Virtual Path Registry Settings (Compact 2013)
3/26/2014
Virtual paths specify a mapping between the virtual path in a URL and the physical path on the device. HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS is the virtual path protected registry key. This registry key contains one or more subkeys, one for each virtual path. Each subkey is named for the virtual path that it specifies. For example, to create a virtual path that maps requests for /www, create a registry key named HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS\/www.
Each subkey contains values that specify the physical path, as well as the permission levels, authorization level, and user list that are required for that virtual path. The following table shows the values for each virtual path registry key.
Value : type |
Description |
---|---|
(Default) |
Specifies the physical directory that is mapped to the virtual directory. |
A : REG_DWORD |
If the value is not present in the registry, no authentication is performed. Sets the authorization level for a virtual directory. A=0, anonymous users can access the virtual directory and may have permission to read and/or execute scripts depend on the P value for the virtual directory. In addition, anyone who can access the Web Server can access files in that virtual directory. A=1, access to a virtual directory requires a valid user identifier and password. A=2, access to virtual directory requires the browser user to have administrator privileges in addition to a valid user identifier and password.
Security Note:
When A=0, anonymous users can gain access to the file system within the virtual root.
|
P : REG_DWORD |
If the value is not set in the registry, this value allows read, execute, and scripting. Sets the permission level in each virtual path for the browser. The permission list determines how a user can use the information provided on the Web site. If no value is set, the default value is set to HSE_URL_FLAGS_READ | HSE_URL_FLAGS_EXECUTE | HSE_URL_FLAGS_SCRIPT. P=DWORD set by a bitwise OR of the HSE_URL flags found in Httpext.h file. The following flags are supported:
P=1, ASP and DLLs will not run from the specified virtual root. P=516, allows a virtual root execute and script permissions, but not read permissions. |
UserList : REG_SZ |
Default is not set in the registry. Allows authenticated users, groups, or both to be set on a per-virtual-root basis. |