Some names, terms, and concepts in the IIS Server _win server

Source: Internet
Author: User
Tags anonymous

1. Website

The site is the most basic unit of management in IIS6 and is the root object of a website.
Host header settings, log settings, bandwidth connections limit can only be done at the site level and cannot be done under other elements.

2. Application

Dynamic scripts in the Web site (asp/php/asp. NET, etc.) content needs to be run in the application pool.

Each Web site has a default application when it is created, and typically the content in the Web site runs in that application. If you have special needs, such as when content in a subdirectory/virtual directory is particularly important, or if you have more than one child station in the same Web site, you can create applications in subdirectories or virtual directories to avoid interacting with one application.

The directory or virtual directory that owns the application is displayed as a gear icon in IIS.

Application creation/Deletion setting method: Under the Home Directory tab of the site properties, or under the Directory tab of the subdirectory/virtual directory properties, click the Create or Delete button next to application pool name.

When programs in a subdirectory/virtual directory are not set up in a separate program pool, to modify the program pool where the default program for the Web site is located, the program pool in the subdirectory/virtual directory is also changed, and if the subdirectory/virtual directory has been modified separately from the program pool, then the default application's program pool changes are no longer followed.

3, virtual directory

If a Web site needs to use files from a home directory in addition to a file in a different directory, you can use a virtual directory. Create a virtual directory, point to a folder, and access the virtual directory name to access the contents of the corresponding folder.

Each Web site has a root virtual directory, and settings in the site-Properties-Home directory are set for that virtual directory.

When you create a virtual directory, the permission setting only "Read Only" is checked and "Run Script" is not selected, a virtual directory without an application is created, and the icon is a folder plus Earth; If run script is selected, a virtual directory with an application is created with the icon as a gear.

4, directories and documents

Folders and files in the site, which follow the settings of the root virtual directory by default.
If you have special needs, you can also set the default home page, identity authentication, custom error, and ASP for folders and files separately. NET version, and so on.

5, binding

In IIS6, the Web site is differentiated by different bindings, enabling multiple Web sites to be run concurrently on the same server.

The format of the binding is "IP address: port: Domain Name", as long as one of them is different. is considered a different binding. The Web site bindings in IIS must be different, and if one of the two sites has the same binding, one of the sites will stop.

If the IP address is left blank (not assigned by default), it means that the Web site is received regardless of the request initiated by any IP that is bound by the server as the destination address. If the domain name is left blank (that is, the empty host header), which indicates that a request originated with a domain name, no site is bound by the domain name on the server, the site receives the request.

6. ISAPI

ISAPI is all called the Server Application Programming interface (Internet server application Programming Interface).
An ISAPI can be either a dynamic-link library file (DLL) or an executable (EXE) file, typically in the form of a DLL. Users write ISAPI to achieve the function of controlling and extending IIS behavior and realizing their own requirements.

ISAPI has two forms of filter and application extension:

A. Filters: IIS requests or certain events can be caught and processed, such as rewrite filters can redirect request URLs to a pseudo static effect, some IIS firewall filters can modify the return content to achieve the effect of keyword filtering.

B. Application extensions: Processing only requests for a specific type (suffix) file. For example, an application extension that handles. php files is set up in IIS to enable IIS to support PHP, and when a request for a. php file is received, IIS invokes the PHP ISAPI counterpart DLL file to process the PHP request, depending on the application extension settings. The added application extension must first be allowed in the Web service extension settings of IIS before it can be used properly.

7. CGI

CGI is all called the Universal Gateway Interface (Common Gateway Interface).
It is similar to the usage of ISAPI application extensions, except that the file format is. exe file.

8. Web Service Extensions

This feature is used to ensure the security of IIS. IIS installed by default is all disabled at the Web service extension, allowing access only to static pages, and if a feature is needed, the corresponding functionality needs to be turned on in the Web service extension first. If you add an application extension (such as. php) to a new suffix in your Web site, you also need to add the extension to the Web service extension and set it to be allowed before you can use it.

The main application extensions are as follows:

All unknown CGI extensions: If this feature is turned on, the Web site adds any CGI extensions (application extensions that point to the. exe file) that are allowed to execute. Generally not open.

All unknown ISAPI extensions: If this feature is turned on, any ISAPI extensions that the Web site adds (the application extension to the. dll file) are allowed to execute. Generally not open.

ASP.net v.: processing asp.net (at end of. aspx) required.

Active Server Pages: Processing ASP programs (end of. asp) required.

Include on server side: The HTML text that handles the embedded server side containing the command (ending with. shtml) is required.

9, log

The common IIS log formats are "NCSA Common file Format" and "The format of the expanded log file for both".

NCSA Common file Format: Common log format, Web services software such as Apache also uses this format.

The format of the Consortium log file: The default log format for IIS, which allows you to log more information such as access to client types, and to specify which fields to record.

10, identity Certification

Identity authentication is used to set the user's access to the Web site and execute scripts.
Running site scripts with less privileged users can have fewer objects to access, are relatively secure, but may also be limited in functionality. Conversely, to run the site script with higher privileges, limited functionality, but also greater security risks.

If a variety of authentication methods are set up at the same time, the first authentication method is anonymous authentication, when the anonymous authentication due to the user password error and other reasons, and then enable other methods to verify, do not pass when the site will be prompted for unauthorized access.

Common identity authentication methods are as follows:

(1) Anonymous identity authentication: the most common way of identity authentication, when the site needs to be public access to the basic use of this way, in advance in the "Site Properties-Directory security-identity authentication and access control-Anonymous access" to set the user name and password to run, when users visit the site, The Web site automatically attempts to run the site with that account.

(2) Integrated Windows authentication: When you use this method, users will first pop up a dialog box when they visit the Web site, and then enter a valid username password on the server system where IIS is located before they can access the Web site and execute the site script with that account's permissions. This authentication method can be used when the Web site is only allowed to specify user access, but it is common practice to use Anonymous authentication to control user access at the level of the Web site program.

(3) Basic authentication: Similar to Integrated Windows authentication, except that the method of Integrated Windows authentication encrypts the username password in Microsoft NTLM, and Basic authentication sends the username password in clear text.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.