473,396 Members | 1,998 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to configure one directory which would not require user & password

Claus Mygind
571 512MB
I have authentication setup which require authorized users and passwords. Now I need to add a directory, in which the user is not presented with the login request.

The reason for this is I have a Chrome App in our lab which cannot contain that request (because I don't know how to add it to the Chrome App).

I saw an example (but cannot find it again) where a separate directory was added to the Apache config file which allowed two specific ip address to access a folder.

If you have an example of how I can add a new directory which is restricted to an ip range and will not be challenged with a log in request that would be appreciated.

Note I'm using Apache 2.4 So I need an example with <require> and not <allow> (I think)
May 4 '15 #1

✓ answered by Claus Mygind

go it figured out

require ip my.ip.address

1 6140
Claus Mygind
571 512MB
go it figured out

require ip my.ip.address
May 4 '15 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: eastcoastguyz | last post by:
On an Apache server, I want to be able to have a user name/password directory. I know this can be done with .htaccess, but I want to be able to do this for multiple users. The purpose of this, is...
3
by: Larry R Harrison Jr | last post by:
I have an Access 97 secured database which I designed myself. I have the workgroup file and I have been both been trying to access it using a custom shortcut--which I updated to reflect the current...
4
by: Jefferson Cowart | last post by:
I'm writing a program for a college to use to allow students to register their computers for use on the network. Aside from a bunch of security related checks I would like the program to offer to...
3
by: Amir Eshterayeh | last post by:
Dear Friends Would you please give me your professional idea about this asp.net problem. I need different virtual directory for different customer with their names like these:...
1
by: Wijit Sattayaporn | last post by:
All, I would like to develop intranet with ASP.Net as creating web form for authentication user before. Now I have text box for input "User Name", "Password" and drop down list for selecting...
2
by: Dabbler | last post by:
are there special requirements for membership user and password fields other than length restrictiosns? Thanks!
2
by: Kleber | last post by:
Could anyone please help? I'm trying to MATCH the user's UserName and Password imput to the user's UserName & Password from the machine current logged on. User's Input: txtUserName="Joe"...
3
by: rodrigo | last post by:
I am trying to retrieve a password protected page using: get = urllib.urlopen('http://password.protected.url"').read() While doing this interactively, I'm asked for the username, then the...
4
by: suganya | last post by:
Hi By getting the email id from txtEmailId, I have to send the user name & password to that particular email id. For that on button click event I have given the coding as Protected Sub...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.