Sponsored Content
Top Forums Web Development You don't have permission to access / on this server. Post 302318433 by aneuryzma on Thursday 21st of May 2009 01:45:29 PM
Old 05-21-2009
this is the line in my config file:

Options Indexes FollowSymLinks MultiViews
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

permission access

i did a search before posting i want to know how to change the permission access for a file / directory. i cant find it in my UNIX book thanks a lot edit: i also need to know what chmod option will allow you to change the permissoin access for a directory and all files and... (2 Replies)
Discussion started by: Combat Form
2 Replies

2. Shell Programming and Scripting

access permission

hi, I have an account (i.e. abc) which is set up to sftp files from server A to server B; on server B, I have an account (i.e. def) which I use to perform various operation which include invoke certain scripts to execute my java programs. These programs use the files received from server... (2 Replies)
Discussion started by: mpang_
2 Replies

3. UNIX for Dummies Questions & Answers

Will i see a file/dir I don't have read access to

Hi all, if I have a dir with a mixture of files and directories in it and one of the directories *only* has read permission for the owner and I am not the owner - will I see it with an 'ls -la'. I do not have access to a unix box at present to try this out. Any thoughts gratefully received (1 Reply)
Discussion started by: ajcannon
1 Replies

4. Solaris

Solaris 10 / NetApp volumes - Forbidden: You don't have permission to access...

Hi all We have a couple of solaris zones running a jboss app in a cluster. Each zone has a shared netapp volume mounted to /app/xxx with everything under that subdir apart from jboss which is local to each zone in /app/jboss-3.2.5 There is a symlink in /app/xxx/jboss-3.2.5 which points to... (0 Replies)
Discussion started by: skewbie
0 Replies

5. Red Hat

httpd : You don't have permission

i have httpd installed on RHEL5 webserver but i have linked #ln -s /rhelREPO /var/www/html/rhel5 /rhelREPO contains all 5cds of RHEL and it is a mount of /dev/sdb1 ip: 192.168.1.133 :works /var/www/html/index.html content is in browser ip: 192.168.1.133/rhel5 :does not work... (1 Reply)
Discussion started by: dplinux
1 Replies

6. UNIX for Advanced & Expert Users

about the access permission of users home directory

RHEL5.0 As we know, when root create a new user, a new home directory will be created : /home/user I want to know what determine the access permission of /home/user . Thanks! (1 Reply)
Discussion started by: cqlouis
1 Replies

7. Solaris

setfacl don't change permission on group owner

I try to use setfacl command to change the permission of the group primary it does not accept the command , it really accept but don't change the permission on the group. the point here I read that if I use chmod command on group primary the mask changed, but if I use setfacl mask should not... (0 Replies)
Discussion started by: hard_revenge
0 Replies

8. UNIX for Dummies Questions & Answers

Change unix permission when I don't own the file

Hi, A file is transferred from a Windows server(say username : user1) to Unix server via ftp. In unix, the permission of the file for a user, say user2 will be "-rw-r-----". Since the user1 is the owner of the file, user2 is not able to change the file permission using chmod. Is there... (5 Replies)
Discussion started by: merin
5 Replies

9. Red Hat

User permission access

Hi folks, I am trying to grant the access like below items using the setfacl command, but i couldn't achieve as what I required. any other possibility. username : testing Readonly access in /form_dl/system/prd/logs Write only access in /form_dl/system/prd/deploy No access to other... (0 Replies)
Discussion started by: gsiva
0 Replies

10. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
install::TempContent::Objects::mod_perl-2.0.9::docs::apiUseraContributinstall::TempContent::Objects::mod_perl-2.0.9::docs::api::Apache2::Access(3)

