1 | <!DOCTYPE html |
---|
2 | PUBLIC "-//W3C//DTD HTML 4.01//EN"> |
---|
3 | <html lang="en"> |
---|
4 | <head profile="http://www.w3.org/2006/03/hcard"> |
---|
5 | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> |
---|
6 | <title>HTTP/1.1, part 7: Authentication</title><style type="text/css" title="Xml2Rfc (sans serif)"> |
---|
7 | a { |
---|
8 | text-decoration: none; |
---|
9 | } |
---|
10 | a.smpl { |
---|
11 | color: black; |
---|
12 | } |
---|
13 | a:hover { |
---|
14 | text-decoration: underline; |
---|
15 | } |
---|
16 | a:active { |
---|
17 | text-decoration: underline; |
---|
18 | } |
---|
19 | address { |
---|
20 | margin-top: 1em; |
---|
21 | margin-left: 2em; |
---|
22 | font-style: normal; |
---|
23 | } |
---|
24 | body { |
---|
25 | color: black; |
---|
26 | font-family: verdana, helvetica, arial, sans-serif; |
---|
27 | font-size: 10pt; |
---|
28 | } |
---|
29 | cite { |
---|
30 | font-style: normal; |
---|
31 | } |
---|
32 | dd { |
---|
33 | margin-right: 2em; |
---|
34 | } |
---|
35 | dl { |
---|
36 | margin-left: 2em; |
---|
37 | } |
---|
38 | |
---|
39 | dl.empty dd { |
---|
40 | margin-top: .5em; |
---|
41 | } |
---|
42 | dl p { |
---|
43 | margin-left: 0em; |
---|
44 | } |
---|
45 | dt { |
---|
46 | margin-top: .5em; |
---|
47 | } |
---|
48 | h1 { |
---|
49 | font-size: 14pt; |
---|
50 | line-height: 21pt; |
---|
51 | page-break-after: avoid; |
---|
52 | } |
---|
53 | h1.np { |
---|
54 | page-break-before: always; |
---|
55 | } |
---|
56 | h1 a { |
---|
57 | color: #333333; |
---|
58 | } |
---|
59 | h2 { |
---|
60 | font-size: 12pt; |
---|
61 | line-height: 15pt; |
---|
62 | page-break-after: avoid; |
---|
63 | } |
---|
64 | h2 a { |
---|
65 | color: black; |
---|
66 | } |
---|
67 | h3 { |
---|
68 | font-size: 10pt; |
---|
69 | page-break-after: avoid; |
---|
70 | } |
---|
71 | h3 a { |
---|
72 | color: black; |
---|
73 | } |
---|
74 | h4 { |
---|
75 | font-size: 10pt; |
---|
76 | page-break-after: avoid; |
---|
77 | } |
---|
78 | h4 a { |
---|
79 | color: black; |
---|
80 | } |
---|
81 | h5 { |
---|
82 | font-size: 10pt; |
---|
83 | page-break-after: avoid; |
---|
84 | } |
---|
85 | h5 a { |
---|
86 | color: black; |
---|
87 | } |
---|
88 | img { |
---|
89 | margin-left: 3em; |
---|
90 | } |
---|
91 | li { |
---|
92 | margin-left: 2em; |
---|
93 | margin-right: 2em; |
---|
94 | } |
---|
95 | ol { |
---|
96 | margin-left: 2em; |
---|
97 | margin-right: 2em; |
---|
98 | } |
---|
99 | ol p { |
---|
100 | margin-left: 0em; |
---|
101 | } |
---|
102 | p { |
---|
103 | margin-left: 2em; |
---|
104 | margin-right: 2em; |
---|
105 | } |
---|
106 | pre { |
---|
107 | margin-left: 3em; |
---|
108 | background-color: lightyellow; |
---|
109 | padding: .25em; |
---|
110 | } |
---|
111 | pre.text2 { |
---|
112 | border-style: dotted; |
---|
113 | border-width: 1px; |
---|
114 | background-color: #f0f0f0; |
---|
115 | width: 69em; |
---|
116 | } |
---|
117 | pre.inline { |
---|
118 | background-color: white; |
---|
119 | padding: 0em; |
---|
120 | } |
---|
121 | pre.text { |
---|
122 | border-style: dotted; |
---|
123 | border-width: 1px; |
---|
124 | background-color: #f8f8f8; |
---|
125 | width: 69em; |
---|
126 | } |
---|
127 | pre.drawing { |
---|
128 | border-style: solid; |
---|
129 | border-width: 1px; |
---|
130 | background-color: #f8f8f8; |
---|
131 | padding: 2em; |
---|
132 | } |
---|
133 | table { |
---|
134 | margin-left: 2em; |
---|
135 | } |
---|
136 | table.header { |
---|
137 | width: 95%; |
---|
138 | font-size: 10pt; |
---|
139 | color: white; |
---|
140 | } |
---|
141 | td.top { |
---|
142 | vertical-align: top; |
---|
143 | } |
---|
144 | td.topnowrap { |
---|
145 | vertical-align: top; |
---|
146 | white-space: nowrap; |
---|
147 | } |
---|
148 | td.header { |
---|
149 | background-color: gray; |
---|
150 | width: 50%; |
---|
151 | } |
---|
152 | td.reference { |
---|
153 | vertical-align: top; |
---|
154 | white-space: nowrap; |
---|
155 | padding-right: 1em; |
---|
156 | } |
---|
157 | thead { |
---|
158 | display:table-header-group; |
---|
159 | } |
---|
160 | ul.toc { |
---|
