Index: openacs-4/packages/acs-lang/tcl/lang-catalog-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-lang/tcl/lang-catalog-procs.tcl,v diff -u -r1.60.2.2 -r1.60.2.3 --- openacs-4/packages/acs-lang/tcl/lang-catalog-procs.tcl 12 Apr 2019 21:19:13 -0000 1.60.2.2 +++ openacs-4/packages/acs-lang/tcl/lang-catalog-procs.tcl 10 Aug 2019 15:10:51 -0000 1.60.2.3 @@ -657,7 +657,7 @@ There are three sets of keys, file, db, and base keys. For each key in the union of these keys there are three messages that can exist: the file message, the db message, and the base message. The base message serves as the base for the merge. We will distinguish all the different permutations - of each of the three messages existing or not, and all permutations of the messages being different from eachother. + of each of the three messages existing or not, and all permutations of the messages being different from each other. We don't distinguish how two messages are different, only whether they are different or not. In total that gives us 14 cases (permutations) to consider.
Index: openacs-4/packages/acs-lang/tcl/lang-message-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-lang/tcl/lang-message-procs.tcl,v diff -u -r1.68.2.4 -r1.68.2.5 --- openacs-4/packages/acs-lang/tcl/lang-message-procs.tcl 5 Apr 2019 12:50:54 -0000 1.68.2.4 +++ openacs-4/packages/acs-lang/tcl/lang-message-procs.tcl 10 Aug 2019 15:10:51 -0000 1.68.2.5 @@ -761,7 +761,7 @@ identifier for each locale. All keys belong to a certain package and should be prefixed with the package key of that package on the format package_key.message_key (the dot is reserved for separating - the package key, the rest of the key should contain only alpha-numeric + the package key, the rest of the key should contain only alphanumeric characters and underscores). If the key does not belong to any particular package it should not contain a dot. A lookup is always attempted with the exact key given to this proc. Index: openacs-4/packages/acs-lang/tcl/localization-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-lang/tcl/localization-procs.tcl,v diff -u -r1.29.2.4 -r1.29.2.5 --- openacs-4/packages/acs-lang/tcl/localization-procs.tcl 1 Jul 2019 16:43:43 -0000 1.29.2.4 +++ openacs-4/packages/acs-lang/tcl/localization-procs.tcl 10 Aug 2019 15:10:51 -0000 1.29.2.5 @@ -21,7 +21,7 @@ } { Converts a number to its canonical representation by stripping everything but the - decimal separator and triming left 0's so it + decimal separator and trimming left 0's so it won't be octal. It can process the following types of numbers:ad_conn locale
This default can be overridden by setting the AOLserver init parameter for the MIME type of .tcl files to include an -explcit character set. If an explicit MIME type is not found, +explicit character set. If an explicit MIME type is not found, ns_encodingfortype will default to the AOLserver init parameter value DefaultCharset if it is set.
Example AOLserver .ini configuration file to set default script
@@ -432,7 +432,7 @@
In the example above, if the catalog file was loaded from the
-bboard package, all of the keys would be prefixed autmatically with
+bboard package, all of the keys would be prefixed automatically with
"bboard.
".
@@ -228,7 +228,7 @@Caching multilingual ADP Templates
Message catalog lookups can be potentially expensive, if many of them are done in a page. The -templating system can already precompile and and cache adp pages. +templating system can already precompile and cache adp pages. This works fine for a page in a specific language such as foo.en.adp, but we need to modify the caching mechanism if we want to use a single template file to target multiple languages. @@ -431,7 +431,7 @@This default can be overridden by setting the AOLserver init parameter for the MIME type -of .tcl files to include an explcit character set. If an explicit +of .tcl files to include an explicit character set. If an explicit MIME type is not found, ns_encodingfortype will default to the AOLserver init parameter value DefaultCharset if it is set.
@@ -575,7 +575,7 @@ In the example above, if the catalog file was loaded from the bboard -package, all of the keys would be prefixed autmatically with "
bboard.
". +package, all of the keys would be prefixed automatically with "bboard.
