NOTE: SOME FUNCTIONALITY EMPLOYS JAVASCRIPT
WASD Features and Facilities – 14. Index
WASD Features and Facilities
14.
Index
↩︎
↖︎
↑︎
↘︎
↪︎
A
Abstract
‘Access Control’ in 2. Package Overview
‘Administration’ in 2. Package Overview
3. Authentication and Authorization
3.2 Authentication Policy
‘Authentication Cache and Revalidation’ in 3.2 Authentication Policy
‘Authentication Failures’ in 3.2 Authentication Policy
3.4 Authorization Configuration File
‘Access Restriction Keywords’ in 3.4 Authorization Configuration File
3.5 Authentication Sources
3.8 Authorization Configuration Examples
3.9 Authorization Cache
3.10.1 ACME
‘Authentication Cache’ in 3.16 Cancelling Authorization
‘At the time of writing...’ in 4.2 TLS/SSL Functionality Sources
4.5.12 Authorization Using X.509 Certification
‘After Receiving The Certificate’ in 4.6.2 Certificate Signing Request
‘At Home’ in 4.8 SSL Service Evaluation
‘Avoid "Interesting" File Names’ in 6.2.2 File Naming
6.6.3 Avoiding Microsoft Property Clutter
6.6.6 Adding a port number to the webfolder-address
6.6.7 Adding a number-sign ("#") to the webfolder-address
‘Access Filtering’ in 7.1.5 Controlling Proxy Serving
‘Authorization Verification’ in 7.5.1 Reverse Proxy
7.7.2 Automatic
8.2.1 Ad Hoc Server Wrapper
9.1 Access Before Configuration
9.2 Access Configuration
‘Alternative Using /PROFILE’ in 9.5 HTTPd Server Revise
9.7.1 Accounting
9.7.2 Alignment Faults
9.7.3 Authentication
‘Apache Comparison’ in 11. Server Performance
13.6 ApacheBench
15. Attribution and Acknowledgement
B
‘By Service’ in 4.5.16 X509 Configuration
‘By Resource’ in 4.5.16 X509 Configuration
7.7 Browser Proxy Configuration
‘Bjöern Höehrmann’ in 15. Attribution and Acknowledgement
C
‘CAUTION’ in 3.10.5 VMS Account Proxying
‘Configuration’ in 3.11 Token Authentication
3.13 Controlling Server Write Access
3.16 Cancelling Authorization
‘Cryptography Software’ in 4. Transport Layer Security
4.5.17 Certificate Authority Verification File
4.6 Certificate Management
‘Changing Server Certificates’ in 4.6.1 Server Certificate
4.6.2 Certificate Signing Request
‘Caution’ in 6. WebDAV
6.1.1 COPY Restrictions
6.2.5 Concurrent Authorisation
‘Client Tools’ in 6.7 References
‘Chain Authorization’ in 7.1.4 Proxy Chaining
7.1.5 Controlling Proxy Serving
‘Chain Password’ in 7.1.5 Controlling Proxy Serving
7.2 Caching
7.2.1 Cache Device
7.2.3 Cache Management
7.2.4 Cache Invalidation
7.2.5 Cache Retention
‘Command-Line Use’ in 7.2.7 PCACHE Utility
7.3 CONNECT Serving
7.3.2 Controlling CONNECT Serving
‘Chaining RAW’ in 7.6.2 [ServiceProxyTunnel] RAW
‘Chaining FIREWALL’ in 7.6.3 [ServiceProxyTunnel] FIREWALL
7.6.7 Complex Private Tunneling
8.1.2 Considerations
8.1.3 Configuration
8.2.3 Considerations
‘Cleaning Up’ in 8.2.3 Considerations
‘Control Section’ in 9.6 HTTPd Server Action
‘Configuration Action Section’ in 9.6 HTTPd Server Action
9.7.4 Cache
9.7.5 Configuration Check
‘Code Modules’ in 10.2 Event Categories