161 | list-style: none; |
---|
162 | margin-left: 1.5em; |
---|
163 | margin-right: 0em; |
---|
164 | padding-left: 0em; |
---|
165 | } |
---|
166 | li.tocline0 { |
---|
167 | line-height: 150%; |
---|
168 | font-weight: bold; |
---|
169 | font-size: 10pt; |
---|
170 | margin-left: 0em; |
---|
171 | margin-right: 0em; |
---|
172 | } |
---|
173 | li.tocline1 { |
---|
174 | line-height: normal; |
---|
175 | font-weight: normal; |
---|
176 | font-size: 9pt; |
---|
177 | margin-left: 0em; |
---|
178 | margin-right: 0em; |
---|
179 | } |
---|
180 | li.tocline2 { |
---|
181 | font-size: 0pt; |
---|
182 | } |
---|
183 | ul p { |
---|
184 | margin-left: 0em; |
---|
185 | } |
---|
186 | ul.ind { |
---|
187 | list-style: none; |
---|
188 | margin-left: 1.5em; |
---|
189 | margin-right: 0em; |
---|
190 | padding-left: 0em; |
---|
191 | } |
---|
192 | li.indline0 { |
---|
193 | font-weight: bold; |
---|
194 | line-height: 200%; |
---|
195 | margin-left: 0em; |
---|
196 | margin-right: 0em; |
---|
197 | } |
---|
198 | li.indline1 { |
---|
199 | font-weight: normal; |
---|
200 | line-height: 150%; |
---|
201 | margin-left: 0em; |
---|
202 | margin-right: 0em; |
---|
203 | } |
---|
204 | .bcp14 { |
---|
205 | font-style: normal; |
---|
206 | text-transform: lowercase; |
---|
207 | font-variant: small-caps; |
---|
208 | } |
---|
209 | .comment { |
---|
210 | background-color: yellow; |
---|
211 | } |
---|
212 | .center { |
---|
213 | text-align: center; |
---|
214 | } |
---|
215 | .error { |
---|
216 | color: red; |
---|
217 | font-style: italic; |
---|
218 | font-weight: bold; |
---|
219 | } |
---|
220 | .figure { |
---|
221 | font-weight: bold; |
---|
222 | text-align: center; |
---|
223 | font-size: 9pt; |
---|
224 | } |
---|
225 | .filename { |
---|
226 | color: #333333; |
---|
227 | font-weight: bold; |
---|
228 | font-size: 12pt; |
---|
229 | line-height: 21pt; |
---|
230 | text-align: center; |
---|
231 | } |
---|
232 | .fn { |
---|
233 | font-weight: bold; |
---|
234 | } |
---|
235 | .hidden { |
---|
236 | display: none; |
---|
237 | } |
---|
238 | .left { |
---|
239 | text-align: left; |
---|
240 | } |
---|
241 | .right { |
---|
242 | text-align: right; |
---|
243 | } |
---|
244 | .title { |
---|
245 | color: #990000; |
---|
246 | font-size: 18pt; |
---|
247 | line-height: 18pt; |
---|
248 | font-weight: bold; |
---|
249 | text-align: center; |
---|
250 | margin-top: 36pt; |
---|
251 | } |
---|
252 | .vcardline { |
---|
253 | display: block; |
---|
254 | } |
---|
255 | .warning { |
---|
256 | font-size: 14pt; |
---|
257 | background-color: yellow; |
---|
258 | } |
---|
259 | |
---|
260 | |
---|
261 | @media print { |
---|
262 | .noprint { |
---|
263 | display: none; |
---|
264 | } |
---|
265 | |
---|
266 | a { |
---|
267 | color: black; |
---|
268 | text-decoration: none; |
---|
269 | } |
---|
270 | |
---|
271 | table.header { |
---|
272 | width: 90%; |
---|
273 | } |
---|
274 | |
---|
275 | td.header { |
---|
276 | width: 50%; |
---|
277 | color: black; |
---|
278 | background-color: white; |
---|
279 | vertical-align: top; |
---|
280 | font-size: 12pt; |
---|
281 | } |
---|
282 | |
---|
283 | ul.toc a::after { |
---|
284 | content: leader('.') target-counter(attr(href), page); |
---|
285 | } |
---|
286 | |
---|
287 | a.iref { |
---|
288 | content: target-counter(attr(href), page); |
---|
289 | } |
---|
290 | |
---|
291 | .print2col { |
---|
292 | column-count: 2; |
---|
293 | -moz-column-count: 2; |
---|
294 | column-fill: auto; |
---|
295 | } |
---|
296 | } |
---|
297 | |
---|
298 | @page { |
---|
299 | @top-left { |
---|
300 | content: "INTERNET DRAFT"; |
---|
301 | } |
---|
302 | @top-right { |
---|
303 | content: "December 2007"; |
---|
304 | } |
---|
305 | @top-center { |
---|
306 | content: "HTTP/1.1"; |
---|
307 | } |
---|
308 | @bottom-left { |
---|
309 | content: "Fielding, et al."; |
---|
310 | } |
---|
311 | @bottom-center { |
---|
312 | content: "Standards Track"; |
---|
313 | } |
---|
314 | @bottom-right { |
---|
315 | content: "[Page " counter(page) "]"; |
---|
316 | } |
---|
317 | } |
---|
318 | |
---|
319 | @page:first { |
---|