".Loading A Message Catalog At Package Init Time
@@ -649,7 +649,7 @@
type
specifies the context in which the translation is made. If omitted,
type is user which means that the translation is provided in the user's preferred language.
static
specifies that this tag should be translated once at template compile time, rather than dynamically every time the page is run. This will be unneccessaru and will be deprecated once we
-have implemented effective locale based cacheing for templates.
+have implemented effective locale based caching for templates.
Example 1: Display the text string Hello on an ADP page (i.e. do nothing special):
Index: openacs-4/packages/acs-authentication/acs-authentication.info =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/acs-authentication.info,v diff -u -r1.43.2.2 -r1.43.2.3 --- openacs-4/packages/acs-authentication/acs-authentication.info 10 Apr 2019 20:40:20 -0000 1.43.2.2 +++ openacs-4/packages/acs-authentication/acs-authentication.info 10 Aug 2019 15:15:49 -0000 1.43.2.3 @@ -30,7 +30,7 @@- + Index: openacs-4/packages/acs-authentication/tcl/apm-callback-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/tcl/apm-callback-procs.tcl,v diff -u -r1.21.2.1 -r1.21.2.2 --- openacs-4/packages/acs-authentication/tcl/apm-callback-procs.tcl 10 Apr 2019 21:41:00 -0000 1.21.2.1 +++ openacs-4/packages/acs-authentication/tcl/apm-callback-procs.tcl 10 Aug 2019 15:15:49 -0000 1.21.2.2 @@ -256,15 +256,15 @@ CanChangePassword { description { Return whether the user can change his/her password through this implementation. - The value is not supposed to depend on the username and should be cachable. + The value is not supposed to depend on the username and should be cacheable. } input { parameters:string,multiple } output { changeable_p:boolean } - iscachable_p "t" + iscacheable_p "t" } ChangePassword { description { @@ -285,15 +285,15 @@ CanRetrievePassword { description { Return whether the user can retrieve his/her password through this implementation. - The value is not supposed to depend on the username and should be cachable. + The value is not supposed to depend on the username and should be cacheable. } input { parameters:string,multiple } output { retrievable_p:boolean } - iscachable_p "t" + iscacheable_p "t" } RetrievePassword { description { @@ -314,15 +314,15 @@ CanResetPassword { description { Return whether the user can reset his/her password through this implementation. - The value is not supposed to depend on the username and should be cachable. + The value is not supposed to depend on the username and should be cacheable. } input { parameters:string,multiple } output { resettable_p:boolean } - iscachable_p "t" + iscacheable_p "t" } ResetPassword { description { Index: openacs-4/packages/acs-authentication/tcl/sync-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/tcl/sync-procs.tcl,v diff -u -r1.44.2.1 -r1.44.2.2 --- openacs-4/packages/acs-authentication/tcl/sync-procs.tcl 13 Mar 2019 10:04:53 -0000 1.44.2.1 +++ openacs-4/packages/acs-authentication/tcl/sync-procs.tcl 10 Aug 2019 15:15:49 -0000 1.44.2.2 @@ -522,7 +522,7 @@ # but these will issue an exception below. # # TODO: using a different error-code could make the code saver, by - # just ingnoring such cases. + # just ignoring such cases. # set elms [list] ad_try { Index: openacs-4/packages/acs-authentication/www/doc/acs-authentication.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/acs-authentication.html,v diff -u -r1.3 -r1.3.2.1 --- openacs-4/packages/acs-authentication/www/doc/acs-authentication.html 5 Aug 2018 10:34:17 -0000 1.3 +++ openacs-4/packages/acs-authentication/www/doc/acs-authentication.html 10 Aug 2019 15:15:49 -0000 1.3.2.1 @@ -37,7 +37,7 @@ Definition: SC = service-contract
Authorities
-acs-authentication can have multiple authorities, each one represent an specific configuration of authenticatication. For instance, in your openacs installation you can have users related to different authorities, some of them might authenticate locally since they are external or invited, others belongs to your corporate network and already have users, so might authenticate against LDAP and others in your own work office might use PAM for authentication because your local system authentication. Plus you might define an specific implementation (using the set of SC) to connect to your client DB, which is in another DB, and allow your clients login to certain parts of your website. Then, this is right way to handle all those set of users, that already might have an account in another place and you just want them to authenticate against that external system.
