Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4
ELF>@0c@8@l[l[ [[ [  ]] ] $$PtdXXXttQtdRtd[[ [ hhGNU$_(CrZ 7$*%>,*6"&+5 $#179<.2=0)8-4:  '% ; /(!38 0@ 8:=|CEdLqX &*X + jR k]1Td"x$P]Dl3zIAb (b ?a h(b   H>__gmon_start___init_fini__cxa_finalize_Jv_RegisterClassesauthnz_ldap_modulestrcasecmpapr_array_pushapr_pstrdupapr_ldap_url_parsestrlenapr_pallocstrcpymemsetstrncasecmpgetpidap_log_errorap_register_providerap_hook_post_configap_hook_auth_checkerap_hook_optional_fn_retrieveapr_hash_getapr_table_getapr_xlate_openapr_snprintfstrchrapr_xlate_conv_bufferap_log_rerrorldap_err2stringapr_pstrcat__ctype_toupper_locapr_table_setnstrcmp__stack_chk_failapr_dynamic_fn_retrieveap_requiresap_getword_whiteapr_pool_cleanup_nullapr_pool_cleanup_registerap_getword_confapr_thread_mutex_lockapr_thread_mutex_unlockap_getwordap_note_basic_auth_failureap_find_linked_moduleap_server_root_relativeap_pcfg_openfileap_cfg_closefileapr_hash_makeap_cfg_getlineap_str_tolowerapr_hash_setapr_thread_mutex_createapr_array_makeap_set_string_slotap_set_flag_slotlibldap_r-2.4.so.2liblber-2.4.so.2libpthread.so.0libc.so.6_edata__bss_start_endmod_authnz_ldap.soOPENLDAP_2.4_2GLIBC_2.4GLIBC_2.3GLIBC_2.2.5| ii ii ui [ $[ @[ .@[  \ N\ :@(\ S0\ I@P\ `SX\ ^@x\ S\ x@\ T\ @\ T\ @\ XU\ @] U ] @(] @] VH] @h] 8Wp] Ax] ] X] )A] ] Xa a a xBa <b [ b p!\ 8\ \ `\  \  \  ]  P]  _ _  _ _ _ :` ` ` `  ` (`  0`  8`  @` H` P` X` `` h` p` x` ` ` ` ` ` ` ` ` ` `  ` !` "` #` $` %` &a 'a (a )a * a +(a ,0a -8a .@a /Ha 0Pa 1Xa 2`a 3ha 4pa 5xa 6a 7H7]&H52H %4H @%2H h%*H h%"H h%H h%H h% H h%H h%G hp%G h`%G h P%G h @%G h 0%G h %G h %G h%G h%G h%G h%G h%G h%G h%G h%G h%zG hp%rG h`%jG hP%bG h@%ZG h0%RG h %JG h%BG h%:G h%2G h %*G h!%"G h"%G h#%G h$% G h%%G h&%F h'p%F h(`%F h)P%F h*@%F h+0%F h, %F h-%F h.%F h/%F h0HHD HtHÐU= G HATSubH=D t H=F H@ L%t@ HF L)HHH9s DHHF AHF H9rF [A\fUH=/@ HtH+D HtH=@ @ÐHF 1Hffffff.H D HGHHcIH@PH1fDUH=`"HSHHHtqH5H"H t^H=9" HtkH=0"HthH=%"Ht5H5"HH$tH[]fCXH1[]CXH1[]CX1DCX1DH\$Hl$HH(HH$ ~H\$Hl$ H(@HT$FHT$H{8HH2HE1fAWAVAUIATIUHSHLHH8HL$pHT$xt!HD$pHHĈ[]A\A]A^A_H}8LH{ HCH.IHD$xHxH}8ItIHD$xLHpkLfA Hs LHT$xLs Hr H HtH}8>HT$xHC0HB(HH8HxAt@HHHHuDrMcIH}8L!1LHdHC@IHD$xHP(H2HtLAHD$hL{@Lt$hIH}8HT$hIHD$xHP(J42IVHuL{@IHS8H1z0Hr8HCHB>(H}88HCPMtkH=zL H=LH=VLt H=>LH>"ǃH5L@HD$xǃ|PDщS(HL%ǃHp8HLDP0t HtHHHDHP(L5HtL2HH PLxHt$XT$PHL$`2Ht$XHL$`L !T$PLEHH="$1Ld$@Ht$8HL$ T$1ɺH\$0Lt$(L|$Ll$1fDHT$xHHrHtH}8zHT$xHC @HHC8H}8HKIHCPHADfHD$xPDщS(fDHEHSPǃ%ǃLI: H cH^H5\HH= 11H: H=H 1H= 11H[H\$HHl$HHHH5tH=1@ HHHtHHH\$Hl$H@CH=? HHvHu1H\$Hl$HAWAVIAUMATUHSHH8HpH}HMIH}LIH=v? HH5#}HH}HXt:;,Hu;,@HuH}HHt&HMH5> H|$HnfDME8H LH1L H4A4$H,@tTI9wM@Dt
  • Host is the name of the LDAP server. Use a space separated list of hosts to specify redundant servers.
