Safely making resources available with the server
Securing
These documents describe: working with the file system to properly set permissions on server software, forbidding public access to resources, blocking usage by bad actors, and using the server's role-based access control module.