Frank Wiles wrote:
> 
>     The best way to think about it is like this: 
> 
>     PerlAccessHandler   ----> is this IP allowed? 
>     PerlAuthenHandler  ----> is this username allowed? 
>     PerlAuthzHandler    ----> is this group allowed? 
>  

Small correction:

     PerlAccessHandler   ----> Is this machine allowed, regardless of

                               the user? (if not, don't bother
                               checking the user)
     PerlAuthenHandler   ----> Can we determine which user is
                               attempting to access (if not, don't
                               bother checking if he's allowed)
     PerlAuthzHandler    ----> Is  the authenticated user allowed?

Reply via email to