.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_cfg_authorizationtype_set" 3 "1.0.3" "shishi" "shishi" .SH NAME shishi_cfg_authorizationtype_set \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_cfg_authorizationtype_set(Shishi * " handle ", char * " value ");" .SH ARGUMENTS .IP "Shishi * handle" 12 Shishi library handle created by \fBshishi_init()\fP. .IP "char * value" 12 String listing acceptable authorization types. .SH "DESCRIPTION" Sets the configuration option "authorization\-types" from \fIvalue\fP. The string contains authorization types, integers or names, separated by comma or whitespace. As an example, "k5login basic" would first check Kerberos5 authentication based on preset principals, and then fall back to the basic test of identical principal names. .SH "RETURN VALUE" Returns \fBSHISHI_OK\fP if successful, and \fBSHISHI_INVALID_ARGUMENT\fP otherwise. .SH "REPORTING BUGS" Report bugs to . GNU Shishi home page: http://www.gnu.org/software/shishi/ General help using GNU software: http://www.gnu.org/gethelp/ .SH COPYRIGHT Copyright \(co 2002-2022 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.