Skip to content

Commit a870a64

Browse files
authored
fix typo in Dhudson.plugins.active_directory.ActiveDirectorySecurityRealm.forceLdaps
1 parent 88b2d31 commit a870a64

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ For Windows:
107107

108108
5\. Follow section Securing access to Active Directory servers to enable LDAPS
109109

110-
Disaster recovery: In case that after all of this you cannot login anymore, you should enable the logging on the plugin to understand why it is failing. In case that after you enable the secured option you cannot login on the instance anymore, you might want to quickly fallback to the previous status specially on production environments. You can easily do this by going to $JENKINS\_HOME/config.xml and under the section \<securityRealm class="hudson.plugins.active\_directory ActiveDirectorySecurityRealm" revert the tlsConfiguration to the previous status. A restart is needed.
110+
Disaster recovery: In case that after all of this you cannot login anymore, you should enable the logging on the plugin to understand why it is failing. In case that after you enable the secured option you cannot login on the instance anymore, you might want to quickly fallback to the previous status specially on production environments. You can easily do this by going to $JENKINS\_HOME/config.xml and under the section \<securityRealm class="hudson.plugins.active.directory.ActiveDirectorySecurityRealm" revert the tlsConfiguration to the previous status. A restart is needed.
111111

112112
<tlsConfiguration>TRUST_ALL_CERTIFICATES</tlsConfiguration>
113113

@@ -157,12 +157,12 @@ To verify if the connection is upgraded or not, see [Logging](https://www.jenkin
157157

158158
On the other hand, if you wish on using LDAPS, you should set:
159159

160-
- System property `-Dhudson.plugins.active\_directory.ActiveDirectorySecurityRealm.forceLdaps=true` as a startup parameter to force Jenkins to start a connection with LDAPS. 
160+
- System property `-Dhudson.plugins.active_directory.ActiveDirectorySecurityRealm.forceLdaps=true` as a startup parameter to force Jenkins to start a connection with LDAPS. 
161161
- Use secured port is defined 636 or 3269
162162
(`your.hostname.com\[\|:636\|:3269\]`)
163163

164164
 Note that
165-
`-Dhudson.plugins.active\_directory.ActiveDirectorySecurityRealm.forceLdaps=true` skips the default LDAP + TLS upgrade.
165+
`-Dhudson.plugins.active_directory.ActiveDirectorySecurityRealm.forceLdaps=true` skips the default LDAP + TLS upgrade.
166166

167167
#### Override domain controllers
168168

@@ -247,4 +247,4 @@ See the [changelog](https://github.com/jenkinsci/active-directory-plugin/blob/ma
247247

248248
## Release Notes
249249

250-
See [Github Release](https://github.com/jenkinsci/active-directory-plugin/releases).
250+
See [Github Release](https://github.com/jenkinsci/active-directory-plugin/releases).

0 commit comments

Comments
 (0)