10.6 Command-Line Use
‘Cache Disabled’ in Concurrency 1 - Requests/Second
‘Concurrency 1 - Requests/Second’ in 11.1 Simple File Request Turn-Around
‘Concurrency 10 - Requests/Second’ in 11.1 Simple File Request Turn-Around
‘Cache Enabled’ in Concurrency 1 - Requests/Second
‘Concurrency 1 - Requests/Second’ in 11.1 Simple File Request Turn-Around
‘Concurrency 10 - Requests/Second’ in 11.1 Simple File Request Turn-Around
‘CPU Consumed’ in 11.1 Simple File Request Turn-Around
‘CPU Time Consumed (Seconds)’ in 11.1 Simple File Request Turn-Around
‘Concurrency 1 - Requests/Second’ in 11.2 Scripting
‘Concurrency 10 - Requests/Second’ in 11.2 Scripting
13.7 CALogs
‘Clark Cooper, et.al.’ in 15. Attribution and Acknowledgement
D
‘Deprecated and Discouraged’ in 3.10.4 WASD "Hard-Wired" Identifiers
6.1.2 DELETE Restrictions
‘Directory Metadata’ in 6.3 WebDAV Metadata
6.5.3 Dreamweaver
7.5.3 DNS Wildcard Proxy
9.7.6 DCL/Scripting Processes
9.7.7 DECnet Scripting Connections
E
‘Examples’ in 3.12 Skeleton-Key Authentication
‘Extension Visibility’ in 4.5.15 Subject Alternative Name and Other Extensions
6.6.11 Error 0x800700DF: The file size exceeds the limit allowed and cannot be saved
‘Error Messages’ in 7. Proxy Services
7.1.1 Enabling A Proxy Service
7.2.2 Enabling Caching
7.3.1 Enabling CONNECT Serving
‘Enabling SSL’ in 7.5.4 Originating SSL
7.6.4 Encrypted Tunnel
7.6.5 Encrypted Tunnel With Authentication
‘External Services’ in 7.6.7 Complex Private Tunneling
‘External Mapping’ in 7.6.7 Complex Private Tunneling
‘Example In Action’ in 7.6.7 Complex Private Tunneling
‘Enabling Server Access’ in 9.5 HTTPd Server Revise
10.2 Event Categories
‘Examples’ in 10.3 Request Filtering
13.1 Echo Facility
F
4.5.5 Forward Secrecy
4.5.14 Features
6.2.2 File Naming
‘File Name Ambiguity’ in 6.2.2 File Naming
6.2.3 File-system Access
6.2.4 File-system Authorisation
6.6.2 FrontPage Extensions
6.6.8 Force Windows XP to use Basic Authentication
‘From The Command-Line’ in 7.2.3 Cache Management
7.4 FTP Proxy Serving
7.4.1 FTP Query String Keywords
‘Fail-Through’ in 8.1.1 VMS Clustering Comparison
8.2.2 Formal Environments
‘File Transfer Rate’ in 11.1 Simple File Request Turn-Around
‘File Record Format’ in 11.1 Simple File Request Turn-Around
‘Filters’ in 13.11 QDLogStats
‘Free Software Foundation’ in 15. Attribution and Acknowledgement
G
‘General’ in 2. Package Overview
‘General Setup’ in 4.5.16 X509 Configuration
5.3.1 Global Configuration
6.5.2 Gnome/gvfs/Nautilus
7.5 Gatewaying Using Proxy
‘General’ in 10.2 Event Categories
H
‘HTTP Methods’ in 3.3 Permissions, Path and User
5. HTTP/2
‘HTTP/2 and WATCH’ in 5.1 WASD HTTP/2
5.2 HTTP/2 and Performance
5.3 HTTP/2 Configuration
‘HTTP/2 Global Configuration’ in 5.3.1 Global Configuration
5.3.3 HTTP/2 Set Rules
5.4 HTTP/2 Detection
5.5 HTTP/2 References
6.1 HTTP Methods Supported
7.1 HTTP Proxy Serving
9.4 HTTPd Server Reports
9.5 HTTPd Server Revise
