|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
If is not on the NTFS Access Control List, Basic Authentication will be used. See "Security Tab" |
|
|
|
From the "Edit" button in Authentication Methods(above) next to Basic
Basic Authentication Domain Users logging on with the Basic authentication method must belong to a specific domain. A domain is a computer or a network of computers managed as a single administrative entity. When users attempt to log on without specifying a domain, you can configure you server to assume that the users belongs to a domain different from the default local domain. For example, if your server contains a Web site accessed exclusively by members of the Sales domain, but your server belongs to the Shipping domain, then you can configure that Web site’s Basic authentication default domain to be the Sales domain. If your Web server does not belong to a network(???), then the default local domain is the name of your computer. |
|
From the "Edit" button in Authentication Methods(above) next to Anonymous
|
To prevent unauthorized users from establishing a Web (HTTP) connection to restricted content, you can configure your Web server to identify, or authenticate, users. The authentication process involves determining whether a user has a valid Windows NT user account that has appropriate Windows NT File System (NTFS) permissions for accessing a particular Web site, directory, or file.
Typically, all users attempting to establish a Web (HTTP) connection with your Web server should log on as anonymous users. When a user establishes an anonymous connection, your server will log on the user with an anonymous or guest account, which is a valid Windows NT user account. This account has security restrictions that limit the type of Web content that anonymous users can access.
Set the Windows NT user account to use for all anonymous connections. This account has security restrictions, determined by your Windows NT Files System (NTFS) permissions, that limit the type of Web content anonymous users can access.
By default, your Web server creates and uses the account IUSR_computername. When you installed your Web server, Setup created the account IUSR_computername in Windows NT User Manager for Domains and in Internet Service Manager.
The IUSR_computername is granted Log on Locally user rights by default. This right is necessary if you want to grant anonymous logon access to your site. For more information, consult your Web server security documentation.
Select this check box to enable your Web server ‘s Basic authentication method, which is a widely used, industry standard method for identifying users.
Your Web server will only use Basic Authentication under the following conditions:
During the Basic authentication process, the user’s Web browser will prompt the user to enter a valid Windows NT account user name and password.
Basic authentication results in the transmission of passwords across the network in an unencrypted form. A determined computer vandal equipped with a network monitoring tool could intercept user names and passwords.
Users attempting to establish a connection through Basic authentication must provide their logon domain in addition to their user name. By clicking this button you configure your Web server to assume a default logon domain, other than the local domain, for users who do not explicitly provide their domain name.
When this check box is selected, you enable your Web server’s Windows NT Challenge/Response authentication methods. Microsoft Internet Explorer, version 2.0 or later, is the only Web browser that currently supports this authentication method.
Once enabled, your Web server will only use Windows NT Challenge/Response authentication under the following conditions:
During the Windows NT Challenge/Response authentication process, your Web server engages in a cryptographic information exchange with the user’s Internet Explorer Web browser. The user’s Web browser does not send actual Windows NT account password information across the network.
Allow Anonymous Access
Basic Authentication
· Anonymous access disabled.
· Anonymous access denied because Windows NT permission have been set, requiring the users to provide a Windows NT user name and password before establishing a connection with restricted content.
Warning
Edit
Windows NT Challenge/Response
· Anonymous access disabled.
· Anonymous access denied because Windows NT permission have been set, requiring the users to provide a Windows NT user name and password before establishing a connection with restricted content.