This module authorizes access to files by comparing the userid used
for HTTP authentication (the web userid) with the file-system owner or
group of the requested file. The supplied username and password
must be already properly verified by an authentication module,
such as file-owner
and
file-group
, as follows:
file-owner
jones
, then the
username used to access it through the web must be jones
as well.file-group
accounts
, the group accounts
must
appear in the group database and the web-username used in the request
must be a member of that group.If
Particularly it will never authorize content negotiated "MultiViews" resources.
Consider a multi-user system running the Apache Web server, with
each user having his or her own files in ~/public_html/private
. Assuming that there is a single
jones
would not be allowed to access
files in /home/smith/public_html/private
unless they
were owned by jones
instead of smith
.
Consider a system similar to the one described above, but with
some users that share their project files in
~/public_html/project-foo
. The files are owned by the
system group foo
and there is a single foo
. So if jones
and smith
are both member of the group foo
, then both will be
authorized to access the project-foo
directories of
each other.
Setting the Off
allows for
user authorization to be passed on to lower level modules (as defined
in the modules.c
files) if:
file-owner
the file-system owner does not
match the supplied web-username or could not be determined, orfile-group
the file-system group does not
contain the supplied web-username or could not be determined.Note that setting the value to Off
also allows the
combination of file-owner
and file-group
, so
access will be allowed if either one or the other (or both) match.
By default, control is not passed on and an authorization failure
will result in an "Authentication Required" reply. Not
setting it to Off
thus keeps the system secure and forces
an NCSA compliant behaviour.