Skip to content

Commit 303608b

Browse files
phil198Hunterness
authored andcommitted
Apply suggestions from code review
Co-authored-by: Therese Magnusson <[email protected]>
1 parent 16c330d commit 303608b

File tree

3 files changed

+4
-3
lines changed

3 files changed

+4
-3
lines changed

modules/ROOT/pages/authentication-authorization/ldap-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ When the `dbms.security.require_local_user` configuration setting is set to `tru
383383
384384
If there is no matching Auth Provider, the user will not be able to authenticate or authorize. This applies to all providers.
385385
386-
Conversely, when `internal.dbms.security.require_local_user` is set to `true`, users' Auth Providers will have no bearing on the way that they are authenticated and authorized, instead authentication and authorization will be controlled centrally (for all users) by the database configuration.
386+
Conversely, when `dbms.security.require_local_user` is set to `false`, users' Auth Providers will have no bearing on the way that they are authenticated and authorized, instead authentication and authorization will be controlled centrally (for all users) by the database configuration.
387387
======
388388

389389

modules/ROOT/pages/authentication-authorization/manage-users.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -858,7 +858,8 @@ The `SET PASSWORD` part is only optional if it directly follows the `SET PASSWOR
858858
A home database will be resolved if it is either pointing to a database or a database alias.
859859
If no home database is set, the DBMS default database is used as the home database for the user.
860860
[role=label--new-5.24]
861-
* One or more `SET AUTH` clauses can be used to set xref:authentication-authorization/auth-providers.adoc[Auth Providers], which define authentication / authorization providers for the user. This might be used to configure external auth providers like LDAP or OIDC, but can also be used as an alternative way to set the native (password-based) auth settings like `SET PASSWORD` and `SET PASSWORD CHANGE REQUIRED`.
861+
* One or more `SET AUTH` clauses can be used to set xref:authentication-authorization/auth-providers.adoc[Auth Providers], which define authentication / authorization providers for the user.
862+
This might be used to configure external auth providers like LDAP or OIDC, but can also be used as an alternative way to set the native (password-based) auth settings like `SET PASSWORD` and `SET PASSWORD CHANGE REQUIRED`.
862863
** xref:authentication-authorization/manage-users.adoc#access-control-create-users[Native Auth Provider Examples]
863864
** xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO Auth Provider Examples]
864865
** xref:authentication-authorization/ldap-integration.adoc#auth-ldap-auth-providers[LDAP Auth Provider Examples]

modules/ROOT/pages/authentication-authorization/sso-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ When the `dbms.security.require_local_user` configuration setting is set to `tru
280280
281281
If there is no matching Auth Provider, the user will not be able to authenticate or authorize. This applies to all providers.
282282
283-
Conversely, when `internal.dbms.security.require_local_user` is set to `true`, users' Auth Providers will have no bearing on the way that they are authenticated and authorized, instead authentication and authorization will be controlled centrally (for all users) by the database configuration.
283+
Conversely, when `dbms.security.require_local_user` is set to `false`, users' Auth Providers will have no bearing on the way that they are authenticated and authorized, instead authentication and authorization will be controlled centrally (for all users) by the database configuration.
284284
======
285285

286286

0 commit comments

Comments
 (0)