How is basic authentication worked, Computer Engineering

Assignment Help:

How is basic authentication worked?

When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the response to the request, so as to notify the client which user credentials should be supplied in order for the resource to be returned like requested.

By receiving a 401-response header, the client's browser, when this supports fundamental authentication, will ask the user to supply a password and its username to be sent to the server. When you are using a graphical browser, as like Netscape or Internet Explorer which you will see is a box that pops up and provides you a place to type into your username and password, to be sent back to the server. When the username is into the approved list, and when the password supplied is accurate, the resource will be then returned to the client.

Since the HTTP protocol is stateless, every request will be treated in similar way, even if they are from similar client. It is, every resource that is requested from the server that will have to supply authentication credentials over again so as to receive the resource.

Luckily, the browser supports the details here, than you only have to type within your username and password one time per browser session - which is, you might have to type this in again the next time you open up your browser and visit similar web site.


Related Discussions:- How is basic authentication worked

Calculate switching capacity in a two stage network, In a two stage network...

In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Switching capacity Given: N =M =512, α

Vliw architecture, Vliw Architecture Superscalar architecture was desig...

Vliw Architecture Superscalar architecture was designed to develop the speed of the scalar processor. But it has been realized that it is not easy to execute as we discussed pr

Give the syntax switch statement, Give the syntax  switch statements C...

Give the syntax  switch statements Consider the following example. This is a function which converts an integer into a vague description. It is useful where we are only concer

gui component handle its own events, A component can handle its own events...

A component can handle its own events by executing the needed event-listener interface and adding itself as its own event listener.

Encryption techniques to ensute secured transaction on net, Two popular enc...

Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.

Advantage of a numeric mailbox identifier, Does a numeric mailbox identifie...

Does a numeric mailbox identifier have any advantage over a mnemonic identifier? Explain. Several software systems permit the system administrator to select mailbox names, wher

What is basic analog design, What is basic Analog Design? Analog design...

What is basic Analog Design? Analog design is rather challenging than digital design as analog circuits are sensitive to noise, operating voltages, loading circumstances and ot

What do you mean by proc directive, Q. What do you mean by PROC Directive? ...

Q. What do you mean by PROC Directive? PROC Directive: Code segment comprises executable code for a program that includes one or more procedures defined initially with PROC dir

Design goals of computer system, Design goals: The correct form of a c...

Design goals: The correct form of a computer system depends on the constraints and aim for which it was optimized. Computer architectures frequently trade off   cost, standard

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd