Novell NETWARE 6-DOCUMENTATION Manual page 2202

Table of Contents

Advertisement

Setting Access Control Actions
Specifying Users and Groups
Controlling Access to Your Server Using Local Database or LDAP Modes 273
You can specify the action the server takes when a request matches the access
control rule.
Allow: The users or computers can access the requested resource.
Deny: The users or computers cannot access the requested resource.
The server goes through the list of ACEs to determine the access. For
example, the first ACE is usually to deny everyone. If the first ACE is set to
continue, the server checks the second ACE in the list. (If Continue is not
checked, everyone would be denied access to the resource.) If the second entry
matches, then the next ACE is used. The server continues down the list until
it reaches either an ACE that doesn't match or that matches, but is set to not
continue. The last ACE that matches is used to determine if access is allowed
or denied. For example, any user in the database can view a file (read access),
but they must be in the Pubs group if they want to publish a file to the server.
You can restrict access to your Web site based on the user who requests a
resource. With user and group authentication, users are prompted to enter a
username and password before they can access the resource specified in the
access control rule.
The Web server uses a list of users, who might be sorted into groups, to
determine access rights for the user requesting a resource. The list of users
(and the groups they are included in) are stored either in a database on the Web
server computer or in an LDAP server, such as the Netscape Directory Server.
You should make sure the database has users and groups in it before you set
access control.
You can allow or deny access to everyone in the database, or you can allow or
deny specific people by using wildcard patterns or lists of users or groups.
To configure access control with users and groups, follow the general
directions for restricting access. When you click the Users/Groups column, a
form appears in the bottom frame. The following list describes the options in
the form:
Anyone (No Authentication): Anyone can access the resource without
having to enter a username or password. However, the user might be
denied access based on other settings, such as hostname or IP address.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Netware 6

Table of Contents