+acs-authentication can have multiple authorities, each one represent a specific configuration of authenticatication. For instance, in your openacs installation you can have users related to different authorities, some of them might authenticate locally since they are external or invited, others belongs to your corporate network and already have users, so might authenticate against LDAP and others in your own work office might use PAM for authentication because your local system authentication. Plus you might define a specific implementation (using the set of SC) to connect to your client DB, which is in another DB, and allow your clients login to certain parts of your website. Then, this is right way to handle all those set of users, that already might have an account in another place and you just want them to authenticate against that external system.
The idea is: each user belongs to a given authority, and just one .
To add an authority in your installation go to /acs-admin/auth/ and click on "Create new authority".
Index: openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.adp =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.adp,v diff -u -r1.4 -r1.4.2.1 --- openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.adp 8 Feb 2019 13:00:50 -0000 1.4 +++ openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.adp 10 Aug 2019 15:15:49 -0000 1.4.2.1 @@ -11,7 +11,7 @@OpenACS supports PAM authetication via the ns_pam module in +Pluggable Authentication Modules (PAM) with OpenACS
OpenACS supports PAM authentication via the ns_pam module in AOLserver.
Index: openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html,v diff -u -r1.6 -r1.6.2.1 --- openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 7 Aug 2017 23:47:46 -0000 1.6 +++ openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 10 Aug 2019 15:15:49 -0000 1.6.2.1 @@ -1,4 +1,4 @@ -
Using Pluggable Authentication Modules (PAM) with OpenACS OpenACS supports PAM authetication via the ns_pam module in AOLserver.
Add PAM support to AOLserver. OpenACS supports PAM support via the PAM AOLserver +
Using Pluggable Authentication Modules (PAM) with OpenACS OpenACS supports PAM authentication via the ns_pam module in AOLserver.
Add PAM support to AOLserver. OpenACS supports PAM support via the PAM AOLserver module. PAM is system of modular support, and can provide local (unix password), RADIUS, LDAP (more information), and other forms of Index: openacs-4/packages/acs-authentication/www/doc/xml/install.xml =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/xml/install.xml,v diff -u -r1.6 -r1.6.2.1 --- openacs-4/packages/acs-authentication/www/doc/xml/install.xml 7 Aug 2017 23:47:46 -0000 1.6 +++ openacs-4/packages/acs-authentication/www/doc/xml/install.xml 10 Aug 2019 15:15:49 -0000 1.6.2.1 @@ -14,7 +14,7 @@
Using Pluggable Authentication Modules (PAM) with OpenACS -OpenACS supports PAM authetication via the ns_pam module in AOLserver. +OpenACS supports PAM authentication via the ns_pam module in AOLserver. @@ -190,7 +190,7 @@ You do not want to make users remember yet another password and username. If you can avoid it you do not want to store their passwords either. This document should help you set your system up so your users can seamlessly log in to your OpenACS instance using the password they are accustomed to using for other things at your institution. Background -The original OpenACS LDAP implementation (which has been depreciated by this package) treated the LDAP server as another data store similar to Oracle or Postgresql. It opened a connection using a privileged account and read or stored an encrypted password for the user in question. This password was independent of the user's operating system or network account, and had to be synchronized if you wanted the same password for OpenACS. +The original OpenACS LDAP implementation (which has been deprecated by this package) treated the LDAP server as another data store similar to Oracle or Postgresql. It opened a connection using a privileged account and read or stored an encrypted password for the user in question. This password was independent of the user's operating system or network account, and had to be synchronized if you wanted the same password for OpenACS. Save their passwords? Sync passwords? Deal with forgotten password requests? No Thanks. Using ldap bind, you can delegate authentication completely to LDAP. This way you can let the IT department (if you are lucky) worry about password storage/synchronization/etc. The bind operation takes a username and password and returns a true of false depending on whether they match up. This document takes the 'bind' approach so that your users LDAP/AD password (or whatever else you use) can be used to login to OpenACS. Note on Account Creation