473,396 Members | 2,158 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

HTTP Authentication without the Pop-Up

Is there a way to authenticate using Apache's basic authentication
without having the pop-up? For instance, can a person use a form that
authenticates using the built-in authentication? Does that make
sense?
Jul 17 '05 #1
2 2329
paul brown wrote:
Is there a way to authenticate using Apache's basic authentication
without having the pop-up? For instance, can a person use a form that
authenticates using the built-in authentication? Does that make
sense?


Yes. Yes it does.

I don't like the awful HTTP 1.x authentication either. I just use an
HTML form and then use a cookie to keep the credentials. Then you can
access the cookie each time to get the credentials and check them
against the user database.

Not very secure, but neither is HTTP authentication (unless the entire
connection is encrypted with SSL, but I can't afford such luxuries).

A compromise is to use sessions. That way, you can send the password
over an encrypted connection once (saving on bandwidth) and then use
unencrypted sessions to identify the user once they've logged in through
an HTML form. If you check the IP address of the user that claims to be
the session user, you should be able to get good security. Well, good
enough for non-critical applications.

I haven't written code for session-based authentication yet, though. I'm
sure that PHP makes it perfectly possible.
--
Bob
London, UK
echo Mail fefsensmrrjyaheeoceoq\! | tr "jefroq\!" "@obe.uk"
Jul 17 '05 #2
"Robert Downes" <no**********@see.my.signature.con> wrote in message
news:40**********************@mercury.nildram.net. ..
paul brown wrote: I haven't written code for session-based authentication yet, though. I'm
sure that PHP makes it perfectly possible.


Sure!

PEAR:Auth

works great!

Walter
Jul 17 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Bosconian | last post by:
I have a client that provides a list of companies on their web site (powered by PHP/MySQL.) These companies advertise their services to visitors. The company information has been maintained...
5
by: Mark | last post by:
Hi, I want to run in my .Net Windows Form this statement System.Diagnostics.Process.Start(strURLCommand) to open the browser and navigate to the specified URL. The URL is an ASP.Net Web...
0
by: aj | last post by:
DB2 WSE 8.1 FP 5 Red Hat Linux AS 2.1 I have the DB2 development client installed on my Win2000 PC, and have catalogued a remote node & database on my PC. My DB2 server across the n/w has the...
0
by: aj | last post by:
DB2 WSE 8.1 FP 5 Red Hat Linux AS 2.1 I have the DB2 development client installed on my WinXP PC, and have catalogued a remote node & database on my PC. My DB2 server across the n/w has the...
27
by: Jeremy Yallop | last post by:
Write a program that takes a C program in source form as input and prints the source code for a program with equivalent behaviour, but without semicolons, on standard output. Please note that...
1
by: David Krussow | last post by:
I have implemented ASP.NET Forms authentication in a test app. The app has a number of forms - only one of which requires authentication in order to be viewed (the "secured form"). Everything works...
6
by: Kevin Yu | last post by:
is it possible to for user to click a logout button to logout and when the user want to get into the system again, the user have to login again? Kevin
2
by: Bruce Groen | last post by:
I am having some authentication issues. I download a sample app to test the forms based authentication process of asp.net and it works on one of my servers but not the other one. The one that it...
4
by: jens Jensen | last post by:
Hello, I was given the task to build a .Net client that will talk to IBM integration server via HTTP post. The idea is that each http packet exchange should be authenticated via X09 "client...
3
by: KNC | last post by:
Hi all, I'm developing a website and deployed on webserver, it always display an authentication dialog that user must login with valid Windows user. Would anyone helps to instruct how to...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.