NAME
Apache2::Access - A Perl API for Apache request object: Access, Authentication and Authorization. Synopsis use Apache2::Access (); # allow only GET method $r->allow_methods(1, qw(GET)); # Apache Options value $options = $r->allow_options(); # Apache AllowOverride value $allow_override = $r->allow_overrides(); # which Options are allowed by AllowOverride (since Apache 2.2) $allow_override_opts = $r->allow_override_opts(); # auth name ("foo bar") $auth_name = $r->auth_name(); # auth type $auth_type = $r->auth_type(); $r->auth_type("Digest"); # Basic authentication process my ($rc, $passwd) = $r->get_basic_auth_pw(); # the login name of the remote user (RFC1413) $remote_logname = $r->get_remote_logname(); # dynamically figure out which auth has failed $r->note_auth_failure(); # note Basic auth failure $r->note_basic_auth_failure(); # note Digest auth failure $r->note_digest_auth_failure(); # Apache Request value(s) $requires = $r->requires(); # Apache Satisfy value (as a number) $satisfy = $r->satisfies(); # check whether some auth is configured $need_auth = $r->some_auth_required(); Description The API provided by this module deals with access, authentication and authorization phases. "Apache2::Access" extends "Apache2::RequestRec". API
"Apache2::Access" provides the following functions and/or methods: "allow_methods" Specify which HTTP methods are allowed $r->allow_methods($reset); $r->allow_methods($reset, @methods); obj: $r ( "Apache2::RequestRec object" ) The current request arg1: $reset ( boolean ) If a true value is passed all the previously allowed methods are removed. Otherwise the list is left intact. opt arg2: @methods ( array of strings ) a list of HTTP methods to be allowed (e.g. "GET" and "POST") ret: no return value since: 2.0.00 For example: here is how to allow only "GET" and "POST" methods, regardless to what was the previous setting: $r->allow_methods(1, qw(GET POST)); "allow_options" Retrieve the value of "Options" for this request $options = $r->allow_options(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: $options ( integer ) the "Options" bitmask. Normally used with bitlogic operators against "Apache2::Const :options constants". since: 2.0.00 For example if the configuration for the current request was: Options None Options Indexes FollowSymLinks The following applies: use Apache2::Const -compile => qw(:options); $r->allow_options & Apache2::Const::OPT_INDEXES; # TRUE $r->allow_options & Apache2::Const::OPT_SYM_LINKS; # TRUE $r->allow_options & Apache2::Const::OPT_EXECCGI; # FALSE "allow_overrides" Retrieve the value of "AllowOverride" for this request $allow_override = $r->allow_overrides(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: $allow_override ( integer ) the "AllowOverride" bitmask. Normally used with bitlogic operators against "Apache2::Const :override constants". since: 2.0.00 For example if the configuration for the current request was: AllowOverride AuthConfig The following applies: use Apache2::Const -compile => qw(:override); $r->allow_overrides & Apache2::Const::OR_AUTHCFG; # TRUE $r->allow_overrides & Apache2::Const::OR_LIMIT; # FALSE "allow_override_opts" Retrieve the bitmask of allowed "Options" set by "AllowOverride Options=..." for this request $override_opts = $r->allow_override_opts(); Enabling single options was introduced in Apache 2.2. For Apache 2.0 this function returns "Apache2::Const::OPT_UNSET" | "Apache2::Const::OPT_ALL" | "Apache2::Const::OPT_INCNOEXEC" | "Apache2::Const::OPT_SYM_OWNER" | "Apache2::Const::OPT_MULTI", which corresponds to the default value (if not set) for Apache 2.2. obj: $r ( "Apache2::RequestRec object" ) The current request ret: $override_opts ( integer ) the override options bitmask. Normally used with bitlogic operators against "Apache2::Const :options constants". since: 2.0.3 For example if the configuration for the current request was: AllowOverride Options=Indexes,ExecCGI The following applies: use Apache2::Const -compile => qw(:options); $r->allow_override_opts & Apache2::Const::OPT_EXECCGI; # TRUE $r->allow_override_opts & Apache2::Const::OPT_SYM_LINKS; # FALSE "auth_name" Get/set the current Authorization realm (the per directory configuration directive "AuthName"): $auth_name = $r->auth_name(); $auth_name = $r->auth_name($new_auth_name); obj: $r ( "Apache2::RequestRec object" ) The current request opt arg1: $new_auth_name ( string ) If $new_auth_name is passed a new "AuthName" value is set ret: "$" ( integer ) The current value of "AuthName" since: 2.0.00 The "AuthName" directive creates protection realm within the server document space. To quote RFC 1945 "These realms allow the protected resources on a server to be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization database." The client uses the root URL of the server to determine which authentication credentials to send with each HTTP request. These credentials are tagged with the name of the authentication realm that created them. Then during the authentication stage the server uses the current authentication realm, from "$r->auth_name", to determine which set of credentials to authenticate. "auth_type" Get/set the type of authorization required for this request (the per directory configuration directive "AuthType"): $auth_type = $r->auth_type(); $auth_type = $r->auth_type($new_auth_type); obj: $r ( "Apache2::RequestRec object" ) The current request opt arg1: $new_auth_type ( string ) If $new_auth_type is passed a new "AuthType" value is set ret: "$" ( integer ) The current value of "AuthType" since: 2.0.00 Normally "AuthType" would be set to "Basic" to use the basic authentication scheme defined in RFC 1945, Hypertext Transfer Protocol -- HTTP/1.0. However, you could set to