December 2013
Beginner to intermediate
372 pages
11h 42m
English
The three authentication credentials you configured in the last section control who can access your web server and websites. Those credentials combined with NTFS security permissions will control what they can do to the websites. As an example, you don’t want anonymous users to have the ability to delete your web pages! The next step in the process of securing a website is to take the authentication credentials and configure them with the proper NTFS filesystem permissions to the web pages.
By default, all authenticated users in your company can access every website and application. This is rarely the type of access you want; I certainly don’t want everyone accessing confidential accounting information. ...