Internet Information Services Security with Windows 2000

Recall from Chapter 3, "Integrating IIS with Windows 2000 Security," that Internet Information Services utilizes a four-step process in controlling Web site access. That chapter discussed the two steps based on Windows 2000 security features.

This chapter focuses on the other two steps, which are provided by Internet Information Services:

  1. Checks for specific IP restrictions

  2. Verifies Web site permissions

Figure 4.1 shows a graphical representation of the Internet Information Services security process.[1]

[1] Note that in Figure 4.1, there are five steps instead of four. In addition to the standard steps, IIS gives you the flexibility of creating your own custom security handler.

Figure ...

Get Internet Information Services Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.