HTTP Authentication Extensions for Interactive Clients
نویسندگان
چکیده
This document specifies a few extensions of HTTP authentication framework for interactive clients. Recently, fundamental features of HTTP-level authentication is not enough for complex requirements of various Web-based applications. This makes these applications to implement their own authentication frameworks using HTML Forms and other means, which becomes one of the hurdles against introducing secure authentication mechanisms handled jointly by servers and user-agent clients. The extended framework fills gaps between Web application requirements and HTTP authentication provisions to solve the above problems, while maintaining compatibility against existing Web and non-Web uses of HTTP authentications.
منابع مشابه
RADIUS Authentication Client MIB
This memo defines a set of extensions which instrument RADIUS authentication client functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS authentication clients.
متن کاملSecure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)
The Secure Shell (SSH) protocol requires all implementations to support public key authentication method (“publickey”) for authentication purposes [2]. Hypertext Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support “publickey”. However, restrictions in HTTP, such as Same Origin Policy, make it difficult to perform such authentications. In this do...
متن کاملReducing the X.509 Attack Surface with DNSSEC’s DANE
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed by web browsers (which runs over the Secure Sockets Layer, SSL or its successor, TLS). In HTTPS, any service (such as a website) may create its own cryptographic certificate to secure its communication channel, and clients use this certificate to verify data from, and...
متن کاملA Dynamic Customization Model for Distributed Component-Based Systems
Support for dynamic and client-specific customization of distributed services is required in many application areas. We present a distributed service as consisting of a minimal functional core – implemented as a component-based system, and an unbound set of potential extensions that can be selectively integrated within this core functionality. An extension to this core may be a new service, due...
متن کاملUse Cases and Requirements for DNS-Based Authentication of Named Entities (DANE)
Many current applications use the certificate-based authentication features in Transport Layer Security (TLS) to allow clients to verify that a connected server properly represents a desired domain name. Typically, this authentication has been based on PKIX certificate chains rooted in well-known certificate authorities (CAs), but additional information can be provided via the DNS itself. This ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- RFC
دوره 8053 شماره
صفحات -
تاریخ انتشار 2017