Flicks FAQ: Ocxreference


Back to the top of the FAQ

AuthentiX OCX Component

The AuthentiX OCX component automates access to and manipulation of the AuthentiX username/password database. The samples here have been checked against IIS and ASP.

Disclaimer

Everything that you can do via the remote administration ASP package (in the ASPAdmin or ASPAdminISP directory), is done via the AuthentiX OCX methods, which are listed here. Incomplete listings, incomplete details, ommissions and errors are entirely my own.

Refer to the ASPAdmin/ASPAdminISP implementation for full details on how to use the complete set of methods and properties.

Examples

See the aspocxsamples\ocxadmin\ in the installation directory.
This is a full implementation of AuthentiX Remote Administration using most all of the properties and methods outlined below.

Full List

There is a full list of the functions and their type specifications at the end of this page.

File Names

AuthXOCX.ocx

The AuthentiX OCX component. Type regsvr32 authxocx.ocx at the command line to register on your system.

Syntax

Set auth = Server.CreateObject("AUTHXOCX.AuthXOCXCtrl.1")

Parameters

auth
Specifies the name of the object created by the call to Server.CreateObject.

Registry Entries

None.

Properties
UserPassword(userName)

Gets/Sets a specified user's password.

<%= auth.UserPassword("Brian") %>
UserNotes(userName)

Gets/Sets a specified user's password.

<%= auth.UserNotes("Brian") %>
UserExpiration(userName)

Gets/Sets a specified user's password.

<%= auth.UserExpiration("Brian") %>
AuthDataAuthentiXDBEnabled(dir)

Gets/Sets whether a directory has the AuthentiX database enabled

<%= auth.AuthDataAuthentiXDBEnabled("c:\wwwroot\members\") %>
AuthDataODBCEnabled(dir)

Gets/Sets whether a directory has ODBC authentication enabled

<%= auth.AuthDataODBCEnabled("c:\wwwroot\members\") %>
AuthDataReferrerEnabled(dir)

Gets/Sets whether a directory has Referral Blocking

<%= auth.AuthDataReferrerEnabled("c:\wwwroot\members\") %>
AuthDataIPEnabled(dir)

Gets/Sets whether a directory has IP Blocking

<%= auth.AuthDataIPEnabled("c:\wwwroot\members\") %>
AuthDataProtectionType(dir)

Gets/Sets directory to be Basic Authentication or by Cookie

<%= auth.AuthDataProtectionType("c:\wwwroot\members\") %>
AuthDataLimitLogins(dir)

Gets/Sets whether a directory limits concurrent logins

<%= auth.AuthDataLimitLogins("c:\wwwroot\members\") %>
AuthDataDirectoryName(dir)

Gets the directory name (the same as the supplied parameter) or changes a directory name to a new value.

<%= auth.AuthDataDirectoryName("c:\wwwroot\members\") %>
AuthDataCustomSelect(dir)

Gets/Sets if using a custom ODBC select statement. 0 for standard, 1 for custom (2 for advanced, 4.8f and above)

<%= auth.AuthDataCustomSelect("c:\wwwroot\members\") %>
AuthDataODBCConnectString(dir)

Gets/Sets ODBC DNS connect string

<%= auth.AuthDataODBCConnectString("c:\wwwroot\members\") %>
AuthDataODBCTableName(dir)

Gets/Sets ODBC standard select table name

<%= auth.AuthDataODBCTableName("c:\wwwroot\members\") %>
AuthDataODBCUsernameField(dir)

Gets/Sets ODBC username field

<%= auth.AuthDataODBCUsernameField("c:\wwwroot\members\") %>
AuthDataODBCPasswordField(dir)

Gets/Sets ODBC password field

<%= auth.AuthDataODBCPasswordField("c:\wwwroot\members\") %>
AuthDataODBCCustomSelect(dir)

Gets/Sets the custom select string

<%= auth.AuthDataODBCCustomSelect("c:\wwwroot\members\") %>
AuthDataODBCCustomUsername(dir)

Gets/Sets custom select username field

<%= auth.AuthDataODBCCustomUsername("c:\wwwroot\members\") %>
AuthDataODBCCustomPassword(dir)

