From 55ad39d86361edf51a5cd72b2707cd5bbd106cc4 Mon Sep 17 00:00:00 2001
From: Olav Morken <olav.morken@uninett.no>
Date: Tue, 20 Oct 2009 12:12:00 +0000
Subject: [PATCH] config-templates/authsources.php: Comment out most examples.

git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@1886 44740490-163a-0410-bde0-09ae8108e29a
---
 config-templates/authsources.php | 237 +++++++++++++------------------
 1 file changed, 101 insertions(+), 136 deletions(-)

diff --git a/config-templates/authsources.php b/config-templates/authsources.php
index 716ba0039..68ccd64e1 100644
--- a/config-templates/authsources.php
+++ b/config-templates/authsources.php
@@ -2,45 +2,35 @@
 
 $config = array(
 
-	/*
-	 * This is a authentication source which handles admin authentication.
-	 */
+	// This is a authentication source which handles admin authentication.
 	'admin' => array(
-		/*
-		 * The default is to use core:AdminPassword, but it can be replaced with
-		 * any authentication source.
-		 */
+		// The default is to use core:AdminPassword, but it can be replaced with
+		// any authentication source.
+
 		'core:AdminPassword',
 	),
 
 
-	/*
-	 * An authentication source which can authenticate against both SAML 2.0
-	 * and Shibboleth 1.3 IdPs.
-	 */
+	// An authentication source which can authenticate against both SAML 2.0
+	// and Shibboleth 1.3 IdPs.
 	'default-sp' => array(
 		'saml:SP',
 
-		/*
-		 * The entity ID of this SP.
-		 * Can be NULL/unset, in which case an entity ID is generated based on the metadata URL.
-		 */
+		// The entity ID of this SP.
+		// Can be NULL/unset, in which case an entity ID is generated based on the metadata URL.
 		'entityID' => NULL,
 
-		/*
-		 * The entity ID of the IdP this should SP should contact.
-		 * Can be NULL/unset, in which case the user will be shown a list of available IdPs.
-		 */
+		// The entity ID of the IdP this should SP should contact.
+		// Can be NULL/unset, in which case the user will be shown a list of available IdPs.
 		'idp' => NULL,
 
-		/*
-		 * The URL to the discovery service.
-		 * Can be NULL/unset, in which case a builtin discovery service will be used.
-		 */
+		// The URL to the discovery service.
+		// Can be NULL/unset, in which case a builtin discovery service will be used.
 		'discoURL' => NULL,
 	),
 
 
+	/*
 	'example-sql' => array(
 		'sqlauth:SQL',
 		'dsn' => 'pgsql:host=sql.example.org;port=5432;dbname=simplesaml',
@@ -48,19 +38,18 @@ $config = array(
 		'password' => 'secretpassword',
 		'query' => 'SELECT "username", "name", "email" FROM "users" WHERE "username" = :username AND "password" = :password',
 	),
+	*/
 
+	/*
 	'example-static' => array(
 		'exampleauth:Static',
 		'uid' => array('testuser'),
 		'eduPersonAffiliation' => array('member', 'employee'),
 		'cn' => array('Test User'),
 	),
-	
-	// Requires you to enable the OpenID module.
-	'openid' => array(
-		'openid:OpenIDConsumer',
-	),
+	*/
 
+	/*
 	'example-userpass' => array(
 		'exampleauth:UserPass',
 		'student:studentpass' => array(
@@ -72,179 +61,156 @@ $config = array(
 			'eduPersonAffiliation' => array('member', 'employee'),
 		),
 	),
-	
+	*/
+
+	/*
 	'yubikey' => array(
 		'authYubiKey:YubiKey',
  		'id' => '000',
-// 		'key' => '012345678',
+		// 'key' => '012345678',
 	),
-	
+	*/
+
+	/*
 	'openid' => array(
 		'openid:OpenIDConsumer',
 		'attributes.required' => array('nickname'),
 		'attributes.optional' => array('fullname', 'email',),
 	),
+	*/
 
-	'feide' => array(
-		'feide:Feide',
-	),
-	
+	/*
 	'papi' => array(
 		'authpapi:PAPI',
 	),
+	*/
 
