One method of protecting files is to control who has access to your resources through the server. With this type of protection, you create user names that requesters must use to access your protected resources. You define each user name and assign it a password in a password file. Password files are used in conjunction with protection setups and Access Control List (ACL) files to limit access to your server resources. Password files contain a list of authenticated users and their passwords. When the server receives a request it prompts the requester for a user name and password. In order for the request to complete, the requester must return a user name and password that meet the following criteria:
As new users are identified, their access must be authorized. Use the Add user form to specify user names and passwords for protecting your server resources.
When a user no longer has authority to access server resources, delete the user. Use the Delete user form to specify the name of the user to delete from the Password and Group files.
It might become necessary to check whether or not a user exists in the password file. Use the Check user form to determine if the user is already in the Password file or not.
As User Administrator you might need to change a user's password. Use the Change password form to change it in the password file.