Gets/Sets custom select password field

AuthDataODBCAdvancedString(dir)

Gets/Sets advanced ODBC string (4.8f and above)

AuthDataODBCImpersonate(dir)

Gets/Sets whether an NT user should be impersonated when accessing ODBC database (4.8f and above)

AuthDataODBCImpName(dir)

Gets/Sets NT user for ODBC impersonation (4.8f and above)

AuthDataODBCImpPassword(dir)

Gets/Sets NT user's password for ODBC impersonation (4.8f and above)

<%= auth.AuthDataODBCCustomPassword("c:\wwwroot\members\") %>
AuthDataIPDenyThenAllow(dir)

Gets/Sets whether IP protection allows or denies specified IP addresses

<%= auth.AuthDataIPDenyThenAllow("c:\wwwroot\members\") %>
AuthDataBasicRealm(dir)

Gets/Sets the Basic authentication realm for a protected directory

<%= auth.AuthDataBasicRealm("c:\wwwroot\members\") %>
AuthDataBasicMessage(dir)

Gets/Sets the Basic authentication access denied HTML message

<%= auth.AuthDataBasicMessage("c:\wwwroot\members\") %>
AuthDataCookieLoginPage(dir)

Gets/Sets the cookie login URL

<%= auth.AuthDataCookieLoginPage("c:\wwwroot\members\") %>
AuthDataCookieFailedLoginPage(dir)

Gets/Sets the cookie failed login URL

<%= auth.AuthDataCookieFailedLoginPage("c:\wwwroot\members\") %>
AuthDataCookieTimeoutPage(dir)

Gets/Sets the cookie timed out URL

<%= auth.AuthDataCookieTimeoutPage("c:\wwwroot\members\") %>
AuthDataCookiePersistence(dir)

Gets/Sets the persistence of cookie protection. "E" for expires with session, "P" for persistent across sessions, "T" for cookie timeouts.

<%= auth.AuthDataCookiePersistence("c:\wwwroot\members\") %>
AuthDataCookieTimeoutMinutes(dir)

Gets/Sets the number of minutes it takes to timeout a directory protected by cookie.

<%= auth.AuthDataCookieTimeoutMinutes("c:\wwwroot\members\") %>
AuthDataLLExceedAmount(dir)

Gets/Sets Limit-Login number of concurrent logins that triggers actions

<%= auth.AuthDataLLExceedAmount("c:\wwwroot\members\") %>
AuthDataLLDenyAccess(dir)

Gets/Sets Limit-Login whether to deny users access if exceed max allowed

<%= auth.AuthDataLLDenyAccess("c:\wwwroot\members\") %>
AuthDataLLWriteToEventLog(dir)

Gets/Sets Limit-Login whether to write to event log if exceeded max allowed

<%= auth.AuthDataLLWriteToEventLog("c:\wwwroot\members\") %>
AuthDataLLExpireAccount(dir)

Gets/Sets Limit-Login whether to write to expire account if exceeded max allowed

<%= auth.AuthDataLLExpireAccount("c:\wwwroot\members\") %>
AuthDataLLNotifyByEmail(dir)

Gets/Sets Limit-Login whether to write to notify by email if exceeded max allowed

<%= auth.AuthDataLLNotifyByEmail("c:\wwwroot\members\") %>
AuthDataLLRecipient(dir)

Gets/Sets Limit-Login email recipient

<%= auth.AuthDataLLRecipient("c:\wwwroot\members\") %>
AuthDataLLMailServer(dir)

Gets/Sets Limit-Login email mail server

<%= auth.AuthDataLLMailServer("c:\wwwroot\members\") %>
AuthDataLLSender(dir)

Gets/Sets Limit-Login email sender

<%= auth.AuthDataLLSender("c:\wwwroot\members\") %>
AuthDataLLSubject(dir)

Gets/Sets Limit-Login email subject

<%= auth.AuthDataLLSubject("c:\wwwroot\members\") %>
AuthDataLLExtraMessageText(dir)

Gets/Sets Limit-Login email extra message text

<%= auth.AuthDataLLExtraMessageText("c:\wwwroot\members\") %>
AuthDataLLDBUpdateDatabase(dir)

