Protection setups describe how access to protected directories or files is controlled. When the server receives a request that matches a protected URL request template, the server consults the protection setup associated with the matching template. The protection setup describes the type or types of authorization or authentication necessary to access the protected resources.