Authentication and Authorization Enforcement
Managing Security
8-7
Controlling Access by Domain Name
Domain name-based access control can be used
with IP address-based access control to solve the problem of IP addresses changing
without warning. When you combine these methods, if an IP address changes, then
the secure areas of your site are still protected because the domain names you want
to keep out will still be denied access.
To combine domain name-based with IP address-based access control, use the
syntax shown in
Example 8–4
:
Example 8–4
controlling Access by Domain Name
<Directory /co_backgr/>
order allow,deny
allow from all
# 141.217.24.* is the IP for malicious.cracker.com
deny from malicious.cracker.com 141.217.24.*
</Directory>
In
Example 8–4
, all requests for directory
/co_backgr/
are accepted except those
that originate from the domain name
malicious.cracker.com
or the IP address
141.217.24.* range. Although this is not a fool proof precaution against domain
name or IP address spoofing, it protects your site from
malicious.cracker.com
even if they change their IP address.
Controlling Access by Network or Netmask
You can control access based on subsets of
networks, specified by IP address. The syntax is shown in
Example 8–5
:
Example 8–5
Controlling Access by Network or Netmask
<Directory /payroll/>
order deny,allow
deny from all
allow from 10.1.0.0/255.255.0.0
</Directory>
In
Example 8–5
, access is allowed from a network/netmask pair. A netmask shows
how an IP address is to be divided into network, subnet, and host identifiers.
Netmasks enable you to refer to only the host ID portion of an IP address.
The netmask in
Example 8–5
, 255.255.0.0, is the default netmask setting for a Class B
address. The binary ones (decimal 255) mask the network ID and the binary zeroes
(decimal 0) retain the host ID of a given IP address.
Содержание HTTP Server
Страница 1: ...Oracle HTTP Server Administrator s Guide 10g Release 1 10 1 Part No B12255 01 December 2003 ...
Страница 12: ...xii ...
Страница 22: ...xxii ...
Страница 30: ...Starting Stopping and Restarting Oracle HTTP Server 1 8 Oracle HTTP Server Administrator s Guide ...
Страница 38: ...About htaccess Files 2 8 Oracle HTTP Server Administrator s Guide ...
Страница 52: ...Getting Information about Processes 4 8 Oracle HTTP Server Administrator s Guide ...
Страница 60: ...Configuring Reverse Proxies and Load Balancers 5 8 Oracle HTTP Server Administrator s Guide ...
Страница 70: ...Specifying Log Files 6 10 Oracle HTTP Server Administrator s Guide ...
Страница 164: ...Security Services Implemented Within Oracle HTTP Server 8 34 Oracle HTTP Server Administrator s Guide ...
Страница 170: ...9 6 Oracle HTTP Server Administrator s Guide ...
Страница 178: ...opmn xml A 8 Oracle HTTP Server Administrator s Guide ...
Страница 211: ...Glossary 9 X 509 Public keys can be formed in various data formats The X 509 v3 format is one such popular format ...
Страница 212: ...Glossary 10 ...
Страница 224: ...Index 12 ...