Gets/Sets Limit-Login whether to write to update ODBC database

<%= auth.AuthDataLLDBUpdateDatabase("c:\wwwroot\members\") %>
AuthDataLLDBConnectString(dir)

Gets/Sets Limit-Login ODBC dsn connect string

<%= auth.AuthDataLLDBConnectString("c:\wwwroot\members\") %>
AuthDataLLDBTableName(dir)

Gets/Sets Limit-Login ODBC table name

<%= auth.AuthDataLLDBTableName("c:\wwwroot\members\") %>
AuthDataLLDBUserField(dir)

Gets/Sets Limit-Login ODBC user name field

<%= auth.AuthDataLLDBUserField("c:\wwwroot\members\") %>
AuthDataLLDBUpdateField(dir)

Gets/Sets Limit-Login ODBC field to update

<%= auth.AuthDataLLDBUpdateField("c:\wwwroot\members\") %>
AuthDataLLDBUpdateValue(dir)

Gets/Sets Limit-Login ODBC value to update with

<%= auth.AuthDataLLDBUpdateValue("c:\wwwroot\members\") %>

Methods

CurrentUserName

Gets the username of the currently authenticated user.

UserLookup

Checks to see if the user exists.

UserAdd

Adds a user.

UserDelete

Deletes a user.

UserModify

Modifies a user.

GroupAddUser

Adds an existing user to an existing group.

GroupHasUser

Checks to see if the user is a member of the group.

GroupDeleteUser

Deletes the user from a group.

GroupAddNewUser

Adds an new user to an existing group.

Advanced Methods

Method Name Returns Parameters
UserGetCount long none
UserGetAt string long
GroupGetCount long none
GroupGetAt string long
GroupAdd short string
GroupDelete short string
GroupGetMemberCount long groupname
GroupGetNonMemberCount long groupname
GroupGetMemberAt string groupname long
GroupGetNonMemberAt string groupname long
GroupAddMembers short groupname string (comma separated list of users)
GroupRemoveMembers short groupname string (comma separated list of members)
AccessGetCount long none
AccessGetAt string long
AuthGetPermittedUserCount long directory
AuthGetPermittedUserAt string directory long
AuthGetNonPermittedUserCount long directory
AuthGetNonPermittedUserAt string directory long
AuthGetPermittedGroupCount long directory
AuthGetPermittedGroupAt string directory long
AuthGetNonPermittedGroupCount long directory
AuthGetNonPermittedGroupAt string directory long
AuthRemoveGroups short directory string (comma separated list of groups)
AuthAddGroups short directory string (comma separated list of groups)
AuthRemoveUsers short directory string (comma separated list of users)
AuthAddUsers short directory string (comma separated list of users)
AuthDataReferrerCount long directory
AuthDataReferrerGetAt string directory long
AuthDataIPCount long directory
AuthDataIPGetAt string directory long
AuthAddReferrers short directory string (comma separated list of referrers)
AuthAddIPs short directory string (comma separated list of IPs)
AuthRemoveReferrers short directory string (comma separated list of referrers)
AuthRemoveIPs short directory string (comma separated list of IPs)
AuthCheckDirectory short directory
AuthAdd short string (new directory to protect)
AuthDelete short string (directory protection to delete)
ODBCRemoveUserFromCache long string (ODBC user to remove)

Additional Methods for Cookie-based Protection

CookieLoginCookieName

Returns the name of the initial cookie.

CookieLoginValue

Returns the initial cookie value.

CookieCurrentUserName

Gets the username of the current user when using Cookie-based protection.

Miscellaneous Methods

SMTPSendMail

Sends an email message.

GetAuthxVersion

Returns a version string.

AuthentiX ISP Specific Methods

SetVirtualDomain

Specify which virtual domain subsequent operations apply to.

SetVirtualDomainDirect

Specify which virtual domain subsequent operations apply to.

SetSuperUserPassword:

Set the SuperUser password for access to such functions as AdminGetList. See the Options/ISP dialog to set the password. (Version 4.5 and above.)

AdminGetList:

Retrieve a list of Administrators. See ASPSuperUser/adminList.asp for usage. (Version 4.5 and above.)

