The list of protected resources (folders and separate files). Protected resources are local folders or files stored on the server.
If you protect a folder, it means that you protect all subfolders and files stored in them.
This tab is divided into three parts. The upper part contains the list of protected resources. The lower part contains two lists:
The list of users that are granted access to the resource.
The list of the rest of users.
Also you may grant access to resourve via Groups, like at picture below:
Granted Groups for Resource
The list of groups that are granted access to the resource.
The list of the rest of groups.
Note: You can use user groups to specify rights for accessing a resource. But there is one limitation: If you need to limit the traffic or access time for a resource, you must specify the user rights explicitly. It is due to the fact that the traffic and access time for a resource are counted individually for each user. That is, if you specify an access right for a resource via a group, it is the same as if you permitted access without traffic and time limitations for the user.
A protected resource has the following properties that you can change while adding a new resource or editing an existing one:
Local folder or file
Tthe full path to the folder or the separate file. You can select the object to be protected using the dialog box by clicking the corresponding button to the right of the field. This field must be unique within the list of protected resources.
Authentication mode. You can select either of two variants: Cookie or Basic. In case of Basic authentication, the client browser uses a built-in dialog box for entering authentication data. In case of Cookie authentication, IISKeeper redirects the request to the login web form.
The rest of fields depend on the selected authentication mode.
Use internal message
You can use this field to specify the complete HTML code of the error message. By default, the message contains the string "Access denied" in large red font.
Message from file
You can specify the HTML file you want to use as the error message. Make sure you check the access rights for this file because "Internet Guest account" must have rights to reads this file.
Cookie login form URL
Specify the URL of the login web form.
The list of users who have access to the protected resource. You can use either the Drag-And-Drop method or the "Add user" and "Remove user" buttons to add a user to the list or remove a user from it. Users are added from the list of available users. By default, each user is granted access to the resource without any time or traffic limits. You can specify limits while editing the selected user's rights for the current resource.
You can enable a time limit and specify the date after which the user will have no access to the resource.
You can enable a traffic limit and add additional traffic for the user in megabytes. You can also see the current amount of traffic available for the user.
The rest of users that have no access to the selected resource. To add a user to the system, use the "Users" tab.