From 69652b89bc62b74c7187f33e5cf58fda25470656 Mon Sep 17 00:00:00 2001 From: Manuel Rego Casasnovas Date: Thu, 14 Jun 2012 11:04:14 +0200 Subject: [PATCH] doc: Fix problem in PDF generation for user help Too many levels of headers for the PDF. FEA: ItEr76S04BugFixing --- doc/src/user/en/16-ldap-authentication.rst | 6 ++---- doc/src/user/es/16-ldap-authentication.rst | 6 ++---- doc/src/user/gl/16-ldap-authentication.rst | 6 ++---- 3 files changed, 6 insertions(+), 12 deletions(-) diff --git a/doc/src/user/en/16-ldap-authentication.rst b/doc/src/user/en/16-ldap-authentication.rst index 7e7810873..97d42d43c 100644 --- a/doc/src/user/en/16-ldap-authentication.rst +++ b/doc/src/user/en/16-ldap-authentication.rst @@ -135,8 +135,7 @@ The next example represents a valid LDAP structure to use property strategy. |- uid=worker2 |- uid=worker3 -With attribute -.............. +**With attribute** In this case, each user will have attribute, for example called ``group`` with the name of the group to which it belongs: @@ -186,8 +185,7 @@ And for example if you want to match some roles: * All projects edition allowed: ``admins`` * Project creation allowed: ``workers`` -By user identifier -.................. +**By user identifier** You can even have a workaround to specify LibrePlan roles directly to users, without having an attribute in each LDAP user. diff --git a/doc/src/user/es/16-ldap-authentication.rst b/doc/src/user/es/16-ldap-authentication.rst index 72630dace..625ccc233 100644 --- a/doc/src/user/es/16-ldap-authentication.rst +++ b/doc/src/user/es/16-ldap-authentication.rst @@ -139,8 +139,7 @@ estrategia de propiedad. |- uid=worker2 |- uid=worker3 -Con atributo -............ +**Con atributo** En este caso, cada usuario tendrá un atributo, por ejemplo llamado ``group``` con el nombre del grupo al que pertenece: @@ -190,8 +189,7 @@ Y por ejemplo si quiere hacer alguna correspondencia de roles: * All projects edition allowed: ``admins`` * Project creation allowed: ``workers`` -Por identificador de usuario -............................ +**Por identificador de usuario** Incluso puede tener una solución para especificar los roles de LibrePlan directamente a los usuarios, sin tener un atributo en cada usuario de LDAP. diff --git a/doc/src/user/gl/16-ldap-authentication.rst b/doc/src/user/gl/16-ldap-authentication.rst index d69af0b6b..d1a5c4b77 100644 --- a/doc/src/user/gl/16-ldap-authentication.rst +++ b/doc/src/user/gl/16-ldap-authentication.rst @@ -139,8 +139,7 @@ estratexia de propiedade. |- uid=worker2 |- uid=worker3 -Con atributo -............ +**Con atributo** Neste caso, cada usuario tenrá un atributo, por exemplo chamado ``group``` co nome do grupo ao que pertence: @@ -190,8 +189,7 @@ E por exemplo se quere facer algunha correspondencia de roles: * All projects edition allowed: ``admins`` * Project creation allowed: ``workers`` -Por identificador de usuario -............................ +**Por identificador de usuario** Incluso pode ter unha solución para especificar os roles de LibrePlan directamente aos usuarios, sen ter un atributo en cada usuario de LDAP.