User Guide

46 Getting Results with Novell Web Services
Getting Results with Novell Web Services
103-000133-001
August 29, 2001
Novell Confidential
Manual 99a38 July 17, 2001
Securing Your Web Site
Because information published on a Web site can be viewed by anyone,
sensitive information should be guarded. Most Web sites on the Internet are
designed for general access, but a company intranet is an ideal environment
for Web site security. Likewise, extranets also demand tight security controls.
Using a directory service, such as eDirectory
TM
, you can control access to the
entire server or to parts of the server, such as directories, files, or file types.
NetWare Enterprise Web Server is configured, by default, to run in eDirectory
mode, but you can modify it to run in either local database or LDAP modes.
With eDirectory, you manage access control through the NetWare file system
trustees. When running in local database mode, usernames and passwords are
stored in a simple configuration file and, therefore, are not as secure as using
eDirectory. Running in LDAP mode requires that you have an LDAP server
running and configured in your network.
Controlling Access Using eDirectory Mode
Running in Novell eDirectory mode allows you to restrict access to folders on
your server.
eDirectory mode allows you to restrict access to files, but it does not allow you
to restrict access based on IP address or other criteria. If access must be
restricted based on IP address or other parameters, you must either change
modes and use LDAP or find an alternative method to restrict access, such as
a firewall.
Managing users and groups while running in eDirectory mode is best
accomplished using ConsoleOne. However, you can perform basic eDirectory
tasks from the Users and Groups section of the Enterprise Server pages of Web
Manager, or from the eDirectory link on the Web Manager home page.
Access control is accomplished by restricting access to files in the same way
that you control access to files stored on the file server. For more information,
see Chapter 7, “Using a Directory Service to Control User Access to Network
Resources,” on page 83.