320 | @top-left { |
---|
321 | content: normal; |
---|
322 | } |
---|
323 | @top-right { |
---|
324 | content: normal; |
---|
325 | } |
---|
326 | @top-center { |
---|
327 | content: normal; |
---|
328 | } |
---|
329 | } |
---|
330 | </style><link rel="Contents" href="#rfc.toc"> |
---|
331 | <link rel="Author" href="#rfc.authors"> |
---|
332 | <link rel="Copyright" href="#rfc.copyright"> |
---|
333 | <link rel="Index" href="#rfc.index"> |
---|
334 | <link rel="Chapter" title="1 Introduction" href="#rfc.section.1"> |
---|
335 | <link rel="Chapter" title="2 Status Code Definitions" href="#rfc.section.2"> |
---|
336 | <link rel="Chapter" title="3 Header Field Definitions" href="#rfc.section.3"> |
---|
337 | <link rel="Chapter" title="4 IANA Considerations" href="#rfc.section.4"> |
---|
338 | <link rel="Chapter" title="5 Security Considerations" href="#rfc.section.5"> |
---|
339 | <link rel="Chapter" title="6 Acknowledgments" href="#rfc.section.6"> |
---|
340 | <link rel="Chapter" href="#rfc.section.7" title="7 References"> |
---|
341 | <meta name="generator" content="http://greenbytes.de/tech/webdav/rfc2629.xslt, Revision 1.353, 2007/12/11 23:20:44, XSLT vendor: SAXON 8.9 from Saxonica http://www.saxonica.com/"> |
---|
342 | <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/"> |
---|
343 | <meta name="DC.Creator" content="Fielding, R."> |
---|
344 | <meta name="DC.Creator" content="Gettys, J."> |
---|
345 | <meta name="DC.Creator" content="Mogul, J."> |
---|
346 | <meta name="DC.Creator" content="Frystyk, H."> |
---|
347 | <meta name="DC.Creator" content="Masinter, L."> |
---|
348 | <meta name="DC.Creator" content="Leach, P."> |
---|
349 | <meta name="DC.Creator" content="Berners-Lee, T."> |
---|
350 | <meta name="DC.Identifier" content="urn:ietf:id:draft-ietf-httpbis-p7-auth-latest"> |
---|
351 | <meta name="DC.Date.Issued" scheme="ISO8601" content="2007-12"> |
---|
352 | <meta name="DC.Relation.Replaces" content="urn:ietf:rfc:2068"> |
---|
353 | <meta name="DC.Relation.Replaces" content="urn:ietf:rfc:2616"> |
---|
354 | <meta name="DC.Description.Abstract" content="The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document is Part 7 of the seven-part specification that defines the protocol referred to as "HTTP/1.1" and, taken together, obsoletes RFC 2616. Part 7 defines HTTP Authentication."> |
---|
355 | </head> |
---|
356 | <body> |
---|
357 | <table summary="header information" class="header" border="0" cellpadding="1" cellspacing="1"> |
---|
358 | <tr> |
---|
359 | <td class="header left">Network Working Group</td> |
---|
360 | <td class="header right">R. Fielding, Editor</td> |
---|
361 | </tr> |
---|
362 | <tr> |
---|
363 | <td class="header left">Internet Draft</td> |
---|
364 | <td class="header right">Day Software</td> |
---|
365 | </tr> |
---|
366 | <tr> |
---|
367 | <td class="header left"> |
---|
368 | <draft-ietf-httpbis-p7-auth-latest> |
---|
369 | |
---|
370 | </td> |
---|
371 | <td class="header right">J. Gettys</td> |
---|
372 | </tr> |
---|
373 | <tr> |
---|
374 | <td class="header left">Obsoletes: <a href="http://tools.ietf.org/html/rfc2068">2068</a>, |
---|
375 | <a href="http://tools.ietf.org/html/rfc2616">2616</a> (if approved) |
---|
376 | </td> |
---|
377 | <td class="header right">One Laptop per Child</td> |
---|
378 | </tr> |
---|
379 | <tr> |
---|
380 | <td class="header left">Updates: <a href="http://tools.ietf.org/html/rfc2617">2617</a> (if approved) |
---|
381 | </td> |
---|
382 | <td class="header right">J. Mogul</td> |
---|
383 | </tr> |
---|
384 | <tr> |
---|
385 | <td class="header left">Intended status: Standards Track</td> |
---|
386 | <td class="header right">HP</td> |
---|
387 | </tr> |
---|
388 | <tr> |
---|
389 | <td class="header left">Expires: June 2008</td> |
---|
390 | <td class="header right">H. Frystyk</td> |
---|
391 | </tr> |
---|
392 | <tr> |
---|
393 | <td class="header left"></td> |
---|
394 | <td class="header right">Microsoft</td> |
---|
395 | </tr> |
---|
396 | <tr> |
---|
397 | <td class="header left"></td> |
---|
398 | <td class="header right">L. Masinter</td> |