AdminDelete:

Delete an adminstrator (only host-headers administrators can be deleted. See ASPSuperUser/confirmDeleteAdmin.asp for usage. (Version 4.5 and above.)

AdminAdd:

Delete an adminstrator (only host-headers administrators can be deleted. See ASPSuperUser/confirmDeleteAdmin.asp for usage. (Version 4.5 and above.)

SetVirtualDomainPassword:

Set the password for access for an administrator's administratative functions. Correctly setting this password allows access to administrator (not superuser) functions for a particular administrator/domain. (Version 4.5 and above.)

AuthentiX ISP Specific Properties

AdminPassword:

Get or set the password for access to administrator, See ASPSuperUser/editAdmin.asp for usage. Then have the administrator set his password with SetVirtualDomainPassword. (Version 4.5 and above.)

AdminNotes:

Get or set the notes associated with an administrator, See ASPSuperUser/editAdmin.asp for usage. (Version 4.5 and above.)

AdminEnabled:

Get or set the the enabled status for an administrator, See ASPSuperUser/editAdmin.asp for usage. (Version 4.5 and above.)

AdminType:

Get (read-only) whether an administrator is based on IP address or by host-header. See ASPSuperUser/editAdmin.asp for usage. (Version 4.5 and above.)

Full List


short UserLookup(BSTR userName);
BSTR GetAuthXVersion();
short UserAdd(BSTR userNameIn, BSTR passwordIn, BSTR notesIn, DATE expirationDate);
short UserDelete(BSTR userName);
short UserModify(BSTR oldUserName, BSTR newUserName, BSTR passwordIn, BSTR notesIn, DATE expirationDate);
short GroupAddUser(BSTR groupName, BSTR userName);
BSTR CurrentUserName(BSTR SERVER_NAME, BSTR SCRIPT_NAME, BSTR HTTP_AUTHORIZATION);
short SendMail(BSTR server, BSTR recipient, BSTR sender, BSTR subject, BSTR message);
BSTR SMTPSendMail(BSTR serverIn, BSTR recipientIn, BSTR senderIn, BSTR subjectIn, BSTR messageIn);
short GroupAddNewUser(BSTR groupNameIn, BSTR userNameIn, BSTR passwordIn, BSTR notesIn, DATE expirationDate);
short GroupDeleteUser(BSTR groupName, BSTR userName);
short GroupHasUser(BSTR groupName, BSTR userName);
BSTR CookieLoginValue(BSTR SERVER_NAME, BSTR SCRIPT_NAME, BSTR Username, BSTR Password);
BSTR CookieLoginCookieName(BSTR SERVER_NAME, BSTR SCRIPT_NAME);
BSTR CookieCurrentUserName(BSTR cookieValue);
long UserGetCount();
BSTR UserGetAt(long index);
long GroupGetCount();
BSTR GroupGetAt(long index);
long GroupGetMemberCount(BSTR groupName);
long GroupGetNonMemberCount(BSTR groupName);
BSTR GroupGetMemberAt(BSTR groupName, long index);
BSTR GroupGetNonMemberAt(BSTR groupName, long index);
short GroupAddMembers(BSTR groupName, BSTR memberList);
short GroupRemoveMembers(BSTR groupName, BSTR memberList);
short GroupAdd(BSTR groupName);
long AccessGetCount();
BSTR AccessGetAt(long index);
short GroupDelete(BSTR groupName);
long AuthGetPermittedUserCount(BSTR directory);
BSTR AuthGetPermittedUserAt(BSTR directory, long index);
propget] BSTR UserPassword(BSTR userName);
propput] void UserPassword(BSTR userName, BSTR lpszNewValue);
propget] BSTR UserNotes(BSTR userName);
propput] void UserNotes(BSTR userName, BSTR lpszNewValue);
propget] boolean AuthDataAuthentiXDBEnabled(BSTR directory);
propput] void AuthDataAuthentiXDBEnabled(BSTR directory, boolean bNewValue);
propget] boolean AuthDataODBCEnabled(BSTR directoryName);
propput] void AuthDataODBCEnabled(BSTR directoryName, boolean bNewValue);
propget] boolean AuthDataReferrerEnabled(BSTR directory);
propput] void AuthDataReferrerEnabled(BSTR directory, boolean bNewValue);
propget] boolean AuthDataIPEnabled(BSTR directory);
propput] void AuthDataIPEnabled(BSTR directory, boolean bNewValue);
propget] short AuthDataProtectionType(BSTR directory);
propput] void AuthDataProtectionType(BSTR directory, short nNewValue);
propget] boolean AuthDataLimitLogins(BSTR directory);
