Caching Proxy Help

About Document Protection

You can create a list of URL templates that activate protection by associating each template with a protection setup. When your server receives a request, the server compares the request to the templates in this list. The server begins the comparison with the first template in the list and then moves down the list until it finds a match or comes to the end of the list. If a match is found, the server activates protection as defined by the protection setup associated with the matching template.

A request is the part of a full URL that follows the server host name. When the server receives a request, it checks to see if the request activates protection. The server then uses its mapping rules to map the request to a particular file. It is important that any request that activates protection is also covered by a Pass or Exec rule in the mapping rules.

The protection setup that you associate with a URL request template defines how you want to control access to the protected files. Protection setups can be defined in-line (as part of the document protection definition) or in a separate, named protection setup. A protection setup that is defined in line can only be used for that specific URL request template. A named protection setup can be used for multiple URL request templates by specifying its name.

Related information