How is basic authentication worked, Computer Engineering

Assignment Help:

How is basic authentication worked?

When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the response to the request, so as to notify the client which user credentials should be supplied in order for the resource to be returned like requested.

By receiving a 401-response header, the client's browser, when this supports fundamental authentication, will ask the user to supply a password and its username to be sent to the server. When you are using a graphical browser, as like Netscape or Internet Explorer which you will see is a box that pops up and provides you a place to type into your username and password, to be sent back to the server. When the username is into the approved list, and when the password supplied is accurate, the resource will be then returned to the client.

Since the HTTP protocol is stateless, every request will be treated in similar way, even if they are from similar client. It is, every resource that is requested from the server that will have to supply authentication credentials over again so as to receive the resource.

Luckily, the browser supports the details here, than you only have to type within your username and password one time per browser session - which is, you might have to type this in again the next time you open up your browser and visit similar web site.


Related Discussions:- How is basic authentication worked

Determine about the authoring software, Determine about the Authoring Softw...

Determine about the Authoring Software Also termed as author ware; this is a program which helps in the writing of hypertext or multimedia applications. Authoring tools general

What is micro operation, What is micro operation? A micro operation is ...

What is micro operation? A micro operation is an elementary operation performed with the data kept in registers.   1) Register transfer microoperation transfer binary inform

What is a privileged instruction, What is a privileged instruction? To ...

What is a privileged instruction? To protect the operating system of a computer from being corrupted by user programs, particular instructions can be executed only whereas the

Function modules are also external subroutines, Function Modules are also e...

Function Modules are also external Subroutines. True.

Differentiate between sequential and combinational circuits, Problem 1 ...

Problem 1 Prove that :- x(x + y) = x by using identities 2 Write a short note on Analog to Digital Converter (ADC) 3 Differentiate between sequential and combinational ci

How can we minimize problems occurring because of branch., Q. How can we mi...

Q. How can we minimize problems occurring because of the branch instructions? We may use various mechanisms which may minimize the effect of branch penalty. To keep mult

Process of breadth first search, Process of Breadth first search: It's...

Process of Breadth first search: It's very useful to think of this search as the evolution of the given tree, and how each string of letters of word is found via the search in

Define virtualisation and explain computer architecture, Rentrag has decide...

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers

Explain conditions for the critical section problem solution, What are the ...

What are the properties which a data item should possess to implement a critical section? The Critical Section Problem Solution should satisfy the following conditions: 1.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd