diff options
| author | Russ Allbery <rra@stanford.edu> | 2013-03-27 20:34:08 -0700 | 
|---|---|---|
| committer | Russ Allbery <rra@stanford.edu> | 2013-03-27 20:34:40 -0700 | 
| commit | f31dca91d2ae2329e854251121553df0ee991bc0 (patch) | |
| tree | f1cf0267bcb0b663e721b0054a13a1f60340f611 | |
| parent | dd1ba6003880e7353e6a84924b7e9d572ff00c57 (diff) | |
Update the comment in README about supported ACL types
Change-Id: I171722d03bebc812bb113d1366457d75a94e468a
Reviewed-on: https://gerrit.stanford.edu/991
Reviewed-by: Russ Allbery <rra@stanford.edu>
Tested-by: Russ Allbery <rra@stanford.edu>
| -rw-r--r-- | README | 4 | 
1 files changed, 2 insertions, 2 deletions
| @@ -39,8 +39,8 @@ DESCRIPTION    ACL controls access to administrative actions.  An ACL consists of zero    or more entries, each of which is a generic scheme and identifier pair,    allowing the ACL system to be extended to use any existing authorization -  infrastructure.  Currently, the only ACL type supported matches a single -  Kerberos principal name, but this will be extended in future releases. +  infrastructure.  Supported ACL types include Kerberos principal names, +  regexes matching Kerberos principal names, and LDAP attribute checks.    Currently, the object types supported are simple files, Kerberos    keytabs, and WebAuth keyrings.  By default, whenever a Kerberos keytab | 
