@@ -52,26 +52,26 @@ thing.
52
52
* ` auth_gss_service_name ` : service principal name to use when acquiring
53
53
credentials.
54
54
55
- If you would like to authorize only a specific set of users , you can use the
55
+ If you would like to authorize only a specific set of principals , you can use the
56
56
` auth_gss_authorized_principal ` directive. The configuration syntax supports
57
57
multiple entries, one per line.
58
58
59
- auth_gss_authorized_principal <username >@<realm>
60
- auth_gss_authorized_principal <username2 >@<realm>
59
+ auth_gss_authorized_principal <primary1 >@<realm>
60
+ auth_gss_authorized_principal <primary2 >@<realm>
61
61
62
- Users can also be authorized using a regex pattern via the ` auth_gss_authorized_principal_regex `
63
- directive. This directive can be used together with the ` auth_gss_authorized_principal ` directive.
62
+ Principals can also be authorized using a regex pattern via the ` auth_gss_authorized_principal_regex `
63
+ directive. This directive can be used together with the ` auth_gss_authorized_principal ` directive.
64
64
65
- auth_gss_authorized_principal <username >@<realm>
66
- auth_gss_authorized_principal_regex ^(<username >)/(<group >)@<realm>$
65
+ auth_gss_authorized_principal <primary1 >@<realm>
66
+ auth_gss_authorized_principal_regex ^(<primary2 >)/(<instance >)@<realm>$
67
67
68
68
The remote user header in nginx can only be set by doing basic authentication.
69
69
Thus, this module sets a bogus basic auth header that will reach your backend
70
70
application in order to set this header/nginx variable. The easiest way to disable
71
71
this behavior is to add the following configuration to your location config.
72
72
73
73
proxy_set_header Authorization "";
74
-
74
+
75
75
A future version of the module may make this behavior an option, but this should
76
76
be a sufficient workaround for now.
77
77
0 commit comments