Difference between revisions of "Auth methods in http"

From UVOO Tech Wiki
Jump to navigation Jump to search
(Created page with "``` Basic Authentication: This is the simplest form of HTTP authentication, where the client sends the username and password encoded in Base64 format in the Authorization head...")
 
(No difference)

Latest revision as of 21:08, 3 May 2024

Basic Authentication: This is the simplest form of HTTP authentication, where the client sends the username and password encoded in Base64 format in the Authorization header. For example:
makefile
Copy code
Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
Bearer Token: This is commonly used in token-based authentication schemes like OAuth 2.0. The client sends a token in the Authorization header prefixed with the word "Bearer". For example:
makefile
Copy code
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
Digest Authentication: This is a more secure form of authentication compared to Basic Authentication. It involves a challenge-response mechanism where the client sends a hash of the username, password, and other request-specific information. For example:
sql
Copy code
Authorization: Digest username="user", realm="example", nonce="dcd98b7102dd2f0e8b11d0f600bfb0c093", uri="/", qop=auth, nc=00000001, cnonce="0a4f113b", response="6629fae49393a05397450978507c4ef1"
AWS Signature Version 4: This is used for authentication in Amazon Web Services (AWS) API requests. It involves signing the request with access key credentials. For example:
bash
Copy code
Authorization: AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20210525/us-east-1/s3/aws4_request, SignedHeaders=host;x-amz-content-sha256;x-amz-date, Signature=6d86bb16442e7d53834b7ed6dce825a8e7878cfb31dc9cd30c5b3dc5b858b3d8
These are just a few examples of authorization mechanisms used in HTTP headers. The choice of mechanism depends on the specific requirements of the application and the security standards being followed.