Frank Wiles wrote:
>
> The best way to think about it is like this:
>
> PerlAccessHandler ----> is this IP allowed?
> PerlAuthenHandler ----> is this username allowed?
> PerlAuthzHandler ----> is this group allowed?
>
Small correction:
PerlAccessHandler ----> Is this machine allowed, regardless of
the user? (if not, don't bother
checking the user)
PerlAuthenHandler ----> Can we determine which user is
attempting to access (if not, don't
bother checking if he's allowed)
PerlAuthzHandler ----> Is the authenticated user allowed?