something else and implement your own authentication scheme. "get_basic_auth_pw" Get the password from the request headers my ($rc, $passwd) = $r->get_basic_auth_pw(); obj: $r ( "Apache2::RequestRec object" ) The current request ret1: $rc ( "Apache2::Const constant" ) "Apache2::Const::OK" if the $passwd value is set (and assured a correct value in "$r->user"); otherwise it returns an error code, either "Apache2::Const::HTTP_INTERNAL_SERVER_ERROR" if things are really confused, "Apache2::Const::HTTP_UNAUTHORIZED" if no authentication at all seemed to be in use, or "Apache2::Const::DECLINED" if there was authentication, but it wasn't "Basic" (in which case, the caller should presumably decline as well). ret2: $ret (string) The password as set in the headers (decoded) since: 2.0.00 If "AuthType" is not set, this handler first sets it to "Basic". "get_remote_logname" Retrieve the login name of the remote user (RFC1413) $remote_logname = $r->get_remote_logname(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: $remote_logname ( string ) The username of the user logged in to the client machine, or an empty string if it could not be determined via RFC1413, which involves querying the client's identd or auth daemon. since: 2.0.00 Do not confuse this method with "$r->user", which provides the username provided by the user during the server authentication. "note_auth_failure" Setup the output headers so that the client knows how to authenticate itself the next time, if an authentication request failed. This function works for both basic and digest authentication $r->note_auth_failure(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: no return value since: 2.0.00 This method requires "AuthType" to be set to "Basic" or "Digest". Depending on the setting it'll call either "$r->note_basic_auth_failure" or "$r->note_digest_auth_failure". "note_basic_auth_failure" Setup the output headers so that the client knows how to authenticate itself the next time, if an authentication request failed. This function works only for basic authentication $r->note_basic_auth_failure(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: no return value since: 2.0.00 "note_digest_auth_failure" Setup the output headers so that the client knows how to authenticate itself the next time, if an authentication request failed. This function works only for digest authentication. $r->note_digest_auth_failure(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: no return value since: 2.0.00 "requires" Retrieve information about all of the requires directives for this request $requires = $r->requires obj: $r ( "Apache2::RequestRec object" ) The current request ret: $requires ( ARRAY ref ) Returns an array reference of hash references, containing information related to the "require" directive. since: 2.0.00 This is normally used for access control. For example if the configuration had the following require directives: Require user goo bar Require group bar tar this method will return the following datastructure: [ { 'method_mask' => -1, 'requirement' => 'user goo bar' }, { 'method_mask' => -1, 'requirement' => 'group bar tar' } ]; The requirement field is what was passed to the "Require" directive. The method_mask field is a bitmask which can be modified by the "Limit" directive, but normally it can be safely ignored as it's mostly used internally. For example if the configuration was: Require user goo bar Require group bar tar <Limit POST> Require valid-user </Limit> and the request method was "POST", "$r->requires" will return: [ { 'method_mask' => -1, 'requirement' => 'user goo bar' }, { 'method_mask' => -1, 'requirement' => 'group bar tar' } { 'method_mask' => 4, 'requirement' => 'valid-user' } ]; But if the request method was "GET", it will return only: [ { 'method_mask' => -1, 'requirement' => 'user goo bar' }, { 'method_mask' => -1, 'requirement' => 'group bar tar' } ]; As you can see Apache gives you the requirements relevant for the current request, so the method_mask is irrelevant. It is also a good time to remind that in the general case, access control directives should not be placed within a <Limit> section. Refer to the Apache documentation for more information. Using the same configuration and assuming that the request was of type POST, the following code inside an Auth handler: my %require = map { my ($k, $v) = split /s+/, $_->{requirement}, 2; ($k, $v||'') } @{ $r->requires }; will populate %require with the following pairs: 'group' => 'bar tar', 'user' => 'goo bar', 'valid-user' => '', "satisfies" How the requires lines must be met. What's the applicable value of the "Satisfy" directive: $satisfy = $r->satisfies(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: $satisfy ( integer ) How the requirements must be met. One of the "Apache2::Const :satisfy constants": "Apache2::Const::SATISFY_ANY", "Apache2::Const::SATISFY_ALL" and "Apache2::Const::SATISFY_NOSPEC". since: 2.0.00 See the documentation for the "Satisfy" directive in the Apache documentation. "some_auth_required" Can be used within any handler to determine if any authentication is required for the current request: $need_auth = $r->some_auth_required(); obj: $r ( "Apache2::RequestRec object" ) The current request ret: $need_auth ( boolean ) TRUE if authentication is required, FALSE otherwise since: 2.0.00 See Also mod_perl 2.0 documentation. Copyright mod_perl 2.0 and its core modules are copyrighted under The Apache Software License, Version 2.0. Authors The mod_perl development team and numerous contributors. perl v5.18.2 20install::TempContent::Objects::mod_perl-2.0.9::docs::api::Apache2::Access(3)
All times are GMT -4. The time now is 06:41 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy