diff --git a/README.md b/README.md
index 42e6c49..8ae1568 100644
--- a/README.md
+++ b/README.md
@@ -66,7 +66,7 @@ For detailed instructions, see [Configuring the Reference Implementation](https:
   proxy_cache_path cache/ keys_zone=auth_cache:10m;
 
   upstream backend {
-    	server 127.0.0.1:9000;
+      server 127.0.0.1:9000;
   }
 
   server {
@@ -83,9 +83,6 @@ For detailed instructions, see [Configuring the Reference Implementation](https:
          # Base DN
          proxy_set_header X-Ldap-BaseDN "cn=Users,dc=test,dc=local";
 
-         # Bind DN
-         proxy_set_header X-Ldap-BindDN "cn=root,dc=test,dc=local";
-
          # Bind password
          proxy_set_header X-Ldap-BindPass "secret";
       }
diff --git a/nginx-ldap-auth.conf b/nginx-ldap-auth.conf
index e60ef8d..1199444 100644
--- a/nginx-ldap-auth.conf
+++ b/nginx-ldap-auth.conf
@@ -53,7 +53,7 @@ http {
             proxy_cache_key "$http_authorization$cookie_nginxauth";
 
             # As implemented in nginx-ldap-auth-daemon.py, the ldap-auth daemon
-            # communicates with an OpenLDAP server, passing in the following
+            # communicates with a LDAP server, passing in the following
             # parameters to specify which user account to authenticate. To
             # eliminate the need to modify the Python code, this file contains
             # 'proxy_set_header' directives that set the values of the
@@ -93,7 +93,7 @@ http {
 
             # (Required if using Microsoft Active Directory as the LDAP server)
             # Set the LDAP template by uncommenting the following directive.
-            #proxy_set_header X-Ldap-Template "(SAMAccountName=%(username)s)";
+            #proxy_set_header X-Ldap-Template "(sAMAccountName=%(username)s)";
 
             # (Optional if using OpenLDAP as the LDAP server) Set the LDAP
             # template by uncommenting the following directive and replacing