9.6 HTTPd Server Action
9.7 HTTPd Command Line
9.7.8 Hhelppp!
9.7.9 HTTP/2 Connection
12. HTTPd Web Update
13.2 Hiss Facility
13.8 HTAdmin
13.9 HTTPd Monitor
I
1. Introduction
2.4 International Features
‘Implication’ in 3.9 Authorization Cache
‘Important’ in 4.5.12 Authorization Using X.509 Certification
‘Is it all worth it? As might be expected – that depends.’ in 5.2 HTTP/2 and Performance
6.1.4 If: Restrictions
‘Internal Services’ in 7.6.7 Complex Private Tunneling
‘Internal Mapping’ in 7.6.7 Complex Private Tunneling
8. Instances and Environments
9.7.10 Instances
9.7.11 Instance Status
14. Index
K
3.8.1 KISS
L
License
3.10.2 Logon Type
4.1 Let's Encrypt
‘Let's Encrypt’ in 4.6.1 Server Certificate
‘Loading Authority Certificates’ in 4.6.1 Server Certificate
‘Locking Depth’ in 6.4 WebDAV Locking
‘Lock Depth 0’ in 6.4 WebDAV Locking
‘Locking Timeout’ in 6.4 WebDAV Locking
‘Local Password’ in 7.1.5 Controlling Proxy Serving
‘Load Sharing’ in 8.1.1 VMS Clustering Comparison
9.7.12 Logging
M
‘Multiple Source Types’ in 3.5 Authentication Sources
6.1.3 MOVE Restrictions
‘Metadata Files’ in 6.3 WebDAV Metadata
‘Metadata XML’ in 6.3 WebDAV Metadata
‘Metadata should not be edited manually ...’ in 6.3 WebDAV Metadata
‘Microsoft Metadata’ in 6.3 WebDAV Metadata
6.6 Microsoft Miscellanea
‘much of this is pre- Windows 10’ in 6.6 Microsoft Miscellanea
6.6.1 Mapping
6.6.9 Microsoft XP Explorer BASIC Authentication
6.6.10 Microsoft Windows 7 BASIC Authentication
7.7.1 Manual
‘Method’ in 9.1 Access Before Configuration
‘Multi-Server/Cluster-Wide’ in 9.7 HTTPd Command Line
9.7.13 Mapping
13.10 MD5digest
N
‘Note’ in 3.5 Authentication Sources
3.10.6 Nil-Access VMS Accounts
‘Note’ in 3.10.8 SYSUAF Security Profile
‘Note’ in 3.12 Skeleton-Key Authentication
‘Note’ in 3.15 User Password Modification
‘Note’ in 4.5.5 Forward Secrecy
‘not really an endorsement but’ in 4.6 Certificate Management
‘Note’ in 7.1.5 Controlling Proxy Serving
‘Not all responses can be cached!’ in 7.2 Caching
‘Not all sites may benefit from cache!’ in 7.2 Caching
‘Note’ in 7.2.2 Enabling Caching
‘Note’ in 7.2.3 Cache Management
‘Note’ in 7.2.7 PCACHE Utility
‘Note’ in 7.5.1 Reverse Proxy
‘Note’ in 7.5.3 DNS Wildcard Proxy
‘Note’ in 7.6.8 Tunnelling Source
‘Need it to be jogged?’ in 9.7 HTTPd Command Line
9.7.14 Network Connection
‘Network’ in 10.2 Event Categories
‘Note’ in 10.5 Usage Suggestions
O
Online Search
‘Objectives’ in 1. Introduction
‘Overview’ in 3. Authentication and Authorization
4.4 OPENSSL.EXE Application
‘OpenSSL Options’ in 4.5.4 (Open)SSL Options
6.5.1 OS X Finder
6.6.4 OPTIONS header "MS-Author-Via: DAV"
7.5.2 One-Shot Proxy
7.5.4 Originating SSL
‘Other’ in 10.2 Event Categories
‘OSU Comparison’ in 11. Server Performance
‘Ohio State University’ in 15. Attribution and Acknowledgement
‘OpenSSL Project’ in 15. Attribution and Acknowledgement
P
2. Package Overview
3.3 Permissions, Path and User
