IIS
By default, IIS is disabled in the operating system. To activate it, you need to go to the control panel and activate it as a component.
Principle of operation
. User request first arrives on the server, and then passed to IIS processing. The main module of the web server is the WWW service. The service processes user requests via HTTP/HTTPS protocols.
One web server works with several sites in parallel. For example, one server with one IP-address processes requests on one TCP-port from several sites. DNS records are created within IIS to identify each site.
Inside the web server are created home directories for each site with differentiation of access rights for directories. For example, when processing requests site Yandex.ru inside IIS appears directory c:/Yandex, which automatically gets all the information when processing requests from this site.
Security
. IIS provides users with several options to protect the site. They are all integrated into the Windows operating system and differ in the principle of user authentication.
- Anonymous login. The user is not identified by the operating system, because he does not go through the authorization procedure. He is given a minimum set of access rights.
- Basic authentication. The user enters his credentials, which are submitted through open communication channels. As a rule, a limited set of rights is provided for such clients.
- Authentication.
- Digest authentication. The username is transmitted in the clear and the password is encrypted.
- Built-in authentication. The security mechanism synchronizes with the system and takes the user’s credentials under which the user authenticated with the operating system.
- UNC authentication. The user’s credentials are transferred to a remote server, which authorizes the client.
- Entry via certificate. This option uses an SSL certificate to validate the user.
As encryption for IIS there is a special Crypto component. It comes only in server operating systems, starting with Windows Server 2008. It is a completely free utility.
Through this component, the administrator configures encryption for the site, using templates. They allow you to create a specific set of rules, and subsequently applied to sites.
IIS is designed to operate and administer sites under the Microsoft family of operating systems. The web server is integrated as a component in windows and has different authentication features.