propput] void AuthDataLimitLogins(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataDirectoryName(BSTR directory);
propput] void AuthDataDirectoryName(BSTR directory, BSTR lpszNewValue);
long AuthGetNonPermittedUserCount(BSTR directory);
BSTR AuthGetNonPermittedUserAt(BSTR directory, long index);
long AuthGetPermittedGroupCount(BSTR directory);
BSTR AuthGetPermittedGroupAt(BSTR directory, long index);
long AuthGetNonPermittedGroupCount(BSTR directory);
BSTR AuthGetNonPermittedGroupAt(BSTR directory, long index);
propget] DATE UserExpiration(BSTR user);
propput] void UserExpiration(BSTR user, DATE newValue);
short AuthRemoveGroups(BSTR directory, BSTR groupList);
short AuthAddGroups(BSTR directory, BSTR memberListIn);
short AuthRemoveUsers(BSTR directory, BSTR memberListIn);
short AuthAddUsers(BSTR directory, BSTR membersIn);
propget] BSTR AuthDataODBCConnectString(BSTR directory);
propput] void AuthDataODBCConnectString(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCTableName(BSTR directory);
propput] void AuthDataODBCTableName(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCUserNameField(BSTR directory);
propput] void AuthDataODBCUserNameField(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCPasswordField(BSTR directory);
propput] void AuthDataODBCPasswordField(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCCustomUsername(BSTR directory);
propput] void AuthDataODBCCustomUsername(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCCustomPassword(BSTR directory);
propput] void AuthDataODBCCustomPassword(BSTR directory, BSTR lpszNewValue);
long AuthDataReferrerCount(BSTR directory);
BSTR AuthDataReferrerGetAt(BSTR directory, long index);
long AuthDataIPCount(BSTR directory);
BSTR AuthDataIPGetAt(BSTR directory, long index);
short AuthAddReferrers(BSTR directory, BSTR memberListIn);
short AuthAddIPs(BSTR directory, BSTR memberListIn);
short AuthRemoveReferrers(BSTR directory, BSTR memberListIn);
short AuthRemoveIPs(BSTR directory, BSTR memberListIn);
short AuthCheckDirectory(BSTR directory);
propget] boolean AuthDataIPDenyThenAllow(BSTR directory);
propput] void AuthDataIPDenyThenAllow(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataBasicRealm(BSTR directory);
propput] void AuthDataBasicRealm(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataBasicMessage(BSTR directory);
propput] void AuthDataBasicMessage(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataCookieLoginPage(BSTR directory);
propput] void AuthDataCookieLoginPage(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataCookieFailedLoginPage(BSTR directory);
propput] void AuthDataCookieFailedLoginPage(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataCookieTimeoutPage(BSTR directory);
propput] void AuthDataCookieTimeoutPage(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataCookieTimeoutMinutes(BSTR directory);
propput] void AuthDataCookieTimeoutMinutes(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataCookiePersistence(BSTR directory);
propput] void AuthDataCookiePersistence(BSTR directory, BSTR lpszNewValue);
propget] short AuthDataLLExceedAmount(BSTR directory);
propput] void AuthDataLLExceedAmount(BSTR directory, short nNewValue);
propget] boolean AuthDataLLDenyAccess(BSTR directory);
propput] void AuthDataLLDenyAccess(BSTR directory, boolean bNewValue);
propget] boolean AuthDataLLWriteToEventLog(BSTR directory);
propput] void AuthDataLLWriteToEventLog(BSTR directory, boolean bNewValue);
propget] boolean AuthDataLLExpireAccount(BSTR directory);
propput] void AuthDataLLExpireAccount(BSTR directory, boolean bNewValue);
propget] boolean AuthDataLLNotifyByEmail(BSTR directory);
propput] void AuthDataLLNotifyByEmail(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataLLRecipient(BSTR directory);
