This document has the following sections:
A security realm contains users and/or groups plus their associated access control lists (ACL). The access control list for a user in a particular realm specifies the privileges that user is granted to access server resources. Resources include such things as files, directories, and servlets.
The Resources Protection page allows you to control user access to server resources by assigning the resource to an access control list. You can view, add, delete, or edit the access control list to which a server resource is assigned.
For each resource you want to protect, you can specify:
Note: Resources that clients access via the PUT or DELETE request
methods must be protected.
Settings
The Resources Protection page has the following five fields:
Realm
A realm is a database of users, groups, and access control lists.
It is used to specify which users have access to the resources of
a specific service (for example, the Web Page Service).
The Java Web Server uses the list of users in the database to identify the customers for the service. Users that are not included in the realm cannot be added to any access control list for the service. Users not on an access control list are generally denied the use of the service.
In some cases, a service does not require that its customers be in an access control list. For example, many web page (HTTP) services make their documents available to all users without requiring that they be registered in an ACL first.
Specific access control policies are applied to both users and groups in the database. For example, one user (or group) may be granted only GET permission to the service, and thus only be able to retrieve and read documents from it. Another user (or group), however, may be granted both GET and POST permissions, meaning that the user (or the members of the group) can add documents for display, as well as read them. Both users (or groups) are in the same realm, but the access control policies applied to them are different.
Note: Individual access control permissions take precedence over group settings. For example, if a user in a group has both GET and POST access, but the group has only GET access, the user is still able to do both GET and POST.
By assigning specific access settings to each user and each group, you can control precisely how the resources of a service are used, and by whom.
The Java Web Server has these security realms. They are:
getpwent()
routines. This realm lets the server use
HTTP "Basic" authentication with users' Unix passwords.
Resource
Lists the resources being protected. This can be a directory, such as a
the default document directory public_html
and specific files
within it, or a servlet directory and specific servlet.
Type
Defines the permissions that can be granted to the resource. There
are two types in the Java Web Server: File or Servlet.
Scheme
Defines the authentication method used, along with an Access
Control List, to protect the resource. There
are two kinds of schemes:
While digest authentication does not send a user's password over the network, the server must still know the user's password. The user and other servers (because users normally share passwords between servers) are at risk if the server is successfully attacked. Also, not many browsers currently support digest authentication.
If you don't assign an access control list to a server resource, Java Web Server applies the default access control.
ACL
Defines the name of the access control list used to protect the resource.
NOTE: Setting access control on the Admin servlet can cause you
to be locked out of the Java Web Server. If this happens, you can
recover by editing the properties file acl.properties
. For
more information, see the Java Web Server
Release Notes. In general, it is a good idea not to assign
access control to any core internal servlet. For more
information on internal servlets, see
Internal Servlets.
Procedures
To Protect a Resource
NOTE: Setting up authentication can get misleading if you protect similar resources and use a trailing slash (/) to differentiate between them. For example, when protecting a resource pathname, the Java Web Server considers the following examples to be two distinct resources:
/home/lcheng/myfile.html
/home/lcheng/myfile.html/
To Delete an Entry From The List:
To Edit an Entry:
Top java-server-feedback@java.sun.com |
Copyright © 1997
Sun Microsystems, Inc. All Rights Reserved. |