How is basic authentication worked, Computer Engineering

Assignment Help:

How is basic authentication worked?

When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the response to the request, so as to notify the client which user credentials should be supplied in order for the resource to be returned like requested.

By receiving a 401-response header, the client's browser, when this supports fundamental authentication, will ask the user to supply a password and its username to be sent to the server. When you are using a graphical browser, as like Netscape or Internet Explorer which you will see is a box that pops up and provides you a place to type into your username and password, to be sent back to the server. When the username is into the approved list, and when the password supplied is accurate, the resource will be then returned to the client.

Since the HTTP protocol is stateless, every request will be treated in similar way, even if they are from similar client. It is, every resource that is requested from the server that will have to supply authentication credentials over again so as to receive the resource.

Luckily, the browser supports the details here, than you only have to type within your username and password one time per browser session - which is, you might have to type this in again the next time you open up your browser and visit similar web site.


Related Discussions:- How is basic authentication worked

C programming, At a shop of marbles, packs of marbles are prepared. Packets...

At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes

Various ways of floating point representation in memory, Describe the vario...

Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?

With what symbolic names can be associated, Symbolic names can be associate...

Symbolic names can be associated with? Ans. With data or instruction symbolic names associated.

Explain about the various features present in ms access, Microsoft access h...

Microsoft access has vast advantages for a programmer and end user. Some of the advantages are ? Relative compatibility with SQL and VBA. ? Microsoft SQL server desktop engi

Error handling in hard disk, Error handling in Hard disk in computer archit...

Error handling in Hard disk in computer architecture : Modern drives also make widespread use of Error Correcting Codes (ECCs), specifically Reed-Solomon error correction.

Data, Data, information and knowledge - Information System The nature ...

Data, information and knowledge - Information System The nature of information can most easily be defined in the context of its relationship to data and knowledge. Bohn (1994)

Describe critical directive in fortan, Q. Describe Critical Directive in FO...

Q. Describe Critical Directive in FORTAN? The critical directive permits one thread executes associated structured block. When one or more threads attain critical directive the

Explain what is a macro and why is it important, Question 1: Spreadshee...

Question 1: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software p

Challenges in changing information technology, Q: Challenges and Prospects ...

Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern

Which scheduling is suitable for time-shared operatin system, Which schedul...

Which scheduling policy is most suitable for a time-shared operating system? Ans. Round-Robin scheduling policy is most appropriate for a time-shared operating system.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd