Discover request requires http authentication, include the articles, news, trends, analysis and practical advice about request requires http authentication on alibabacloud.com
I. Preface
HTTP authentication is a way for Web servers to authenticate client permissions, which can provide a certain degree of security protection for Web applications. At present, some Web application projects have put forward the need to adopt
Previous wordsThe basic certification described in the previous article is convenient and flexible, but extremely unsafe. The user name and password are transmitted in clear text, and no action is taken to prevent tampering with the message. The
No authentication method
After a correct client request is sent to the server, the HTTP server returns the 200 status code and directly returns the content.
Message example:
Request:
Get. http: // 10.127.194.3: 8061/voiceobjects .....
Return
Windows Authentication: IIS performs authentication based on the settings of the application. To use this authentication method, anonymous access must be disabled in IIS.
Forms validation: Use cookies to save user credentials and redirect
SIP is similar to HTTP protocol. The authentication mode is also the same. The HTTP protocol (RFC 2616) stipulates that the base mode and digest mode can be used ). RFC 2617 specifies two authentication modes. RFC 1321 is the MD5 standard. Digest is
The computer itself is unable to determine the identity of the user, which requires the user "tell", usually need to check the information has these:① Password: Only I will know the string information.② Dynamic Tokens: Only one-time passwords
The http/1.1 standard has been a widely used and prevailing standard since its inception in 1999.Related documentsRfc2616:hypertext Transfer Protocol--http/1.1In RFC6585, the status codes 428, 429, 431, 511 are added inRFC2616 developed a series of
HttpClient provides full, authentication schemes defined by the HTTP standard specification as well as a number Of widely used non-standard authentication schemes such as NTLM and SPNEGO.User CredentialsAny process of the user authentication
From: http://technet.microsoft.com/zh-cn/magazine/ee914605.aspx
Although SharePoint provides multiple authentication options and authentication regions, the two most common options implemented by enterprises in the Intranet solution are
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.