Hello,
Can I make a request that certain features of the access control documentation are emphasized? I've wasted quite a lot of time on this and some simple rules (which already exist in the documentation) would have been really helpful. These are: 8. Access Control 8.2. Access Control via Static Configuration 8.2.5. Access Control Examples
The fact that authentication is always done anonymously, even if anonymous binds are disabled in the configuration, is very important. 8.2.4. Access Control Evaluation
The order of evaluation of access directives makes their placement in the configuration file important. Also, some mention of the ACL log level would be useful!
Thanks. Tom
|