---|
399 | </tr> |
---|
400 | <tr> |
---|
401 | <td class="header left"></td> |
---|
402 | <td class="header right">Adobe Systems</td> |
---|
403 | </tr> |
---|
404 | <tr> |
---|
405 | <td class="header left"></td> |
---|
406 | <td class="header right">P. Leach</td> |
---|
407 | </tr> |
---|
408 | <tr> |
---|
409 | <td class="header left"></td> |
---|
410 | <td class="header right">Microsoft</td> |
---|
411 | </tr> |
---|
412 | <tr> |
---|
413 | <td class="header left"></td> |
---|
414 | <td class="header right">T. Berners-Lee</td> |
---|
415 | </tr> |
---|
416 | <tr> |
---|
417 | <td class="header left"></td> |
---|
418 | <td class="header right">W3C/MIT</td> |
---|
419 | </tr> |
---|
420 | <tr> |
---|
421 | <td class="header left"></td> |
---|
422 | <td class="header right">December 2007</td> |
---|
423 | </tr> |
---|
424 | </table> |
---|
425 | <p class="title">HTTP/1.1, part 7: Authentication<br><span class="filename">draft-ietf-httpbis-p7-auth-latest</span></p> |
---|
426 | <h1><a id="rfc.status" href="#rfc.status">Status of this Memo</a></h1> |
---|
427 | <p>By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she |
---|
428 | is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section |
---|
429 | 6 of BCP 79. |
---|
430 | </p> |
---|
431 | <p>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note |
---|
432 | that other groups may also distribute working documents as Internet-Drafts. |
---|
433 | </p> |
---|
434 | <p>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other |
---|
435 | documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work |
---|
436 | in progress”. |
---|
437 | </p> |
---|
438 | <p>The list of current Internet-Drafts can be accessed at <<a href="http://www.ietf.org/ietf/1id-abstracts.txt">http://www.ietf.org/ietf/1id-abstracts.txt</a>>. |
---|
439 | </p> |
---|
440 | <p>The list of Internet-Draft Shadow Directories can be accessed at <<a href="http://www.ietf.org/shadow.html">http://www.ietf.org/shadow.html</a>>. |
---|
441 | </p> |
---|
442 | <p>This Internet-Draft will expire in June 2008.</p> |
---|
443 | <h1><a id="rfc.copyrightnotice" href="#rfc.copyrightnotice">Copyright Notice</a></h1> |
---|
444 | <p>Copyright © The IETF Trust (2007). All Rights Reserved.</p> |
---|
445 | <h1 id="rfc.abstract"><a href="#rfc.abstract">Abstract</a></h1> |
---|
446 | <p>The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information |
---|
447 | systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document is Part 7 of the |
---|
448 | seven-part specification that defines the protocol referred to as "HTTP/1.1" and, taken together, obsoletes RFC 2616. Part |
---|
449 | 7 defines HTTP Authentication. |
---|
450 | </p> |
---|
451 | <h1 id="rfc.note.1"><a href="#rfc.note.1">Editorial Note (To be removed by RFC Editor)</a></h1> |
---|
452 | <p>This version of the HTTP specification contains only minimal editorial changes from <a href="#RFC2616" id="rfc.xref.RFC2616.1"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2616]</cite></a> (abstract, introductory paragraph, and authors' addresses). All other changes are due to partitioning the original into seven |
---|
453 | mostly independent parts. The intent is for readers of future drafts to able to use draft 00 as the basis for comparison when |
---|
454 | the WG makes later changes to the specification text. This draft will shortly be followed by draft 01 (containing the first |
---|
455 | round of changes that have already been agreed to on the mailing list). There is no point in reviewing this draft other than |
---|
456 | to verify that the partitioning has been done correctly. Roy T. Fielding, Yves Lafon, and Julian Reschke will be the editors |
---|
457 | after draft 00 is submitted. |
---|
458 | </p> |
---|
459 | <p>Discussion of this draft should take place on the HTTPBIS working group mailing list (ietf-http-wg@w3.org). The current issues |
---|
460 | list is at <<a href="http://www.w3.org/Protocols/HTTP/1.1/rfc2616bis/issues/">http://www.w3.org/Protocols/HTTP/1.1/rfc2616bis/issues/</a>> and related documents (including fancy diffs) can be found at <<a href="http://www3.tools.ietf.org/wg/httpbis/">http://www3.tools.ietf.org/wg/httpbis/</a>>. |
