IISKeeper manual
Keyword Index
Home page




© 2005-2011 Metamatica.com

Protected Resources

Top  Previous  Next

 

The list of protected resources (folders and separate files). Protected resources are local folders or files stored on the server.

If you protect a folder, it means that you protect all subfolders and files stored in them.

 

clip0007

This tab is divided into three parts. The upper part contains the list of protected resources. The lower part contains two lists:

 

User Rights

The list of users that are granted access to the resource.

 

Available users

The list of the rest of users.

 

Also you may grant access to resourve via Groups, like at picture below:

clip0014

Granted Groups for Resource

The list of groups that are granted access to the resource.

 

Available Groups

The list of the rest of groups.

 

Note: You can use user groups to specify rights for accessing a resource. But there is one limitation: If you need to limit the traffic or access time for a resource, you must specify the user rights explicitly. It is due to the fact that the traffic and access time for a resource are counted individually for each user. That is, if you specify an access right for a resource via a group, it is the same as if you permitted access without traffic and time limitations for the user.

 

Protected resource

A protected resource has the following properties that you can change while adding a new resource or editing an existing one:

 

clip0008 clip0009

 

Local folder or file

Tthe full path to the folder or the separate file. You can select the object to be protected using the dialog box by clicking the corresponding button to the right of the field. This field must be unique within the list of protected resources.

 

Protect mode

Authentication mode. You can select either of two variants: Cookie or Basic. In case of Basic authentication, the client browser uses a built-in dialog box for entering authentication data. In case of Cookie authentication, IISKeeper redirects the request to the login web form.

 

The rest of fields depend on the selected authentication mode.

 

Basic authentication

 

Use internal message

You can use this field to specify the complete HTML code of the error message. By default, the message contains the string "Access denied" in large red font.

 

Message from file

You can specify the HTML file you want to use as the error message. Make sure you check the access rights for this file because "Internet Guest account" must have rights to reads this file.

 

Cookie authentication

 

Cookie login form URL

Specify the URL of the login web form.

 

Granted users

The list of users who have access to the protected resource. You can use either the Drag-And-Drop method or the "Add user" and "Remove user" buttons to add a user to the list or remove a user from it. Users are added from the list of available users. By default, each user is granted access to the resource without any time or traffic limits. You can specify limits while editing the selected user's rights for the current resource.

 

clip0010

 

Time Limit

You can enable a time limit and specify the date after which the user will have no access to the resource.

 

Traffic Limit

You can enable a traffic limit and add additional traffic for the user in megabytes. You can also see the current amount of traffic available for the user.

 

Available users

 

The rest of users that have no access to the selected resource. To add a user to the system, use the "Users" tab.