@@ -191,19 +191,19 @@ ldap {
191191 # update { ... }::
192192 #
193193 update {
194- & control.Password.With-Header += 'userPassword'
195- # & control.Password.NT := 'ntPassword'
196- # & reply.Reply-Message := 'radiusReplyMessage'
197- # & reply.Tunnel-Type := 'radiusTunnelType'
198- # & reply.Tunnel-Medium-Type := 'radiusTunnelMediumType'
199- # & reply.Tunnel-Private-Group-ID := 'radiusTunnelPrivategroupId'
194+ control.Password.With-Header += 'userPassword'
195+ # control.Password.NT := 'ntPassword'
196+ # reply.Reply-Message := 'radiusReplyMessage'
197+ # reply.Tunnel-Type := 'radiusTunnelType'
198+ # reply.Tunnel-Medium-Type := 'radiusTunnelMediumType'
199+ # reply.Tunnel-Private-Group-ID := 'radiusTunnelPrivategroupId'
200200
201201 # NOTE: Where only a list is specified as the RADIUS attribute,
202202 # the value of the LDAP attribute is parsed as a valuepair
203203 # in the same format as the 'valuepair_attribute' (above).
204- & control += 'radiusControlAttribute'
205- & request += 'radiusRequestAttribute'
206- & reply += 'radiusReplyAttribute'
204+ control += 'radiusControlAttribute'
205+ request += 'radiusRequestAttribute'
206+ reply += 'radiusReplyAttribute'
207207 }
208208
209209 #
@@ -230,8 +230,8 @@ ldap {
230230 # [source, unlang]
231231 # ----
232232 # ldap
233- # if ((ok || updated) && & User-Password) {
234- # & control.Auth-Type := ::ldap
233+ # if ((ok || updated) && User-Password) {
234+ # control.Auth-Type := ::ldap
235235 # }
236236 # ----
237237 # ====
@@ -250,7 +250,7 @@ ldap {
250250 # filter:: Filter for user objects, should be specific enough
251251 # to identify a single user object.
252252 #
253- filter = "(uid=%{&Stripped-User-Name || & User-Name})"
253+ filter = "(uid=%{&Stripped-User-Name || User-Name})"
254254
255255 # For Active Directory nested group, you should comment out the previous 'filter = ...'
256256 # and use the below. Where 'group' is the group you are querying for.
@@ -263,7 +263,7 @@ ldap {
263263 #
264264 # See: https://social.technet.microsoft.com/wiki/contents/articles/5392.active-directory-ldap-syntax-filters.aspx
265265 #
266- # filter = "(&(objectClass=user)(sAMAccountName=%{& Stripped-User-Name || & User-Name})(memberOf:1.2.840.113556.1.4.1941:=cn=group,${..base_dn}))"
266+ # filter = "(&(objectClass=user)(sAMAccountName=%{Stripped-User-Name || User-Name})(memberOf:1.2.840.113556.1.4.1941:=cn=group,${..base_dn}))"
267267
268268 #
269269 # sasl { ... }:: SASL parameters to use for user binds
@@ -285,12 +285,12 @@ ldap {
285285 # authname:: SASL authentication name. Mechanism specific value
286286 # to use when prompted for the client authentication name.
287287 #
288- # authname = & User-Name
288+ # authname = User-Name
289289
290290 #
291291 # proxy:: SASL authorisation identity to proxy.
292292 #
293- # proxy = & User-Name
293+ # proxy = User-Name
294294
295295 #
296296 # realm:: SASL realm. Used for kerberos.
@@ -309,7 +309,7 @@ ldap {
309309 # Service, CN=Windows NT, CN=Services, CN=Configuration` object. Modify the
310310 # `msDS-Other-Settings` attribute, and add a new entry for `DenyUnauthenticatedBind=1`.
311311 #
312- # password_attribute = & User-Password
312+ # password_attribute = User-Password
313313
314314 #
315315 # scope:: Search scope, may be `base`, `one`, `sub' or `children`.
@@ -426,7 +426,7 @@ ldap {
426426 # That is, group objects with attributes that identify
427427 # members (the inverse of `membership_attribute`).
428428 #
429- # membership_filter = "(|(member=%{control.Ldap-UserDn})(memberUid=%{& Stripped-User-Name || & User-Name}))"
429+ # membership_filter = "(|(member=%{control.Ldap-UserDn})(memberUid=%{Stripped-User-Name || User-Name}))"
430430
431431 #
432432 # membership_attribute:: The attribute, in user objects, which contain
@@ -532,8 +532,8 @@ ldap {
532532 #
533533 # default:: The default profile. This may be a DN or an attribute reference.
534534 #
535- # NOTE: To get old v2.2.x style behaviour, or to use the `& User-Profile` attribute
536- # to specify the default profile, set this to `& control.User-Profile`.
535+ # NOTE: To get old v2.2.x style behaviour, or to use the `User-Profile` attribute
536+ # to specify the default profile, set this to `control.User-Profile`.
537537 #
538538# default = 'cn=radprofile,dc=example,dc=org'
539539
@@ -957,8 +957,8 @@ ldap {
957957#
958958# [source,unlang]
959959# ----
960- # & my-string := "ldap:///ou=profiles,dc=example,dc=com??sub?(objectClass=radiusprofile)"
961- # & reply.Reply-Message := "The LDAP url is %ldap.uri.escape(%{my-string}}"
960+ # my-string := "ldap:///ou=profiles,dc=example,dc=com??sub?(objectClass=radiusprofile)"
961+ # reply.Reply-Message := "The LDAP url is %ldap.uri.escape(%{my-string}}"
962962# ----
963963#
964964# .Output
@@ -979,7 +979,7 @@ ldap {
979979#
980980# [source,unlang]
981981# ----
982- # & my-int := "%ldap.profile(ldap://%ldap.uri.safe(%{LDAP-Host}):%ldap.uri.safe(%{LDAP-Port})/ou=profiles,dc=example,dc=com??sub?(objectClass=radiusprofile)"
982+ # my-int := "%ldap.profile(ldap://%ldap.uri.safe(%{LDAP-Host}):%ldap.uri.safe(%{LDAP-Port})/ou=profiles,dc=example,dc=com??sub?(objectClass=radiusprofile)"
983983# ----
984984#
985985# ### %ldap.uri.unescape(...)
@@ -992,8 +992,8 @@ ldap {
992992#
993993# [source,unlang]
994994# ----
995- # & my-string := "ldap:///ou=profiles,dc=example,dc=com??sub?\28objectClass=radiusprofile\29"
996- # & reply.Reply-Message := "The LDAP url is %ldap.uri.unescape(%{my-string})"
995+ # my-string := "ldap:///ou=profiles,dc=example,dc=com??sub?\28objectClass=radiusprofile\29"
996+ # reply.Reply-Message := "The LDAP url is %ldap.uri.unescape(%{my-string})"
997997# ----
998998#
999999# .Output
0 commit comments