‘Performance Impact’ in 3.10.8 SYSUAF Security Profile
‘Password Expiry’ in 3.15 User Password Modification
‘Performance Assessment’ in 5.2 HTTP/2 and Performance
7. Proxy Services
‘Proxy Serving Quick-Start’ in 7. Proxy Services
‘Proxy Error Messages’ in Error Messages
7.1.2 Proxy Affinity
7.1.3 Proxy Bind
7.1.4 Proxy Chaining
‘Proxy Password’ in 7.1.5 Controlling Proxy Serving
‘Proxy Caching’ in 7.2 Caching
‘Proxy Cache Device’ in 7.2.1 Cache Device
‘Proxy Enabling Caching’ in 7.2.2 Enabling Caching
‘Proxy Cache Management’ in 7.2.3 Cache Management
‘Proxy Cache Invalidation’ in 7.2.4 Cache Invalidation
‘Proxy Cache Retention’ in 7.2.5 Cache Retention
7.2.7 PCACHE Utility
‘proxyMUNGE Utility’ in 7.5.1 Reverse Proxy
‘Proxy’ in 10.2 Event Categories
‘Persistent Scripting Observations’ in 11.2 Scripting
‘Persistent Scripting - Requests/Second’ in 11.2 Scripting
‘Parameters and Qualifiers’ in 13.7 CALogs
‘Parameters and Qualifiers’ in 13.8 HTAdmin
‘Parameters and Qualifiers’ in 13.11 QDLogStats
‘Paul E. Jones’ in 15. Attribution and Acknowledgement
Q
‘Qualys SSL Lab’ in 4.8 SSL Service Evaluation
13.11 QDLogStats
R
‘Reasons For Yet Another Web Package’ in 1. Introduction
3.1 Rule Interpretation
‘Reserved Names’ in 3.4 Authorization Configuration File
‘Reserved Username’ in 3.4 Authorization Configuration File
‘Realm Description’ in 3.5 Authentication Sources
3.6 Realm, Full-Access, Read-Only
3.10.3 Rights Identifiers
6.2.6 Real-World Example
6.6.5 Repairing broken XP Web Folders
6.7 References
‘Request Modification’ in 7.1.5 Controlling Proxy Serving
7.2.6 Reporting and Maintenance
‘Request Redirect’ in 7.5 Gatewaying Using Proxy
7.5.1 Reverse Proxy
‘Redirection Location Field’ in 7.5.1 Reverse Proxy
‘Restart’ in 8.1.1 VMS Clustering Comparison
‘Request’ in 10.2 Event Categories
‘Response’ in 10.2 Event Categories
10.3 Request Filtering
10.4 Report Format
‘RSA Data Security’ in 15. Attribution and Acknowledgement
S
‘Scripting’ in 2. Package Overview
2.1 Server Behaviour
‘String Matching’ in 3.1 Rule Interpretation
3.10 SYSUAF-Authenticated Users
3.10.7 SYSUAF and SSL
3.10.8 SYSUAF Security Profile
3.10.9 SYSUAF Profile For Full Site Access
3.12 Skeleton-Key Authentication
3.14 Securing All Requests
‘Some Thoughts From R. S. Engelschall’ in 4. Transport Layer Security
4.5 SSL Configuration
‘SSL Versions’ in 4.5.2 TLS/SSL Versions
4.5.3 SSL Ciphers
‘SSL Options’ in 4.5.3 SSL Ciphers
4.5.6 Session Resumption
4.5.7 Strict Transport Security
4.5.8 SSL Server Certificate
4.5.9 SSL Private Key
4.5.10 SSL Virtual Services
4.5.11 SSL Access Control
4.5.15 Subject Alternative Name and Other Extensions
4.6.1 Server Certificate
4.7 SSL CGI Variables
‘set /path/* SSLCGI=apache_mod_ssl’ in 4.7 SSL CGI Variables
4.8 SSL Service Evaluation
4.9 SSL References
5.3.2 Service Configuration
6.5 Some Wrinkles
‘Script Use’ in 7.2.7 PCACHE Utility
‘SSL to RAW’ in 7.6.2 [ServiceProxyTunnel] RAW
7.6.6 Shared SSH Tunnel
8.1 Server Instances
