Frank Wiles wrote: > > The best way to think about it is like this: > > PerlAccessHandler ----> is this IP allowed? > PerlAuthenHandler ----> is this username allowed? > PerlAuthzHandler ----> is this group allowed? >
Small correction: PerlAccessHandler ----> Is this machine allowed, regardless of the user? (if not, don't bother checking the user) PerlAuthenHandler ----> Can we determine which user is attempting to access (if not, don't bother checking if he's allowed) PerlAuthzHandler ----> Is the authenticated user allowed?