Enabling Wildcard Scriptmapping for an Application, Virtual Directory, or Web Site
Updated: August 22, 2005
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1
URL authorization uses wildcard scriptmapping as implemented by an ISAPI interceptor, Urlauth.dll. To use Urlauth.dll, you must first enable it for each Web site, application, or virtual directory where you want to configure URL authorization.
|You must be a member of the Administrators group on the local computer to perform the following procedure or procedures. As a security best practice, log on to your computer by using an account that is not in the Administrators group, and then use the runas command to run IIS Manager as an administrator. At a command prompt, type runas /User:Administrative_AccountName "mmc %systemroot%\system32\inetsrv\iis.msc".|
In IIS Manager, expand the local computer and then expand the Web Sites folder.
Do one of the following:
Expand the Web site that contains the application for which you want to configure URL authorization, right-click the application directory, and then click Properties.
Expand the Web site that contains the virtual directory for which you want to configure URL authorization, right-click the virtual directory, and then click Properties.
Right-click the Web site where you want to configure URL authorization, and then click Properties.
Click the Directory tab (for an application), the Virtual Directory tab (for a virtual directory), or the Home Directory tab (for a Web site), and then in the Application settings section, click Configuration.
Click the Mappings tab, and then in the Wildcard application maps section, click Insert.
In the Add/Edit Application Extension Mapping box, click Browse and browse to the Windows\system32\inetsrv directory.
Click urlauth.dll, click Open, and then click OK three times.
For more information about application mappings, see Installing Wildcard Application Mappings.