Solved

network permission for deployed application.

Posted on 2012-03-28
3
362 Views
Last Modified: 2012-04-03
I have a strange case and would like advise.
I have an application deployed to a server (web based)
ONE of the pages gets a  "error loading page, 403 forbidden" code.
None of the other pages get this error.
The user can add information (done on a different) but when coming back to the main page - the information does not show (while it is saved in the db) - and the error shows up.
IF logged into the server - the same page which shows an error on the workstation does not return and error and all information entered from the workstation shows up correctly.

What could be causing this? suggestions?
0
Comment
Question by:Tagom
  • 2
3 Comments
 
LVL 62

Expert Comment

by:btan
ID: 37782482
Quick one is by far the most common reason for this error is that directory browsing is forbidden for the Web site. Most Web sites want you to navigate using the URLs in the Web pages for that site. They do not often allow you to browse the file directory structure of the site. This is true for most Web sites on the Internet - their Web server has "Allow directory browsing" set OFF.

http://www.checkupdown.com/status/E403.html
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 37782489
Saw something
http://www.403forbiddenerror.org/

There are 17 different types, sub status of HTTP Error 403

403.1 - Execute access forbidden.
403.2 - Read access forbidden.
403.3 - Write access forbidden.
403.4 - SSL required.
403.5 - SSL 128 required.
403.6 - IP address rejected.
403.7 - Client certificate required.
403.8 - Site access denied.
403.9 - Too many users.
403.10 - Invalid configuration.
403.11 - Password change.
403.12 - Mapper denied access.
403.13 - Client certificate revoked.
403.14 - Directory listing denied.
403.15 - Client Access Licenses exceeded.
403.16 - Client certificate is untrusted or invalid.
403.17 - Client certificate has expired or is not yet valid.
0
 

Author Closing Comment

by:Tagom
ID: 37801078
Great resource article, thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now