Partager via


Web Server Access Rights (Compact 2013)

3/26/2014

A webpage requires authentication when the authorization level set in A value in the registry in HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS\</Vroot Name> subkey is greater than zero (0). For more information, see Virtual Path Registry Settings.

To gain access to a webpage that requires authentication, use the following steps sequentially:

  1. The user must be authenticated for the given virtual path by using NTLM authentication or basic authentication. If this step fails, the user is denied access to the page.

  2. If NTLM authentication is used, the web server requests information regarding the groups in which the user has membership. If this step fails, the user is assumed to not have membership in any group.

  3. If 0<A<3 and the name of the authenticated user (or a group containing the user) is listed in the HKEY_LOCAL_MACHINE\COMM\HTTPD\AdminUsers registry key, the user is granted access to the page as an Administrator. For more information about the registry setting, see Base Registry Settings.

    Note

    Users that are members of this list have access to all virtual roots on the device, even if they have been explicitly denied access in the UserList registry value for a specific virtual root.

  4. If A=1 and the name of the authenticated user (or a group containing the user) is listed in the HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS\</Vroot Name>\UserList registry key, the user is granted access to the webpage. If the previous conditions fail, the user is denied access to the webpage.

    Note

    If no AdminUsers registry value is set, no one can gain access to pages with A>=2.

The Administrative group check is performed only when using NTLM authentication. The user name check is performed for both types of authentication.

The authentication registry keys support individual users and groups, in addition to the ability to exclude specific users and groups. For more information, see Web Server User Lists.

See Also

Concepts

Web Server Authentication and Permissions