From f4dd34d24c22926b76da6f6e1d9f4c471ec2b2da Mon Sep 17 00:00:00 2001
From: rhaggard <rhaggard@localhost>
Date: Fri, 01 Feb 2008 17:30:23 +0000
Subject: [PATCH] commiting configuration XML files after adding info from the old config guide to be incorporated in the new generated config reference

---
 opends/src/admin/defn/org/opends/server/admin/std/PlainSASLMechanismHandlerConfiguration.xml |   14 ++++++++++++--
 1 files changed, 12 insertions(+), 2 deletions(-)

diff --git a/opends/src/admin/defn/org/opends/server/admin/std/PlainSASLMechanismHandlerConfiguration.xml b/opends/src/admin/defn/org/opends/server/admin/std/PlainSASLMechanismHandlerConfiguration.xml
index e250c57..2a86739 100644
--- a/opends/src/admin/defn/org/opends/server/admin/std/PlainSASLMechanismHandlerConfiguration.xml
+++ b/opends/src/admin/defn/org/opends/server/admin/std/PlainSASLMechanismHandlerConfiguration.xml
@@ -35,6 +35,14 @@
     <adm:user-friendly-name />
     is used to perform all processing related to SASL PLAIN
     authentication.
+    The PLAIN SASL mechanism provides the ability for clients to 
+    authenticate using a username and password. This authentication 
+    is very similar to standard LDAP simple authentication, with the 
+    exception that it can authenticate based on an authentication ID 
+    (for example, a username) rather than requiring a full DN, and 
+    it can also include an authorization ID in addition to the 
+    authentication ID. Note that the SASL PLAIN mechanism does not 
+    make any attempt to protect the password.
   </adm:synopsis>
   <adm:profile name="ldap">
     <ldap:object-class>
@@ -53,8 +61,10 @@
   </adm:property-override>
   <adm:property name="identity-mapper" mandatory="true">
     <adm:synopsis>
-      Specifies the name of the identity mapper that should be used to
-      match client authentication and authorization IDs to user entries.
+      Specifies the name of the identity mapper that is to be used 
+      with this SASL mechanism handler to match the authentication or 
+      authorization ID included in the SASL bind request to the 
+      corresponding user in the directory.
     </adm:synopsis>
     <adm:syntax>
       <adm:aggregation relation-name="identity-mapper"

--
Gitblit v1.10.0