check user. No user file? • check access. No groups file?
This does not mean that you have to add an ‘AuthUserFile /dev/null’ line as some magazines suggest! The solution is to ensure that at least the last module is authoritative and CONFIGURED. By default, mod_auth is authoritative and will give an OK/Denied, but only if it is configured with the proper AuthUserFile. Likewise, if a valid group is required. (Remember that the modules are processed in the reverse order from that in which they appear in your compile-time Configuration file.) A typical situation for this error is when you are using the mod_auth_dbm, mod_auth_msql, mod_auth_mysql, mod_auth_anon or mod_auth_cookie modules on their own. These are by default not authoritative, and this will pass the buck on to the (non-existent) next authentication module when the user ID is not in their respective database. Just add the appropriate ‘XXXAuthoritative yes’ line to the configuration.
This does not mean that you have to add an ‘AuthUserFile /dev/null’ line as some magazines suggest! The solution is to ensure that at least the last module is authoritative and CONFIGURED. By default, mod_auth is authoritative and will give an OK/Denied, but only if it is configured with the proper AuthUserFile. Likewise, if a valid group is required. (Remember that the modules are processed in the reverse order from that in which they appear in your compile-time Configuration file.) A typical situation for this error is when you are using the mod_auth_dbm, mod_auth_msql, mod_auth_mysql, mod_auth_anon or mod_auth_cookie modules on their own. These are by default not authoritative, and this will pass the buck on to the (non-existent) next authentication module when the user ID is not in their respective database. Just add the appropriate ‘XXXAuthoritative yes’ line to the configuration.
Related Questions
- I am an authorized end user who has full control of a protected file on the file server. How can DOFS stop me from obtaining the file and sending it out?
- Doesn the vulnerability require the user to click on the file: URL or UNC string in the malicious web page?
- check user. No user file? • check access. No groups file?