This module authorizes access to files by comparing the userid used
for HTTP authentication (the web userid) with the file-system owner or
group of the requested file. The supplied username and password
must be already properly verified by an authentication module,
such as file-owner and
file-group, as follows:
file-ownerjones, then the
username used to access it through the web must be jones
as well.file-groupaccounts, the group accounts must
appear in the group database and the web-username used in the request
must be a member of that group.If
Particularly it will never authorize content negotiated "MultiViews" resources.
Consider a multi-user system running the Apache Web server, with
each user having his or her own files in ~/public_html/private. Assuming that there is a single
jones would not be allowed to access
files in /home/smith/public_html/private unless they
were owned by jones instead of smith.
Consider a system similar to the one described above, but with
some users that share their project files in
~/public_html/project-foo. The files are owned by the
system group foo and there is a single foo. So if jones and smith
are both member of the group foo, then both will be
authorized to access the project-foo directories of
each other.
Setting the Off allows for
user authorization to be passed on to lower level modules (as defined
in the modules.c files) if:
file-owner the file-system owner does not
match the supplied web-username or could not be determined, orfile-group the file-system group does not
contain the supplied web-username or could not be determined.Note that setting the value to Off also allows the
combination of file-owner and file-group, so
access will be allowed if either one or the other (or both) match.
By default, control is not passed on and an authorization failure
will result in an "Authentication Required" reply. Not
setting it to Off thus keeps the system secure and forces
an NCSA compliant behaviour.