---|
461 | </p> |
---|
462 | <hr class="noprint"> |
---|
463 | <h1 class="np" id="rfc.toc"><a href="#rfc.toc">Table of Contents</a></h1> |
---|
464 | <ul class="toc"> |
---|
465 | <li class="tocline0">1. <a href="#introduction">Introduction</a></li> |
---|
466 | <li class="tocline0">2. <a href="#rfc.section.2">Status Code Definitions</a><ul class="toc"> |
---|
467 | <li class="tocline1">2.1 <a href="#status.401">401 Unauthorized</a></li> |
---|
468 | <li class="tocline1">2.2 <a href="#status.407">407 Proxy Authentication Required</a></li> |
---|
469 | </ul> |
---|
470 | </li> |
---|
471 | <li class="tocline0">3. <a href="#header.fields">Header Field Definitions</a><ul class="toc"> |
---|
472 | <li class="tocline1">3.1 <a href="#header.authorization">Authorization</a></li> |
---|
473 | <li class="tocline1">3.2 <a href="#header.proxy-authenticate">Proxy-Authenticate</a></li> |
---|
474 | <li class="tocline1">3.3 <a href="#header.proxy-authorization">Proxy-Authorization</a></li> |
---|
475 | <li class="tocline1">3.4 <a href="#header.www-authenticate">WWW-Authenticate</a></li> |
---|
476 | </ul> |
---|
477 | </li> |
---|
478 | <li class="tocline0">4. <a href="#IANA.considerations">IANA Considerations</a></li> |
---|
479 | <li class="tocline0">5. <a href="#security.considerations">Security Considerations</a><ul class="toc"> |
---|
480 | <li class="tocline1">5.1 <a href="#auth.credentials.and.idle.clients">Authentication Credentials and Idle Clients</a></li> |
---|
481 | </ul> |
---|
482 | </li> |
---|
483 | <li class="tocline0">6. <a href="#ack">Acknowledgments</a></li> |
---|
484 | <li class="tocline0">7. <a href="#rfc.references">References</a></li> |
---|
485 | <li class="tocline0"><a href="#rfc.authors">Authors' Addresses</a></li> |
---|
486 | <li class="tocline0"><a href="#rfc.ipr">Intellectual Property and Copyright Statements</a></li> |
---|
487 | <li class="tocline0"><a href="#rfc.index">Index</a></li> |
---|
488 | </ul> |
---|
489 | <h1 id="rfc.section.1" class="np"><a href="#rfc.section.1">1.</a> <a id="introduction" href="#introduction">Introduction</a></h1> |
---|
490 | <p id="rfc.section.1.p.1">This document will define aspects of HTTP related to access control and authentication. Right now it only includes the extracted |
---|
491 | relevant sections of <a href="#RFC2616">RFC 2616</a> <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2616.2">[RFC2616]</cite> with only minor edits. |
---|
492 | </p> |
---|
493 | <p id="rfc.section.1.p.2">HTTP provides several <em class="bcp14">OPTIONAL</em> challenge-response authentication mechanisms which can be used by a server to challenge a client request and by a client to |
---|
494 | provide authentication information. The general framework for access authentication, and the specification of "basic" and |
---|
495 | "digest" authentication, are specified in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.1"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. This specification adopts the definitions of "challenge" and "credentials" from that specification. |
---|
496 | </p> |
---|
497 | <h1 id="rfc.section.2"><a href="#rfc.section.2">2.</a> Status Code Definitions |
---|
498 | </h1> |
---|
499 | <div id="rfc.iref."></div> |
---|
500 | <div id="rfc.iref.s.1"></div> |
---|
501 | <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a> <a id="status.401" href="#status.401">401 Unauthorized</a></h2> |
---|
502 | <p id="rfc.section.2.1.p.1">The request requires user authentication. The response <em class="bcp14">MUST</em> include a WWW-Authenticate header field (<a href="#header.www-authenticate" id="rfc.xref.header.www-authenticate.1" title="WWW-Authenticate">Section 3.4</a>) containing a challenge applicable to the requested resource. The client <em class="bcp14">MAY</em> repeat the request with a suitable Authorization header field (<a href="#header.authorization" id="rfc.xref.header.authorization.1" title="Authorization">Section 3.1</a>). If the request already included Authorization credentials, then the 401 response indicates that authorization has been |