8.1.4 Status
8.2 Server Environments
9. Server Administration
9.3 Server Instances
‘Server CLI /SYSPLUS’ in 9.4 HTTPd Server Reports
‘System Report PLUS’ in 9.4 HTTPd Server Reports
‘Server Log Annotation’ in 9.7 HTTPd Command Line
9.7.15 Shutdown and Restart
9.7.16 Secure Sockets Layer
10.1 Server Instances
11. Server Performance
11.1 Simple File Request Turn-Around
11.2 Scripting
11.3 SSL
11.4 Suggestions
13.3 Stream Facility
‘Sort Details’ in 13.8 HTAdmin
13.12 SECHAN Utility
13.13 StreamLF Utility
‘Stuart Langridge’ in 15. Attribution and Acknowledgement
T
Table of Content
2.3 TCP/IP Packages
3.11 Token Authentication
4. Transport Layer Security
‘TLS and SSL’ in 4. Transport Layer Security
‘TLS functionality is not supplied with the basic WASD package’ in 4. Transport Layer Security
4.2 TLS/SSL Functionality Sources
4.5.2 TLS/SSL Versions
‘TLS Version 1.3’ in 4.5.2 TLS/SSL Versions
‘TLS/SSL Options’ in 4.5.3 SSL Ciphers
‘TLS Version 1.3’ in 4.8 SSL Service Evaluation
‘test TLS Version 1.3’ in 4.8 SSL Service Evaluation
7.6 Tunneling Using Proxy
7.6.8 Tunnelling Source
9.7.17 Throttle
‘These results are indicative only!’ in 11. Server Performance
‘Transfer Rate - MBytes/Second’ in 11.1 Simple File Request Turn-Around
‘The Apache Group’ in 15. Attribution and Acknowledgement
‘Tatsuhiro Tsujikawa’ in 15. Attribution and Acknowledgement
U
3.15 User Password Modification
‘Uses HTTP Cookies’ in 7.1.2 Proxy Affinity
‘Using Instance Status’ in 8.1.4 Status
10.5 Usage Suggestions
‘Update Access Permission’ in 12. HTTPd Web Update
13. Utilities and Facilities
‘Usage Examples’ in 13.7 CALogs
‘Usage Examples’ in 13.8 HTAdmin
‘Usage Examples’ in 13.11 QDLogStats
V
2.2 VMS Versions
3.7 Virtual Servers
3.10.5 VMS Account Proxying
‘VMS DLM Locking’ in 6.4 WebDAV Locking
8.1.1 VMS Clustering Comparison
W
WASD Features and Facilities
‘WARNING!’ in 3.10 SYSUAF-Authenticated Users
3.10.4 WASD "Hard-Wired" Identifiers
4.3 WASD SSL Quick-Start
4.5.1 WASD_CONFIG_SERVICE
5.1 WASD HTTP/2
6. WebDAV
6.2 WebDAV Configuration
6.2.1 WebDAV Set Rules
‘Why use …’ in 6.2.6 Real-World Example
6.3 WebDAV Metadata
6.4 WebDAV Locking
‘Write Access Only’ in 6.4 WebDAV Locking
‘WASD_CONFIG_SERVICE’ in 7.1.1 Enabling A Proxy Service
‘WASD_CACHE_ROOT Logical’ in 7.2.1 Cache Device
‘WARNING’ in 8.1 Server Instances
9.7.18 WebSocket
10. WATCH Facility
‘WASD v10 Data’ in 11. Server Performance
13.4 Where Facility
‘WASDbench Utility’ in 13.14 WASDbench
13.14 WASDbench
13.15 WOTSUP Utility
‘WASD VMS Web Services – Copyright © 1996-2019 Mark G. Daniel’ in 15. Attribution and Acknowledgement
X
4.5.13 X.509 Certificate Renegotiation
4.5.16 X509 Configuration
4.5.18 X.509 Authorization CGI Variables
13.5 Xray Facility
Y
‘YMMV!’ in 5.2 HTTP/2 and Performance
+
4.5.4 (Open)SSL Options
7.4.2 "login" Keyword
7.6.1 [ServiceProxyTunnel] CONNECT
7.6.2 [ServiceProxyTunnel] RAW
7.6.3 [ServiceProxyTunnel] FIREWALL
↩︎
↖︎
↑︎
↘︎
↪︎