Basic Question about Users in a System (like the PF for example)

AI Thread Summary
The computing and networking model for websites with many users operates through a structured authentication and authorization process. Users first log in, where their credentials are verified against a database, often managed by a domain controller that organizes users into groups with specific permissions. Access to resources is typically controlled through roles assigned to users, which dictate their permissions within the system.Websites function by processing user requests for information, primarily through HTTP requests to a web server, which retrieves and serves files. This interaction is more controlled than simple file sharing; users can only access content based on their permissions. The backend may utilize various database systems, including SQL databases like MySQL, although not all websites rely on SQL. Apache servers are commonly used, often in conjunction with scripting languages like PHP.Overall, the model emphasizes secure, permission-based access to resources, with a focus on user roles and a structured database management system to maintain data integrity and security.
WWGD
Science Advisor
Homework Helper
Messages
7,678
Reaction score
12,360
Hi just curious,
What is the computing/networking model for a site with many users, say, as PF? Is it to grant access to each user to a shared drive? Sorry if this is too simple. I mean, I understand that first I login and I have to be first authenticated, then authorized to access certain network resources. How is that all stored and organized. Is it a domain controller where I am part of a collection of users and/or groups with specified permissions? EDIT: In a database system such as SQL Server I understand I first get access to the general network with a login, either through Windows or through SQL Server. In order to use a database, I must be made into a user of said database. But tha t just gives me access to the database, without the ability to do anything. I must then be assigned a role, which brings with it a set of permissions. How does this work when granting access to different users to a general site/network?
Thanks.
 
Last edited:
  • Like
Likes OCR
Computer science news on Phys.org
Everything is stored in a database and SQL in one form or another is very popular.
The physical storage media can vary but very often the site operator simply rents server resources from a large provider, (these are known as web farms).
The web farm takes care of the physical resource management and maintenance, the site operator does not need to be involved in that.
Usually these web farms offer a complete package along with the physical resources, this would include all the necessary server software, for example a web server (Often it's Apache web server running under some version of Linux.)
The site operator uploads web pages and other material to their allocated space usually via FTP.
Depending on the package they can also upload their own unique 'server side' software, many languages are available, PHP is probably most widely used.
Site administrators have a 'control panel', which they use to assign permissions for different levels of normal users.
 
  • Like
Likes OCR and WWGD
Basically you are interacting with a web application server. You send it a URL and it sends back a web page. You enter some text in the web page and press the submit. Your browser sends a form to the server. The server parses the form stores the text in it database and returns a web page back to you with the updated information.

If you click a link to some media file then the web server streams it back to you and your browser knows how to display it on your screen.

Everything is very controlled. On the most open of web sites you can browse limited portions of the file system but it is controlled by the web server who processes your URL request.

In some ways this model of interaction is a lot like a command line session. You type a command and the shell runs the command and returns some text to you. Sometimes you'll get text and sometimes you'll get errors. To the user, the shell controls access to the files based on the user's access rights i.e. What groups they are a member of and the files permissions based on the file owner and group its in.
 
Last edited:
  • Like
Likes OCR and WWGD
WWGD said:
Hi just curious,
What is the computing/networking model for a site with many users, say, as PF? Is it to grant access to each user to a shared drive? Sorry if this is too simple. I mean, I understand that first I login and I have to be first authenticated, then authorized to access certain network resources. How is that all stored and organized. Is it a domain controller where I am part of a collection of users and/or groups with specified permissions? EDIT: In a database system such as SQL Server I understand I first get access to the general network with a login, either through Windows or through SQL Server. In order to use a database, I must be made into a user of said database. But tha t just gives me access to the database, without the ability to do anything. I must then be assigned a role, which brings with it a set of permissions. How does this work when granting access to different users to a general site/network?
Thanks.
Websites aren't shared folders or drives, they are a series of "get" requests for information and they are downloaded files from a file server and in the old days it was as unsecured as FTP (a protocol that simply allowed you to download files in plain text).

Now it ought to be a little bit more secured than that. But that's the gist of it.

As others have mentioned, when you login you are cross-referencing two objects with a database of objects, you download a landing page file that is the login webpage which contains script that when you press enter sends the information back, if there's an SSL connection it's somewhat encrypted.

If that information is correct then you are given access to other downloadable content of the website based on your account. Since everything is a downloadable or uploadable content, (such as I upload data to the webserver when writing this post) if your account has those permissions the webserver will allow it.

That's it in a nutshell.

Databases for Websites are not usually SQL, correct? Most webservers are Apache and not IIS based?
 
  • Like
Likes WWGD
There's no single model for a website. The WWW is a set of standards that essentially allow a universal client (the web browser) to communicate with a standard web server. Without this, every website might need its own client.

But, behind the front-end webserver there could be anything from a single PC to an IBM mainframe.

There are as many possible data access models as you can imagine. You may have access as a specific user (change your profile) or as part of a user group (moderators).

In many business applications you have a whole superstructure of access rules maintained by system administrators. More general things may be in something like Active Directory, but a lot of rules can be held in specific application software.
 
  • Like
Likes WWGD
IDNeon said:
Databases for Websites are not usually SQL, correct?

There are many flavors of SQL and many web sites use one of them. Apache servers are frequently paired with MySQL for instance.

BoB
 
In my discussions elsewhere, I've noticed a lot of disagreement regarding AI. A question that comes up is, "Is AI hype?" Unfortunately, when this question is asked, the one asking, as far as I can tell, may mean one of three things which can lead to lots of confusion. I'll list them out now for clarity. 1. Can AI do everything a human can do and how close are we to that? 2. Are corporations and governments using the promise of AI to gain more power for themselves? 3. Are AI and transhumans...
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
Back
Top