Configuring User Based Access Restrictions

Configuring access restrictions based on IP addresses may be useful if you want to grant access to an internal network and deny access to everyone else (although there may be better methods for doing that); for a more flexible access control mechanism, it may be a good idea as well to work with user-based access restrictions. Two methods are particularly interesting:

Simple authentication: When using simple authentication, you need to create a simple user file with the htpasswd2 command.

LDAP-based authentication: When using LDAP authentication, you need to include the mod_auth_ldap module to enable authentication against an LDAP back end.

Was this article helpful?

0 0

Post a comment