Help for Protection Setup

Use this form to define either an in-line or named protection setup.


Protection Setups

Protection setups control access to the directories or files being protected. When the server receives a request that matches a protected URL request template, the server activates protection. The server goes to the protection setup associated with the matching template to determine how to control access to the protected resources.

You can use two types of protection to control access to protected resources:

See the Up and Running book for details on these two types of protection.

To define a protection setup:

  1. If you want this protection setup to use user name and password protection, fill in the following fields:
  2. Select the Authorization type:
  3. Check the Allow ACL file to override masks check box if you want your Access Control Lists to override the Get, Put, Post, Delete, and All fields.
  4. Enter user names, group names, and address templates in the following fields. See the Up and Running book for complete details on the different ways you can specify user names, group names, and address templates in these fields. Separate multiple values in the same field with commas.
  5. Click on Apply to update your server with the changes you made to the form.

    Click on Reset if you want to return to the values that were on the form before you made changes.


Help Index | Glossary | Back to Form