index: openacs-4/packages/acs-core-docs/www/install-ldap-radius.adp =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-core-docs/www/install-ldap-radius.adp,v diff -u -N -r1.3 -r1.4 --- openacs-4/packages/acs-core-docs/www/install-ldap-radius.adp 8 Nov 2017 09:42:10 -0000 1.3 +++ openacs-4/packages/acs-core-docs/www/install-ldap-radius.adp 28 Mar 2018 17:00:40 -0000 1.4 @@ -57,7 +57,7 @@

Configure ns_ldap for traditional use.  Traditionally OpenACS has supported -ns_ldap for authentification by storing the OpenACS password in an +ns_ldap for authentication by storing the OpenACS password in an encrypted field within the LDAP server called "userPassword". Furthermore a CN field was used for searching for the username, usually userID or something similar. @@ -77,7 +77,7 @@ but kept internally. The latest version of ns_ldap supports this method with the ns_ldap bind command. All you have to do to enable this is to configure -auth_ldap to make use of the BIND authentification instead. +auth_ldap to make use of the BIND authentication instead. Alternatively you can write a small script on how to calculate the username out of the given input (e.g. if the OpenACS username is malte.fb03.tu, the LDAP request can be translated into @@ -93,4 +93,4 @@ rightLink="aolserver" rightLabel="Next" rightTitle="Install AOLserver 3.3oacs1" homeLink="index" homeLabel="Home" upLink="install-more-software" upLabel="Up"> - \ No newline at end of file +