Features

INTERNET INFORMATION SERVICE

IIS 6.0 and higher support the following authentication mechanisms:[1]


IIS 7.0 has a modular architecture. Modules, also called extensions, can be added or removed individually so that only modules required for specific functionality have to be installed. IIS 7 includes native modules as part of the full installation. These modules are individual features that the server uses to process requests and include the following:[3]

  • HTTP modules – Used to perform tasks specific to HTTP in the request-processing pipeline, such as responding to information and inquiries sent in client headers, returning HTTP errors, and redirecting requests.
  • Security modules – Used to perform tasks related to security in the request-processing pipeline, such as specifying authentication schemes, performing URL authorization, and filtering requests.
  • Content modules – Used to perform tasks related to content in the request-processing pipeline, such as processing requests for static files, returning a default page when a client does not specify a resource in a request, and listing the contents of a directory.
  • Compression modules – Used to perform tasks related to compression in the request-processing pipeline, such as compressing responses, applying Gzip compression transfer coding to responses, and performing pre-compression of static content.
  • Caching modules – Used to perform tasks related to caching in the request-processing pipeline, such as storing processed information in memory on the server and using cached content in subsequent requests for the same resource.
  • Logging and Diagnostics modules – Used to perform tasks related to logging and diagnostics in the request-processing pipeline, such as passing information and processing status to HTTP.sys for logging, reporting events, and tracking requests currently executing in worker processes.


IIS 7.5 includes the following additional or enhanced security features:[4]

  • Client Certificate Mapping
  • IP Security
  • Request Filtering
  • URL Authorization

Authentication changed slightly between IIS 6.0 and IIS 7, most notably in that the anonymous user which was named "IUSR_{machinename}" is a built-in account in Vista and future operating systems and named "IUSR". Notably, in IIS 7, each authentication mechanism is isolated into its own module and can be installed or uninstalled.[2]

  1. ^ "Authentication Methods Supported in IIS 6.0 (IIS 6.0)". IIS 6.0 Documentation. Microsoft corporation. Diakses tanggal 13 July 2011. 
  2. ^ a b "Changes Between IIS 6.0 and IIS 7 Security". IIS.net. Microsoft Corporation. 7 February 2010. Diakses tanggal 13 July 2011. 
  3. ^ Templin, Reagan (11 August 2010). "Introduction to IIS 7 Architecture". IIS.net. Microsoft Corporation. IIS 7 Modules. Diakses tanggal 16 July 2011. 
  4. ^ "Available Web Server (IIS) Role Services in IIS 7.5". Microsoft TechNet. Microsoft Corporation. Diakses tanggal 13 July 2011.