typos and added explanations

This commit is contained in:
Marc Delisle
2008-09-06 23:17:17 +00:00
parent 930ee57a1c
commit 4046fb0c27

View File

@@ -1,8 +1,8 @@
# This is a typical file used to enable Swekey hardware authentication.
#
# To activate the Swekey authentication add the following line in your config.inc.php file.
# To activate the Swekey authentication add the following line to your config.inc.php file.
# $cfg['Servers'][$i]['auth_swekey_config'] = '/etc/swekey-pma.conf';
# Then rename this file "swekey-pma.conf" and copy it in the /etc directory.
# Then rename this file "swekey-pma.conf" and copy it to the /etc directory.
# Add all the Swekey ids you want to grant access to in the file.
# After each Swekey id put the corresponding user.
#
@@ -18,27 +18,27 @@
0000000000000000000000000000231E:scott
#
# Include following lines if you want to use authentication servers in ssl mode.
# Authentication is slower but more secure.
#
# It is recommended to include the following lines to contact the
# authentication servers in SSL mode.
SERVER_CHECK=https://auth-check-ssl.musbe.net
SERVER_RNDTOKEN=https://auth-rnd-gen-ssl.musbe.net
SERVER_STATUS=https://auth-status-ssl.musbe.net
#
# In case of you want to use https servers you can set the path of the root certificate file
# The path of the root certificate file used to ensure a secure
# communication with the authentication servers in SSL mode.
# If not specified, will use musbe-ca.crt found in your
# phpMyAdmin/libraries/auth/swekey.
#
#CA_FILE=/var/http-root/phpmyadmin/libraries/auth/swekey/musbe-ca.crt
#
# If your sever receive lot of login requests, you can enable the random token caching to
# accelerate the authentication process.
# This is disabled by default because the cache file having full public access is vulnerable to
# a deny of service attack.
# If your server receives many login requests, you can enable the random
# token caching to accelerate the authentication process.
# This is disabled by default because a cache file with full public access
# is vulnerable to a denial of service attack.
# You can enable it when your server is running in a secure environment.
#