---|
503 | refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has |
---|
504 | already attempted authentication at least once, then the user <em class="bcp14">SHOULD</em> be presented the entity that was given in the response, since that entity might include relevant diagnostic information. HTTP |
---|
505 | access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.2"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. |
---|
506 | </p> |
---|
507 | <div id="rfc.iref.1"></div> |
---|
508 | <div id="rfc.iref.s.2"></div> |
---|
509 | <h2 id="rfc.section.2.2"><a href="#rfc.section.2.2">2.2</a> <a id="status.407" href="#status.407">407 Proxy Authentication Required</a></h2> |
---|
510 | <p id="rfc.section.2.2.p.1">This code is similar to 401 (Unauthorized), but indicates that the client must first authenticate itself with the proxy. The |
---|
511 | proxy <em class="bcp14">MUST</em> return a Proxy-Authenticate header field (<a href="#header.proxy-authenticate" id="rfc.xref.header.proxy-authenticate.1" title="Proxy-Authenticate">Section 3.2</a>) containing a challenge applicable to the proxy for the requested resource. The client <em class="bcp14">MAY</em> repeat the request with a suitable Proxy-Authorization header field (<a href="#header.proxy-authorization" id="rfc.xref.header.proxy-authorization.1" title="Proxy-Authorization">Section 3.3</a>). HTTP access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.3"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. |
---|
512 | </p> |
---|
513 | <h1 id="rfc.section.3"><a href="#rfc.section.3">3.</a> <a id="header.fields" href="#header.fields">Header Field Definitions</a></h1> |
---|
514 | <p id="rfc.section.3.p.1">This section defines the syntax and semantics of all standard HTTP/1.1 header fields. For entity-header fields, both sender |
---|
515 | and recipient refer to either the client or the server, depending on who sends and who receives the entity. |
---|
516 | </p> |
---|
517 | <div id="rfc.iref.a.1"></div> |
---|
518 | <div id="rfc.iref.h.1"></div> |
---|
519 | <h2 id="rfc.section.3.1"><a href="#rfc.section.3.1">3.1</a> <a id="header.authorization" href="#header.authorization">Authorization</a></h2> |
---|
520 | <p id="rfc.section.3.1.p.1">A user agent that wishes to authenticate itself with a server-- usually, but not necessarily, after receiving a 401 response--does |
---|
521 | so by including an Authorization request-header field with the request. The Authorization field value consists of credentials |
---|
522 | containing the authentication information of the user agent for the realm of the resource being requested. |
---|
523 | </p> |
---|
524 | <div id="rfc.figure.u.1"></div><pre class="inline"><span id="rfc.iref.g.1"></span> Authorization = "Authorization" ":" credentials |
---|
525 | </pre><p id="rfc.section.3.1.p.3">HTTP access authentication is described in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.4"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. If a request is authenticated and a realm specified, the same credentials <em class="bcp14">SHOULD</em> be valid for all other requests within this realm (assuming that the authentication scheme itself does not require otherwise, |
---|
526 | such as credentials that vary according to a challenge value or using synchronized clocks). |
---|
527 | </p> |
---|
528 | <p id="rfc.section.3.1.p.4">When a shared cache (see <a href="p6-cache.html#shared.and.non-shared.caches" title="Shared and Non-Shared Caches">Section 2.7</a> of <a href="#Part6" id="rfc.xref.Part6.1"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) receives a request containing an Authorization field, it <em class="bcp14">MUST NOT</em> return the corresponding response as a reply to any other request, unless one of the following specific exceptions holds: |
---|
529 | </p> |
---|
530 | <p id="rfc.section.3.1.p.5"> </p> |
---|
531 | <ol> |
---|
