- Spelling fixes

PR:		docs/149140
Submitted by:	olgeni
This commit is contained in:
Gabor Pali 2010-07-31 11:06:18 +00:00
parent 82d7725638
commit 6fb170b309
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=36144
10 changed files with 24 additions and 24 deletions

View file

@ -31,7 +31,7 @@
</legalnotice>
<abstract>
<para>This document is indended as a guide for the configuration
<para>This document is intended as a guide for the configuration
of an LDAP server (principally an <application>OpenLDAP</application>
server) for authentication on &os;. This is useful for situations
where many servers need the same user accounts, for example as a
@ -286,7 +286,7 @@ tls_cacert /path/to/your/cacert.crt</programlisting>
<title>Entries in the Database</title>
<para>Authentication against an LDAP directory is generally
accomplished by attempting to bind to the directory as the connectin user.
accomplished by attempting to bind to the directory as the connecting user.
This is done by establishing a <quote>simple</quote>
bind on the directory with the user name supplied. If there is an
entry with the <literal>uid</literal> equal to the user name and
@ -344,7 +344,7 @@ loginShell: /bin/csh
uid: tuser
cn: tuser</programlisting>
<para>I start my LDAP users' UIDs at 10000 to avoid colisions with
<para>I start my LDAP users' UIDs at 10000 to avoid collisions with
system accounts; you can configure whatever number you wish here,
as long as it's less than 65536.</para>
@ -456,7 +456,7 @@ cn: tuser</programlisting>
<para>With this configuration you should be able to authenticate
a user against an LDAP directory.
<application>PAM</application> will perform a bind with your
credentails, and if successful will tell
credentials, and if successful will tell
<application>SSH</application> to allow access.</para>
<para>However it is not a good idea to allow
@ -890,7 +890,7 @@ memberUid: uid=user2,ou=people,dc=example,dc=org</programlisting>
<option>-signkey</option>:</para>
<example id="ca-sign">
<title>Signing as a certificate authorty</title>
<title>Signing as a certificate authority</title>
<screen>&prompt.user; <userinput>openssl x509 -req -days 1024 \
-in ldap-server-one.csr -CA root.crt -CAkey root.key \