  • Port is optional, and specifies the port to connect to.
  • basedn specifies the base DN to start searches from
  • Attrib specifies what attribute to search for in the directory. If not provided, it defaults to uid.
  • Scope is the scope of the search, and can be either sub or one. If not provided, the default is sub.
  • Filter is a filter to use in the search. If not provided, defaults to (objectClass=*). Searches are performed using the attribute and the filter combined. For example, assume that the LDAP URL is ldap://ldap.airius.com/ou=People, o=Airius?uid?sub?(posixid=*). Searches will be done using the filter (&((posixid=*))(uid=username)), where username is the user name passed by the HTTP client. The search will be a subtree search on the branch ou=People, o=Airius.DN to use to bind to LDAP server. If not provided, will do an anonymous bind.Password to use to bind to LDAP server. If not provided, will do an anonymous bind.Set to 'on' to return failures when user-specific bind fails - defaults to on.Set to 'on' to set the REMOTE_USER environment variable to be the full DN of the remote user. By default, this is set to off, meaning that the REMOTE_USER variable will contain whatever value the remote user sent.Override the user supplied username and place the contents of this attribute in the REMOTE_USER environment variable.Set to 'off' to allow access control to be passed along to lower modules if the UserID and/or group is not known to this moduleSet to 'on' to force auth_ldap to do DN compares (for the "require dn" directive) using the server, and set it 'off' to do the compares locally (at the expense of possible false matches). See the documentation for a complete description of this option.A list of attributes used to define group membership - defaults to member and uniquememberIf set to 'on', auth_ldap uses the DN that is retrieved from the server forsubsequent group comparisons. If set to 'off', auth_ldap uses the stringprovided by the client directly. Defaults to 'on'.Determines how aliases are handled during a search. Can bo one of thevalues "never", "searching", "finding", or "always". Defaults to always.Character set conversion configuration file. If omitted, character setconversion is disabled.;t 08Pp00XzRx (D40L8AOACG l^MD04(OBBB CB(CA0CA8CJ@m`HI F4hBBCB CB(A0CA8CDp44@BBCG CB(A0CA8GAlK4BCBB B(A0CA8GA@$MMQ@p`RAHAD $@.@ N:@`SI@h`S^@pSx@tT@xT@XU@U@V@8WAX)AX|  H>o   _  o(oo o#] .>N^n~.>N^n~.>N^n~a 1xB22PA<[ p!mod_authnz_ldap.soȰu.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.data.rel.ro.dynamic.got.got.plt.data.bss.gnu_debuglink $"o<( 0 8o |Eo((`T^ hc nh#tH>H>z2X>X>XXthYhY[ [[ [[ [[ [( ] ]_ _(_ _a a (b (bX(b@b