532 | <li>If the response includes the "s-maxage" cache-control directive, the cache <em class="bcp14">MAY</em> use that response in replying to a subsequent request. But (if the specified maximum age has passed) a proxy cache <em class="bcp14">MUST</em> first revalidate it with the origin server, using the request-headers from the new request to allow the origin server to authenticate |
---|
533 | the new request. (This is the defined behavior for s-maxage.) If the response includes "s-maxage=0", the proxy <em class="bcp14">MUST</em> always revalidate it before re-using it. |
---|
534 | </li> |
---|
535 | <li>If the response includes the "must-revalidate" cache-control directive, the cache <em class="bcp14">MAY</em> use that response in replying to a subsequent request. But if the response is stale, all caches <em class="bcp14">MUST</em> first revalidate it with the origin server, using the request-headers from the new request to allow the origin server to authenticate |
---|
536 | the new request. |
---|
537 | </li> |
---|
538 | <li>If the response includes the "public" cache-control directive, it <em class="bcp14">MAY</em> be returned in reply to any subsequent request. |
---|
539 | </li> |
---|
540 | </ol> |
---|
541 | <div id="rfc.iref.p.1"></div> |
---|
542 | <div id="rfc.iref.h.2"></div> |
---|
543 | <h2 id="rfc.section.3.2"><a href="#rfc.section.3.2">3.2</a> <a id="header.proxy-authenticate" href="#header.proxy-authenticate">Proxy-Authenticate</a></h2> |
---|
544 | <p id="rfc.section.3.2.p.1">The Proxy-Authenticate response-header field <em class="bcp14">MUST</em> be included as part of a 407 (Proxy Authentication Required) response. The field value consists of a challenge that indicates |
---|
545 | the authentication scheme and parameters applicable to the proxy for this Request-URI. |
---|
546 | </p> |
---|
547 | <div id="rfc.figure.u.2"></div><pre class="inline"><span id="rfc.iref.g.2"></span> Proxy-Authenticate = "Proxy-Authenticate" ":" 1#challenge |
---|
548 | </pre><p id="rfc.section.3.2.p.3">The HTTP access authentication process is described in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.5"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. Unlike WWW-Authenticate, the Proxy-Authenticate header field applies only to the current connection and <em class="bcp14">SHOULD NOT</em> be passed on to downstream clients. However, an intermediate proxy might need to obtain its own credentials by requesting |
---|
549 | them from the downstream client, which in some circumstances will appear as if the proxy is forwarding the Proxy-Authenticate |
---|
550 | header field. |
---|
551 | </p> |
---|
552 | <div id="rfc.iref.p.2"></div> |
---|
553 | <div id="rfc.iref.h.3"></div> |
---|
554 | <h2 id="rfc.section.3.3"><a href="#rfc.section.3.3">3.3</a> <a id="header.proxy-authorization" href="#header.proxy-authorization">Proxy-Authorization</a></h2> |
---|
555 | <p id="rfc.section.3.3.p.1">The Proxy-Authorization request-header field allows the client to identify itself (or its user) to a proxy which requires |
---|
556 | authentication. The Proxy-Authorization field value consists of credentials containing the authentication information of the |
---|
557 | user agent for the proxy and/or realm of the resource being requested. |
---|
558 | </p> |
---|
559 | <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.g.3"></span> Proxy-Authorization = "Proxy-Authorization" ":" credentials |
---|
560 | </pre><p id="rfc.section.3.3.p.3">The HTTP access authentication process is described in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.6"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. Unlike Authorization, the Proxy-Authorization header field applies only to the next outbound proxy that demanded authentication |
---|
561 | using the Proxy-Authenticate field. When multiple proxies are used in a chain, the Proxy-Authorization header field is consumed |
---|
562 | by the first outbound proxy that was expecting to receive credentials. A proxy <em class="bcp14">MAY</em> relay the credentials from the client request to the next proxy if that is the mechanism by which the proxies cooperatively |
---|
