@@ -691,7 +691,7 @@ include_dir <replaceable>directory</replaceable>
691
691
entire <literal>Distinguished Name (DN)</literal> of the certificate.
692
692
This option is probably best used in conjunction with a username map.
693
693
The comparison is done with the <literal>DN</literal> in
694
- <ulink url="https://tools .ietf.org/html/rfc2253">RFC 2253</ulink>
694
+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2253">RFC 2253</ulink>
695
695
format. To see the <literal>DN</literal> of a client certificate
696
696
in this format, do
697
697
<programlisting>
@@ -1090,7 +1090,7 @@ omicron bryanh guest1
1090
1090
<para>
1091
1091
<link linkend="auth-ident">Ident authentication</link>, which
1092
1092
relies on an <quote>Identification Protocol</quote>
1093
- (<ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>)
1093
+ (<ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>)
1094
1094
service on the client's machine. (On local Unix-socket connections,
1095
1095
this is treated as peer authentication.)
1096
1096
</para>
@@ -1229,7 +1229,7 @@ omicron bryanh guest1
1229
1229
<para>
1230
1230
The method <literal>scram-sha-256</literal> performs SCRAM-SHA-256
1231
1231
authentication, as described in
1232
- <ulink url="https://tools .ietf.org/html/rfc7677">RFC 7677</ulink>. It
1232
+ <ulink url="https://datatracker .ietf.org/doc /html/rfc7677">RFC 7677</ulink>. It
1233
1233
is a challenge-response scheme that prevents password sniffing on
1234
1234
untrusted connections and supports storing passwords on the server in a
1235
1235
cryptographically hashed form that is thought to be secure.
@@ -1336,7 +1336,7 @@ omicron bryanh guest1
1336
1336
<para>
1337
1337
<productname>GSSAPI</productname> is an industry-standard protocol
1338
1338
for secure authentication defined in
1339
- <ulink url="https://tools .ietf.org/html/rfc2743">RFC 2743</ulink>.
1339
+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2743">RFC 2743</ulink>.
1340
1340
<productname>PostgreSQL</productname>
1341
1341
supports <productname>GSSAPI</productname> for authentication,
1342
1342
communications encryption, or both.
@@ -1651,7 +1651,7 @@ omicron bryanh guest1
1651
1651
1652
1652
<para>
1653
1653
The <quote>Identification Protocol</quote> is described in
1654
- <ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>.
1654
+ <ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>.
1655
1655
Virtually every Unix-like
1656
1656
operating system ships with an ident server that listens on TCP
1657
1657
port 113 by default. The basic functionality of an ident server
@@ -1820,7 +1820,7 @@ omicron bryanh guest1
1820
1820
<para>
1821
1821
Set to 1 to make the connection between PostgreSQL and the LDAP server
1822
1822
use TLS encryption. This uses the <literal>StartTLS</literal>
1823
- operation per <ulink url="https://tools .ietf.org/html/rfc4513">RFC 4513</ulink>.
1823
+ operation per <ulink url="https://datatracker .ietf.org/doc /html/rfc4513">RFC 4513</ulink>.
1824
1824
See also the <literal>ldapscheme</literal> option for an alternative.
1825
1825
</para>
1826
1826
</listitem>
@@ -1915,7 +1915,7 @@ omicron bryanh guest1
1915
1915
<term><literal>ldapurl</literal></term>
1916
1916
<listitem>
1917
1917
<para>
1918
- An <ulink url="https://tools .ietf.org/html/rfc4516">RFC 4516</ulink>
1918
+ An <ulink url="https://datatracker .ietf.org/doc /html/rfc4516">RFC 4516</ulink>
1919
1919
LDAP URL. This is an alternative way to write some of the
1920
1920
other LDAP options in a more compact and standard form. The format is
1921
1921
<synopsis>
@@ -1978,7 +1978,7 @@ ldap[s]://<replaceable>host</replaceable>[:<replaceable>port</replaceable>]/<rep
1978
1978
<productname>OpenLDAP</productname> as the LDAP client library, the
1979
1979
<literal>ldapserver</literal> setting may be omitted. In that case, a
1980
1980
list of host names and ports is looked up via
1981
- <ulink url="https://tools .ietf.org/html/rfc2782">RFC 2782</ulink> DNS SRV records.
1981
+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2782">RFC 2782</ulink> DNS SRV records.
1982
1982
The name <literal>_ldap._tcp.DOMAIN</literal> is looked up, where
1983
1983
<literal>DOMAIN</literal> is extracted from <literal>ldapbasedn</literal>.
1984
1984
</para>