# $Id: example.target-auth,v 1.1 2006-01-18 10:28:39 mike Exp $
#
# Sample user-to-target mapping for YP2's target authorisation. Each
# non-blank line either begins with a hash (in which case it is a
# comment, and is ignored) or is a mapping entry. Each entry consists
# of two colon-separated fields: a username and a comma-separated list
# of the targets that user is allowed to access. Note that these are
# not Z39.50 database names (those can be specified in the main
# user-register) but the tokens specified as blah
# within a Virtual DB filter in the YP2 configuration file.
#
# This file is accessed by an Auth-Simple filter containing a
# element whose content is the filename.
mike:zurg:9901/bdsbkm21,zurg:9902/blconm21
adam:zurg:9902/blconm21,zurg:9903/lcbkm21
rob:zurg:9901/bdsbkm21,zurg:9902/blconm21,zurg:9903/lcbkm21,zurg:9904/radmarc