This topic provides information about how to set up password protection for resources on your HTTP Server with the IBM® Web Administration for i5/OS™ interface.
You can protect Web resources by asking the user for a userid and password to gain access to these resources. Group files can be used to classify users into groups (for example: users and administrators). This allows you to limit access to those users that are defined in a group. If the user is listed in the group, then the userid and password are validated in one of the following ways:
The following steps explain how to add password protection (using groups) to a directory context.
groupname: user1[, user2[, user3...]]
For example:
ducks: webfoot, billface, swandude geese: goosegg, bagel flock: ducks, geese
In the above example, notice that once the groups named ducks and geese are defined, they can be included as part of the group named flock.
After configuring authentication, you must configure control access.
Note that changes to existing group files take effect after the HTTP Server is restarted.
You can protect Web resources by asking the user for a userid and password to gain access to these resources. An iSeries™ user profile can be used to authenticate users.
To configure password protection using a user profile, do the following:
Enter a user name in the OS/400 user profile to process requests field.
Select a user name under OS/400 user profile to process requests. Select Default server profile to allow the HTTP Server profile (QTMHHTTP) to process requests.
After configuring authentication, you must configure control access.
You can protect Web resources by asking the user for a userid and password (to gain access to these resources). A Lightweight Directory Access Protocol (LDAP) server can be used to authenticate users.
LDAP is a directory service protocol that runs over TCP/IP, using non-secure or Secure Sockets Layer (SSL). The LDAP directory service follows a client/server model, where one or more LDAP servers contain the directory data. This allows any LDAP-enabled application to store information once (such as user authentication information). Other applications using the LDAP server are then able to request the stored information. The HTTP server (powered by Apache) can act as a LDAP client, making requests for information.
One of the advantages of using the LDAP server for authentication is that it allows the information to be shared by multiple LDAP clients, and stores the information in a platform independent fashion. This can help prevent information from being duplicated within a network.
The following steps explain how to add password protection (using LDAP) to a directory context.
After configuring authentication, you must configure control access.