?
Solved

network permission for deployed application.

Posted on 2012-03-28
3
Medium Priority
?
373 Views
Last Modified: 2012-04-03
I have a strange case and would like advise.
I have an application deployed to a server (web based)
ONE of the pages gets a  "error loading page, 403 forbidden" code.
None of the other pages get this error.
The user can add information (done on a different) but when coming back to the main page - the information does not show (while it is saved in the db) - and the error shows up.
IF logged into the server - the same page which shows an error on the workstation does not return and error and all information entered from the workstation shows up correctly.

What could be causing this? suggestions?
0
Comment
Question by:Tagom
  • 2
3 Comments
 
LVL 66

Expert Comment

by:btan
ID: 37782482
Quick one is by far the most common reason for this error is that directory browsing is forbidden for the Web site. Most Web sites want you to navigate using the URLs in the Web pages for that site. They do not often allow you to browse the file directory structure of the site. This is true for most Web sites on the Internet - their Web server has "Allow directory browsing" set OFF.

http://www.checkupdown.com/status/E403.html
0
 
LVL 66

Accepted Solution

by:
btan earned 2000 total points
ID: 37782489
Saw something
http://www.403forbiddenerror.org/

There are 17 different types, sub status of HTTP Error 403

403.1 - Execute access forbidden.
403.2 - Read access forbidden.
403.3 - Write access forbidden.
403.4 - SSL required.
403.5 - SSL 128 required.
403.6 - IP address rejected.
403.7 - Client certificate required.
403.8 - Site access denied.
403.9 - Too many users.
403.10 - Invalid configuration.
403.11 - Password change.
403.12 - Mapper denied access.
403.13 - Client certificate revoked.
403.14 - Directory listing denied.
403.15 - Client Access Licenses exceeded.
403.16 - Client certificate is untrusted or invalid.
403.17 - Client certificate has expired or is not yet valid.
0
 

Author Closing Comment

by:Tagom
ID: 37801078
Great resource article, thank you.
0

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

593 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question