106
Chapter 5 Configuring Advanced Security
You see the Add Resource dialog.
2
Enter c:\ to protect all files on the C:\ drive and click OK.
3
Repeat steps 1 and 2 to protect the following directories:
c:\development
c:\development\mars\*
c:\development\venus\*
Now that you’ve explicitly protected all the directories and sub directories and files of
interest, move on to defining policies.
Adding policies
Now that you’ve selected the resources to protect, add two policies, one named
MARS and one named VENUS. At the bottom of the Resource View page, you see the
Policy Editor for the resource you just specified
To add policies:
1
Click Add Policy.
2
Enter MARS as the name for the new policy and click OK.
3
Write a description of the policy and click OK.
You see the Resource View page again, showing the policy you just created.
4
Select all the check boxes to protect all actions.
Now you can add users to the policy.
Granting access privileges
For the moment, no one is authorized to access any files or data sources in the
RDSService security context. All of these resources have been protected with the
wildcard rule and no one has been granted permission to access them.
To allow a set of users access to these resources:
1
From the Policy page, select the MARS policy. From the MARS policy page, click
the Rules button. Notice no rules are currently members of the policy.
2
Click the Add/Remove Button. The rule list is a multi select list so you can select
all the rules and add them all at once. For MARS we want to add the following
rules:
•
MARS_DSN
•
MARS_R_DIRECTORY
•
MARS_W_DIRECTORY
•
MARS_R_FILES
•
MARS_W_FILES
Summary of Contents for COLDFUSION 5-ADVANCED ADMINISTRATION
Page 1: ...Macromedia Incorporated Advanced ColdFusion Administration ColdFusion 5...
Page 20: ......
Page 56: ...38 Chapter 1 Advanced Data Source Management...
Page 74: ...56 Chapter 2 Administrator Tools...
Page 76: ......
Page 86: ...68 Chapter 3 ColdFusion Security...
Page 87: ...To Learn More About Security 69...
Page 88: ...70 Chapter 3 ColdFusion Security...
Page 130: ...112 Chapter 5 Configuring Advanced Security...
Page 132: ......
Page 154: ...136 Chapter 6 Configuring Verity K2 Server...
Page 162: ...144 Chapter 7 Indexing XML Documents...
Page 202: ...184 Chapter 8 Verity Spider...
Page 236: ...218 Chapter 10 Verity Troubleshooting Utilities...
Page 238: ......
Page 348: ...330 Chapter 14 ClusterCATS Utilities...
Page 349: ...Using sniff 331...
Page 350: ...332 Chapter 14 ClusterCATS Utilities...
Page 362: ...344 Chapter 15 Optimizing ClusterCATS...
Page 372: ...354 Index...