I. Preface
HTTP authentication is a way for Web servers to authenticate client permissions, which can provide a certain degree of security protection for Web applications. At present, some Web application projects have put forward the need to adopt
No authentication method
After a correct client request is sent to the server, the HTTP server returns the 200 status code and directly returns the content.
Message example:
Request:
Get. http: // 10.127.194.3: 8061/voiceobjects .....
Return
authentication , that is, in the application who can prove that he is himself. Generally provide identification information such as their identity ID to indicate that he is himself, such as providing ID card, username/password to prove.
In Shiro,
CertificationCertification is to give some proof of identity. When you present a photo ID like a passport or driver's license, you give some evidence that you are the person you claim to be. When you enter a pin on an ATM, or enter a password in a
Previous wordsThe basic certification described in the previous article is convenient and flexible, but extremely unsafe. The user name and password are transmitted in clear text, and no action is taken to prevent tampering with the message. The
SIP is similar to HTTP protocol. The authentication mode is also the same. The HTTP protocol (RFC 2616) stipulates that the base mode and digest mode can be used ). RFC 2617 specifies two authentication modes. RFC 1321 is the MD5 standard. Digest is
PHP based on Forms Password authentication and HTTP authentication usage instances, form instances
The examples in this article describe the use of PHP based on Forms Password authentication and HTTP authentication. Share to everyone for your
1. Authentication 1.1 HTTP Challenge/Response authentication FrameworkHTTP provides a native challenge/response (Challenge/response) framework that simplifies the authentication process for users. The authentication model for HTTP is as follows:When
A few days ago in explaining how Windows was authentication through Kerberos, it was a long time to talk about the man and almost put himself in. Then think of the following two points: for a person who does not fully understand Kerberos, the whole
Today , Web services are ubiquitous, and thousands of Web applications are deployed on the public network for user access, some of which are only open to designated users and belong to a higher security-level Web Applications, they need to have a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.