 
-
-
+	/*
 	'facebook' => array(
 		'authfacebook:Facebook',
 		'api_key' => 'xxxxxxxxxxxxxxxx',
 		'secret' => 'xxxxxxxxxxxxxxxx',
 	),
+	*/
 
-	/* Twitter OAuth Authentication API.
-	 * Register your application to get an API key here:
-	 *  http://twitter.com/oauth_clients
-	 */
+	/*
+	// Twitter OAuth Authentication API.
+	// Register your application to get an API key here:
+	//  http://twitter.com/oauth_clients
 	'twitter' => array(
 		'authtwitter:Twitter',
 		'key' => 'xxxxxxxxxxxxxxxx',
 		'secret' => 'xxxxxxxxxxxxxxxx',
 	),
-        
-	/* Example of a LDAP authentication source. */
+	*/
+
+	/*
+	// Example of a LDAP authentication source.
 	'example-ldap' => array(
 		'ldap:LDAP',
 
-		/* The hostname of the LDAP server. */
+		// The hostname of the LDAP server.
 		'hostname' => 'ldap.example.org',
 
-		/* Whether SSL/TLS should be used when contacting the LDAP server. */
+		// Whether SSL/TLS should be used when contacting the LDAP server.
 		'enable_tls' => FALSE,
 
-		/*
-		 * Whether debug output from the LDAP library should be enabled.
-		 * Default is FALSE.
-		 */
+		// Whether debug output from the LDAP library should be enabled.
+		// Default is FALSE.
 		'debug' => FALSE,
 
-		/*
-		 * The timeout for accessing the LDAP server, in seconds.
-		 * The default is 0, which means no timeout.
-		 */
+		// The timeout for accessing the LDAP server, in seconds.
+		// The default is 0, which means no timeout.
 		'timeout' => 0,
 
-		/*
-		 * Which attributes should be retrieved from the LDAP server.
-		 * This can be an array of attribute names, or NULL, in which case
-		 * all attributes are fetched.
-		 */
+		// Which attributes should be retrieved from the LDAP server.
+		// This can be an array of attribute names, or NULL, in which case
+		// all attributes are fetched.
 		'attributes' => NULL,
 
-		/*
-		 * The pattern which should be used to create the users DN given the username.
-		 * %username% in this pattern will be replaced with the users username.
-		 *
-		 * This option is not used if the search.enable option is set to TRUE.
-		 */
+		// The pattern which should be used to create the users DN given the username.
+		// %username% in this pattern will be replaced with the users username.
+		//
+		// This option is not used if the search.enable option is set to TRUE.
 		'dnpattern' => 'uid=%username%,ou=people,dc=example,dc=org',
 
-		/*
-		 * As an alternative to specifying a pattern for the users DN, it is possible to
-		 * search for the username in a set of attributes. This is enabled by this option.
-		 */
+		// As an alternative to specifying a pattern for the users DN, it is possible to
+		// search for the username in a set of attributes. This is enabled by this option.
 		'search.enable' => FALSE,
 
-		/*
-		 * The DN which will be used as a base for the search.
-		 * This can be a single string, in which case only that DN is searched, or an
-		 * array of strings, in which case they will be searched in the order given.
-		 */
+		// The DN which will be used as a base for the search.
+		// This can be a single string, in which case only that DN is searched, or an
+		// array of strings, in which case they will be searched in the order given.
 		'search.base' => 'ou=people,dc=example,dc=org',
 
-		/*
-		 * The attribute(s) the username should match against.
-		 *
-		 * This is an array with one or more attribute names. Any of the attributes in
-		 * the array may match the value the username.
-		 */
+		// The attribute(s) the username should match against.
+		//
+		// This is an array with one or more attribute names. Any of the attributes in
+		// the array may match the value the username.
 		'search.attributes' => array('uid', 'mail'),
 
-		/*
-		 * The username & password the simpleSAMLphp should bind to before searching. If
-		 * this is left as NULL, no bind will be performed before searching.
-		 */
+		// The username & password the simpleSAMLphp should bind to before searching. If
+		// this is left as NULL, no bind will be performed before searching.
 		'search.username' => NULL,
 		'search.password' => NULL,
 
