diff --git a/nginx-ldap-auth.conf b/nginx-ldap-auth.conf
index 50dcc100d337839574ed57330a0bc5f611a5cbff..ba6933315f210780c7ccbd01c2baff631ab589b1 100644
--- a/nginx-ldap-auth.conf
+++ b/nginx-ldap-auth.conf
@@ -78,10 +78,10 @@ http {
             proxy_set_header X-Ldap-URL      "ldap://example.com";
 
             # (Optional) Establish a TLS-enabled LDAP session after binding to the
-            # LDAP server.
+            # LDAP server. Set the value to "true: to enable.
             # This is the 'proper' way to establish encrypted TLS connections, see
             # http://www.openldap.org/faq/data/cache/185.html
-            #proxy_set_header X-Ldap-Starttls "true";
+            proxy_set_header X-Ldap-Starttls ""; # Optional, do not comment
 
             # (Required) Set the Base DN, by replacing the value enclosed in
             # double quotes.
@@ -96,30 +96,30 @@ http {
 
             # (Required) The following directives set the cookie name and pass
             # it, respectively. They are required for cookie-based
-            # authentication. Comment them out if using HTTP basic
-            # authentication.
+            # authentication. Set to empty value if using HTTP basic
+            # authentication (do not comment).
             proxy_set_header X-CookieName "nginxauth";
             proxy_set_header Cookie nginxauth=$cookie_nginxauth;
 
             # (Required if using Microsoft Active Directory as the LDAP server)
-            # Set the LDAP template by uncommenting the following directive.
-            #proxy_set_header X-Ldap-Template "(sAMAccountName=%(username)s)";
+            # Set the LDAP template with "(sAMAccountName=%(username)s)"
+            proxy_set_header X-Ldap-Template ""; # Optional, do not comment
 
-            # (May be required if using Microsoft Active Directory and
+            # (Set to "true"  if using Microsoft Active Directory and
             # getting "In order to perform this operation a successful bind
             # must be completed on the connection." errror)
-            #proxy_set_header X-Ldap-DisableReferrals "true";
-
-            # (Optional if using OpenLDAP as the LDAP server) Set the LDAP
-            # template by uncommenting the following directive and replacing
-            # '(cn=%(username)s)' which is the default set in
-            # nginx-ldap-auth-daemon.py.
-            #proxy_set_header X-Ldap-Template "(cn=%(username)s)";
-
-            # (Optional) Set the realm name, by uncommenting the following
-            # directive and replacing 'Restricted' which is the default set
-            # in nginx-ldap-auth-daemon.py.
-            #proxy_set_header X-Ldap-Realm    "Restricted";
+            proxy_set_header X-Ldap-DisableReferrals ""; # Optional, do not comment
+
+            # (Optional)
+            # Set to "(sAMAccountName=%(username)s)" if using Microsoft Active
+            # Directory as the LDAP server.
+            # Set to "(cn=%(username)s)" if using OpenLDAP as the LDAP server,
+            # which is the default set in nginx-ldap-auth-daemon.py.
+            proxy_set_header X-Ldap-Template ""; # Optional, do not comment
+
+            # (Optional) Set the realm name, e.g. "Restricred", which is the
+            # default set in nginx-ldap-auth-daemon.py.
+            proxy_set_header X-Ldap-Realm ""; # Optional, do not comment
         }
     }
 }