propput] void AuthDataLLRecipient(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLMailServer(BSTR directory);
propput] void AuthDataLLMailServer(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLSender(BSTR directory);
propput] void AuthDataLLSender(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLSubject(BSTR directory);
propput] void AuthDataLLSubject(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLExtraMessageText(BSTR directory);
propput] void AuthDataLLExtraMessageText(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataLLDBUpdateDatabase(BSTR directory);
propput] void AuthDataLLDBUpdateDatabase(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataLLDBConnectString(BSTR directory);
propput] void AuthDataLLDBConnectString(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLDBTableName(BSTR directory);
propput] void AuthDataLLDBTableName(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLDBUserField(BSTR directory);
propput] void AuthDataLLDBUserField(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLDBUpdateField(BSTR directory);
propput] void AuthDataLLDBUpdateField(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataLLDBUpdateValue(BSTR directory);
propput] void AuthDataLLDBUpdateValue(BSTR directory, BSTR lpszNewValue);
short AuthAdd(BSTR directory);
short AuthDelete(BSTR directory);
long ODBCCurrentUsersGetCount();
BSTR ODBCCurrentUsersNameGetAt(long index);
long ODBCRemoveUserFromCache(BSTR username);
BSTR SetVirtualDomain(BSTR SERVER_NAME, BSTR SCRIPT_NAME);
short SetVirtualDomainDirect(BSTR codeName);
long CurrentUsers(BSTR accessName, VARIANT* nameList, VARIANT* llList, VARIANT* res1, VARIANT* res2, VARIANT* res3, VARIANT* res4, VARIANT* res5, VARIANT* res6, VARIANT* res7, VARIANT* res8);
long UserUnlock(BSTR accessName, BSTR userName);
short EncodeViaDLL(BSTR compliantDLLPath, BSTR stringToEncode, VARIANT* encodedString);
long UserGroups(BSTR username, VARIANT* groups);
long SetSuperUserPassword(BSTR password);
long AdminGetList(VARIANT* adminList);
propget] BSTR AdminPassword(BSTR codename);
propput] void AdminPassword(BSTR codename, BSTR lpszNewValue);
propget] BSTR AdminNotes(BSTR codename);
propput] void AdminNotes(BSTR codename, BSTR lpszNewValue);
propget] boolean AdminEnabled(BSTR codename);
propput] void AdminEnabled(BSTR codename, boolean bNewValue);
propget] short AdminType(BSTR codename);
propput] void AdminType(BSTR codename, short nNewValue);
short AdminDelete(BSTR accessname);
short AdminAdd(BSTR adminName);
short SetVirtualDomainPassword(BSTR password);
short DomainEnabled();
short Flush();
BSTR CookieSWValue(BSTR username, BSTR password);
BSTR Base64UserName(BSTR HTTP_AUTHORIZATION);
BSTR Base64Password(BSTR HTTP_AUTHORIZATION);
propget] short UserConcurrentOverride(BSTR userName);
propput] void UserConcurrentOverride(BSTR userName, short nNewValue);
short ClearConcurrencyToken(short whichType, BSTR accessName, BSTR priorToken);
BSTR GetConcurrencyToken(short whichType, BSTR priorToken);
BSTR GetCrypt(BSTR username, BSTR password);
propget] short AuthDataCustomSelect(BSTR dir);
propput] void AuthDataCustomSelect(BSTR dir, short nNewValue);
propget] BSTR AuthDataODBCCustomSelect(BSTR directory);
propput] void AuthDataODBCCustomSelect(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCAdvancedString(BSTR directory);
propput] void AuthDataODBCAdvancedString(BSTR directory, BSTR lpszNewValue);
propget] short AuthDataODBCAdvancedUsage(BSTR directory);
propput] void AuthDataODBCAdvancedUsage(BSTR directory, short nNewValue);
propget] boolean AuthDataODBCImpersonate(BSTR directory);
propput] void AuthDataODBCImpersonate(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataODBCImpName(BSTR directory);
propput] void AuthDataODBCImpName(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataODBCImpPassword(BSTR directory);
