Table of Contents

Title Page 1 - Introduction 2 - Package Overview 2.1 - Server Behaviour 2.2 - VMS Versions 2.3 - TCP/IP Packages 2.4 - International Features 3 - Authentication and Authorization 3.1 - Rule Interpretation 3.2 - Authentication Policy 3.3 - Permissions, Path and User 3.4 - Authorization Configuration File 3.5 - Authentication Sources 3.6 - Realm, Full-Access, Read-Only 3.7 - Virtual Servers 3.8 - Authorization Configuration Examples 3.8.1 - KISS 3.9 - Authorization Cache 3.10 - SYSUAF-Authenticated Users 3.10.1 - ACME 3.10.2 - Logon Type 3.10.3 - Rights Identifiers 3.10.4 - WASD "Hard-Wired" Identifiers 3.10.5 - VMS Account Proxying 3.10.6 - Nil-Access VMS Accounts 3.10.7 - SYSUAF and SSL 3.10.8 - SYSUAF Security Profile 3.10.9 - SYSUAF Profile For Full Site Access 3.11 - Token Authentication 3.12 - Skeleton-Key Authentication 3.13 - Controlling Server Write Access 3.14 - Securing All Requests 3.15 - User Password Modification 3.16 - Cancelling Authorization 4 - Transport Layer Security 4.1 - SSL Functionality Sources 4.2 - WASD SSL Quick-Start 4.3 - SSL Configuration 4.3.1 - WASD_CONFIG_SERVICE 4.3.2 - SSL Versions 4.3.3 - SSL Ciphers 4.3.4 - (Open)SSL Options 4.3.5 - Forward Secrecy 4.3.6 - Session Resumption 4.3.7 - Strict Transport Security 4.3.8 - SSL Server Certificate 4.3.9 - SSL Private Key 4.3.10 - SSL Virtual Services 4.3.11 - SSL Access Control 4.3.12 - Authorization Using X.509 Certification 4.3.13 - X.509 Certificate Renegotiation 4.3.14 - Features 4.3.15 - Subject Alternative Name and Other Extensions 4.3.16 - X509 Configuration 4.3.17 - Certificate Authority Verification File 4.3.18 - X.509 Authorization CGI Variables 4.4 - Certificate Management 4.4.1 - Server Certificate 4.4.2 - Client Certificate 4.4.3 - Certificate Signing Request 4.5 - SSL CGI Variables 4.6 - SSL Service Evaluation 4.7 - SSL References 5 - HTTP/2 5.1 - WASD HTTP/2 5.2 - HTTP/2 and Performance 5.3 - HTTP/2 Configuration 5.3.1 - Global Configuration 5.3.2 - Service Configuration 5.3.3 - Mapping Set Rules 5.4 - HTTP/2 Detection 5.5 - HTTP/2 References 6 - WebDAV 6.1 - HTTP Methods Supported 6.1.1 - COPY Restrictions 6.1.2 - DELETE Restrictions 6.1.3 - MOVE Restrictions 6.1.4 - If: Restrictions 6.2 - WebDAV Configuration 6.2.1 - WebDAV Set Rules 6.2.2 - File Naming 6.2.3 - File-system Access 6.2.4 - File-system Authorisation 6.2.5 - Concurrent Authorisation 6.2.6 - Real-World Example 6.3 - WebDAV Metadata 6.4 - WebDAV Locking 6.5 - Some Wrinkles 6.5.1 - OS X Finder 6.5.2 - Gnome/gvfs/Nautilus 6.5.3 - Dreamweaver 6.6 - Microsoft Miscellanea 6.6.1 - Mapping 6.6.2 - FrontPage Extensions 6.6.3 - Avoiding Microsoft Property Clutter 6.6.4 - OPTIONS header "MS-Author-Via: DAV" 6.6.5 - Repairing broken XP Web Folders 6.6.6 - Adding a port number to the webfolder-address 6.6.7 - Adding a number-sign ("#") to the webfolder-address 6.6.8 - Force Windows XP to use Basic Authentication 6.6.9 - Microsoft XP Explorer BASIC Authentication 6.6.10 - Microsoft Windows 7 BASIC Authentication 6.6.11 - Error 0x800700DF: The file size exceeds the limit allowed and cannot be saved 7 - Proxy Services 7.1 - HTTP Proxy Serving 7.1.1 - Enabling A Proxy Service 7.1.2 - Proxy Affinity 7.1.3 - Proxy Bind 7.1.4 - Proxy Chaining 7.1.5 - Controlling Proxy Serving 7.2 - Caching 7.2.1 - Cache Device 7.2.2 - Enabling Caching 7.2.3 - Cache Management 7.2.4 - Cache Invalidation 7.2.5 - Cache Retention 7.2.6 - Reporting and Maintenance 7.2.7 - PCACHE Utility 7.3 - CONNECT Serving 7.3.1 - Enabling CONNECT Serving 7.3.2 - Controlling CONNECT Serving 7.4 - FTP Proxy Serving 7.4.1 - FTP Query String Keywords 7.4.2 - "login" Keyword 7.5 - Gatewaying Using Proxy 7.5.1 - Reverse Proxy 7.5.2 - One-Shot Proxy 7.5.3 - DNS Wildcard Proxy 7.5.4 - Originating SSL 7.6 - Tunneling Using Proxy 7.6.1 - [ServiceProxyTunnel] CONNECT 7.6.2 - [ServiceProxyTunnel] RAW 7.6.3 - [ServiceProxyTunnel] FIREWALL 7.6.4 - Encrypted Tunnel 7.6.5 - Encrypted Tunnel With Authentication 7.6.6 - Shared SSH Tunnel 7.6.7 - Complex Private Tunneling 7.7 - Browser Proxy Configuration 7.7.1 - Manual 7.7.2 - Automatic 8 - Instances and Environments 8.1 - Server Instances 8.1.1 - VMS Clustering Comparison 8.1.2 - Considerations 8.1.3 - Configuration 8.2 - Server Environments 8.2.1 - Ad Hoc Server Wrapper 8.2.2 - Formal Environments 8.2.3 - Considerations 9 - Server Administration 9.1 - Access Before Configuration 9.2 - Access Configuration 9.3 - Server Instances 9.4 - HTTPd Server Reports 9.5 - HTTPd Server Revise 9.6 - HTTPd Server Action 9.7 - HTTPd Command Line 9.7.1 - Accounting 9.7.2 - Alignment Faults 9.7.3 - Authentication 9.7.4 - Cache 9.7.5 - Configuration Check 9.7.6 - DCL/Scripting Processes 9.7.7 - DECnet Scripting Connections 9.7.8 - HTTP/2 Connection 9.7.9 - Instances 9.7.10 - Logging 9.7.11 - Mapping 9.7.12 - Network Connection 9.7.13 - Shutdown and Restart 9.7.14 - Secure Sockets Layer 9.7.15 - Throttle 9.7.16 - WebSocket 10 - WATCH Facility 10.1 - Server Instances 10.2 - Event Categories 10.3 - Request Filtering 10.4 - Report Format 10.5 - Usage Suggestions 10.6 - Command-Line Use 11 - Server Performance 11.1 - Simple File Request Turn-Around 11.2 - Scripting 11.3 - SSL 11.4 - Suggestions 12 - HTTPd Web Update 13 - Utilities and Facilities 13.1 - Echo Facility 13.2 - Hiss Facility 13.3 - Stream Facility 13.4 - Where Facility 13.5 - Xray Facility 13.6 - ApacheBench 13.7 - CALogs 13.8 - HTAdmin 13.9 - HTTPd Monitor 13.10 - MD5digest 13.11 - QDLogStats 13.12 - SECHAN Utility 13.13 - StreamLF Utility 13.14 - WASDbench :^) 13.15 - WOTSUP Utility

This HTML document was produced from SDML (DEC DOCUMENT source) by the SDM2HTM utility (SDM2HTM AXP-1.11.7)