-		/*
-		 * If the directory uses privilege separation,
-		 * the authenticated user may not be able to retrieve
-		 * all required attribures, a privileged entity is required
-		 * to get them. This is enabled with this option.
-		 */
+		// If the directory uses privilege separation,
+		// the authenticated user may not be able to retrieve
+		// all required attribures, a privileged entity is required
+		// to get them. This is enabled with this option.
 		'priv.read' => FALSE,
 
-		/*
-		 * The DN & password the simpleSAMLphp should bind to before
-		 * retrieving attributes. These options are required if
-		 * 'priv.read' is set to TRUE.
-		 */
+		// The DN & password the simpleSAMLphp should bind to before
+		// retrieving attributes. These options are required if
+		// 'priv.read' is set to TRUE.
 		'priv.username' => NULL,
 		'priv.password' => NULL,
 
 	),
+	*/
 
-	/* Example of an LDAPMulti authentication source. */
+	/*
+	// Example of an LDAPMulti authentication source.
 	'example-ldapmulti' => array(
 		'ldap:LDAPMulti',
 
-		/*
-		 * The way the organization as part of the username should be handled.
-		 * Three possible values:
-		 * - 'none':   No handling of the organization. Allows '@' to be part
-		 *             of the username.
-		 * - 'allow':  Will allow users to type 'username@organization'.
-		 * - 'force':  Force users to type 'username@organization'. The dropdown
-		 *             list will be hidden.
-		 *
-		 * The default is 'none'.
-		 */
+		// The way the organization as part of the username should be handled.
+		// Three possible values:
+		// - 'none':   No handling of the organization. Allows '@' to be part
+		//             of the username.
+		// - 'allow':  Will allow users to type 'username@organization'.
+		// - 'force':  Force users to type 'username@organization'. The dropdown
+		//             list will be hidden.
+		//
+		// The default is 'none'.
 		'username_organization_method' => 'none',
 
-		/*
-		 * Whether the organization should be included as part of the username
-		 * when authenticating. If this is set to TRUE, the username will be on
-		 * the form <username>@<organization identifier>. If this is FALSE, the
-		 * username will be used as the user enters it.
-		 *
-		 * The default is FALSE.
-		 */
+		// Whether the organization should be included as part of the username
+		// when authenticating. If this is set to TRUE, the username will be on
+		// the form <username>@<organization identifier>. If this is FALSE, the
+		// username will be used as the user enters it.
+		//
+		// The default is FALSE.
 		'include_organization_in_username' => FALSE,
 
-		/*
-		 * A list of available LDAP servers.
-		 *
-		 * The index is an identifier for the organization/group. When
-		 * 'username_organization_method' is set to something other than 'none',
-		 * the organization-part of the username is matched against the index.
-		 *
-		 * The value of each element is an array in the same format as an LDAP
-		 * authentication source.
-		 */
+		// A list of available LDAP servers.
+		//
+		// The index is an identifier for the organization/group. When
+		// 'username_organization_method' is set to something other than 'none',
+		// the organization-part of the username is matched against the index.
+		//
+		// The value of each element is an array in the same format as an LDAP
+		// authentication source.
 		'employees' => array(
-			/*
-			 * A short name/description for this group. Will be shown in a dropdown list
-			 * when the user logs on.
-			 *
-			 * This option can be a string or an array with language => text mappings.
-			 */
+			// A short name/description for this group. Will be shown in a dropdown list
+			// when the user logs on.
+			//
+			// This option can be a string or an array with language => text mappings.
 			'description' => 'Employees',
 
-			/*
-			 * The rest of the options are the same as those available for
-			 * the LDAP authentication source.
-			 */
+			// The rest of the options are the same as those available for
+			// the LDAP authentication source.
 			'hostname' => 'ldap.employees.example.org',
 			'dnpattern' => 'uid=%username%,ou=employees,dc=example,dc=org',
 		),
@@ -257,7 +223,6 @@ $config = array(
 		),
 
 	),
+	*/
 
 );
-
-?>
\ No newline at end of file
-- 
GitLab