propput] void AuthDataODBCImpPassword(BSTR directory, BSTR lpszNewValue);
propget] boolean Functionality(BSTR directory, long funcType);
propput] void Functionality(BSTR directory, long funcType, boolean bNewValue);
BSTR ODBCTest(BSTR directory);
propget] short AuthDataBasicMsgOptions(BSTR directory);
propput] void AuthDataBasicMsgOptions(BSTR directory, short nNewValue);
propget] BSTR AuthDataBasicMsgFile(BSTR directory);
propput] void AuthDataBasicMsgFile(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataBasicMsgURL(BSTR directory);
propput] void AuthDataBasicMsgURL(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataNTUSERMapRequests(BSTR directory);
propput] void AuthDataNTUSERMapRequests(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataNTUSERName(BSTR directory);
propput] void AuthDataNTUSERName(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataNTUSERPassword(BSTR directory);
propput] void AuthDataNTUSERPassword(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataTextEnabled(BSTR directory);
propput] void AuthDataTextEnabled(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataTextFile(BSTR directory);
propput] void AuthDataTextFile(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataDictionaryAttack(BSTR directory);
propput] void AuthDataDictionaryAttack(BSTR directory, boolean bNewValue);
propget] long AuthDataDAPExceedAmount(BSTR directory);
propput] void AuthDataDAPExceedAmount(BSTR directory, long nNewValue);
propget] long AuthDataDAPExceedTime(BSTR directory);
propput] void AuthDataDAPExceedTime(BSTR directory, long nNewValue);
propget] boolean AuthDataDAPBlockIP(BSTR directory);
propput] void AuthDataDAPBlockIP(BSTR directory, boolean bNewValue);
propget] boolean AuthDataDAPWriteToEventLog(BSTR directory);
propput] void AuthDataDAPWriteToEventLog(BSTR directory, boolean bNewValue);
propget] boolean AuthDataDAPPOST(BSTR directory);
propput] void AuthDataDAPPOST(BSTR directory, boolean bNewValue);
propget] boolean AuthDataDAPDontOffer(BSTR directory);
propput] void AuthDataDAPDontOffer(BSTR directory, boolean bNewValue);
propget] long AuthDataDAPBlockIPTime(BSTR directory);
propput] void AuthDataDAPBlockIPTime(BSTR directory, long nNewValue);
propget] BSTR AuthDataDAPPOSTURL(BSTR directory);
propput] void AuthDataDAPPOSTURL(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataDAPEnabled(BSTR directory);
propput] void AuthDataDAPEnabled(BSTR directory, boolean bNewValue);
propget] BSTR AuthDataODBCOverride(BSTR directory);
propput] void AuthDataODBCOverride(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataODBCOverrideEnabled(BSTR directory);
propput] void AuthDataODBCOverrideEnabled(BSTR directory, boolean bNewValue);
propget] boolean AuthDataByCOMEnabled(BSTR directory);
propput] void AuthDataByCOMEnabled(BSTR directory, boolean bNewValue);
propget] long AuthDataByCOMDispatchID(BSTR directory);
propput] void AuthDataByCOMDispatchID(BSTR directory, long nNewValue);
propget] BSTR AuthDataByCOMImpName(BSTR directory);
propput] void AuthDataByCOMImpName(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataByCOMImpPassword(BSTR directory);
propput] void AuthDataByCOMImpPassword(BSTR directory, BSTR lpszNewValue);
propget] BSTR AuthDataByCOMUserString(BSTR directory);
propput] void AuthDataByCOMUserString(BSTR directory, BSTR lpszNewValue);
propget] boolean AuthDataByCOMOptions(BSTR directory, long whichOption);
propput] void AuthDataByCOMOptions(BSTR directory, long whichOption, boolean bNewValue);
propget] BSTR AuthDataByCOMProgID(BSTR directory);
propput] void AuthDataByCOMProgID(BSTR directory, BSTR lpszNewValue);
BSTR ByCOMTest(BSTR directory, BSTR username, BSTR password);
BOOL AuthDataRefFailover(LPCTSTR directory) 

http://www.flicks.com/authentix/discover/main.htm

Back to the top of the FAQ