473,396 Members | 1,996 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Authentication with .htaccess

When using authentication on Apache server with .htaccess and .htgroup, is
it possible to use PHP to provide customised content depending on whether a
visitor to a website is in a specific group or not?

If so, does anyone know of a good tutorial?

Thanks for any help!

Adam
Jul 17 '05 #1
1 1741
"Adam" <Ad**@actualite.blue-fire.biz> wrote in message
news:c1**********@titan.btinternet.com...
When using authentication on Apache server with .htaccess and .htgroup, is
it possible to use PHP to provide customised content depending on whether a visitor to a website is in a specific group or not?

If so, does anyone know of a good tutorial?

Thanks for any help!

Adam

yes, check what group that user is in, then show aproriate content,

one way is to have some files named after the groups, example:

friends.php
buddies.php
employees.php

then do an include($groupName.".php");

--
Mike Bradley
http://www.gzentools.com -- free online php tools
Jul 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Andreas Emmert | last post by:
Hi NG, is it possible to achieve an automatic authentication via PHP? What I'm trying to do is, protect one subfolder with htaccess, and then have this subfolder-index.php opened by another...
2
by: Carl J. Hixon | last post by:
I am setting up a web site and have questions about security. I would like to use a forum script like phpBB, I would also like to use a CMS package like Mambo, and a file sharing system. Since I...
4
by: Bosconian | last post by:
I have a client that provides a list of companies on their web site (powered by PHP/MySQL.) These companies advertise their services to visitors. The company information has been maintained...
10
by: Mark H | last post by:
Hey all-- I'm building a database and I basically need to keep out people who aren't authorized, but it's not like I need top security here. I'm just doing basic user/pass of a SQL database, and...
0
by: Jörg Braun | last post by:
Hello NG, i have a problem With WebRequest! i want to download a htaccess saved file over a proxyconnetion with authentication. Download a file what is not saved with htaccess is no problem,...
2
by: Adam Smith | last post by:
First of all, is there a group addressing "Authentication" issues? I've searched and could not find any - Plz. forgive if I have posted to the wrong group or direct me to one dealing with these...
1
by: abracad_1999 | last post by:
I have installed the open source PHP Deadlock authentication system. It uses .htpasswd and .htaccess files. This works well apart from it doesn't allow user logout without closing their browser....
4
by: semi_evil | last post by:
I found a nice example of ebay login using PHP and cURL at http://curl.haxx.se/libcurl/php/examples/ Is this technique applicable to sites that authenticate users using a browser-opened dialog?...
16
by: rogerjames1 | last post by:
How would I go about protecting a whole directory, e.g. http://www.example.com/members/ and all sub-directories with login protection? I wouldn't like to put a .php script in each directory and...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.