563 | authenticate a given request. |
---|
564 | </p> |
---|
565 | <div id="rfc.iref.w.1"></div> |
---|
566 | <div id="rfc.iref.h.4"></div> |
---|
567 | <h2 id="rfc.section.3.4"><a href="#rfc.section.3.4">3.4</a> <a id="header.www-authenticate" href="#header.www-authenticate">WWW-Authenticate</a></h2> |
---|
568 | <p id="rfc.section.3.4.p.1">The WWW-Authenticate response-header field <em class="bcp14">MUST</em> be included in 401 (Unauthorized) response messages. The field value consists of at least one challenge that indicates the |
---|
569 | authentication scheme(s) and parameters applicable to the Request-URI. |
---|
570 | </p> |
---|
571 | <div id="rfc.figure.u.4"></div><pre class="inline"><span id="rfc.iref.g.4"></span> WWW-Authenticate = "WWW-Authenticate" ":" 1#challenge |
---|
572 | </pre><p id="rfc.section.3.4.p.3">The HTTP access authentication process is described in "HTTP Authentication: Basic and Digest Access Authentication" <a href="#RFC2617" id="rfc.xref.RFC2617.7"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>. User agents are advised to take special care in parsing the WWW-Authenticate field value as it might contain more than one |
---|
573 | challenge, or if more than one WWW-Authenticate header field is provided, the contents of a challenge itself can contain a |
---|
574 | comma-separated list of authentication parameters. |
---|
575 | </p> |
---|
576 | <h1 id="rfc.section.4"><a href="#rfc.section.4">4.</a> <a id="IANA.considerations" href="#IANA.considerations">IANA Considerations</a></h1> |
---|
577 | <p id="rfc.section.4.p.1">TBD.</p> |
---|
578 | <h1 id="rfc.section.5"><a href="#rfc.section.5">5.</a> <a id="security.considerations" href="#security.considerations">Security Considerations</a></h1> |
---|
579 | <p id="rfc.section.5.p.1">This section is meant to inform application developers, information providers, and users of the security limitations in HTTP/1.1 |
---|
580 | as described by this document. The discussion does not include definitive solutions to the problems revealed, though it does |
---|
581 | make some suggestions for reducing security risks. |
---|
582 | </p> |
---|
583 | <h2 id="rfc.section.5.1"><a href="#rfc.section.5.1">5.1</a> <a id="auth.credentials.and.idle.clients" href="#auth.credentials.and.idle.clients">Authentication Credentials and Idle Clients</a></h2> |
---|
584 | <p id="rfc.section.5.1.p.1">Existing HTTP clients and user agents typically retain authentication information indefinitely. HTTP/1.1. does not provide |
---|
585 | a method for a server to direct clients to discard these cached credentials. This is a significant defect that requires further |
---|
586 | extensions to HTTP. Circumstances under which credential caching can interfere with the application's security model include |
---|
587 | but are not limited to: |
---|
588 | </p> |
---|
589 | <ul> |
---|
590 | <li>Clients which have been idle for an extended period following which the server might wish to cause the client to reprompt |
---|
591 | the user for credentials. |
---|
592 | </li> |
---|
593 | <li>Applications which include a session termination indication (such as a `logout' or `commit' button on a page) after which |
---|
594 | the server side of the application `knows' that there is no further reason for the client to retain the credentials. |
---|
595 | </li> |
---|
596 | </ul> |
---|
597 | <p id="rfc.section.5.1.p.2">This is currently under separate study. There are a number of work-arounds to parts of this problem, and we encourage the |
---|
598 | use of password protection in screen savers, idle time-outs, and other methods which mitigate the security problems inherent |
---|
599 | in this problem. In particular, user agents which cache credentials are encouraged to provide a readily accessible mechanism |
---|
600 | for discarding cached credentials under user control. |
---|
601 | </p> |
---|
602 | <h1 id="rfc.section.6"><a href="#rfc.section.6">6.</a> <a id="ack" href="#ack">Acknowledgments</a></h1> |
---|
603 | <p id="rfc.section.6.p.1">Based on an XML translation of RFC 2616 by Julian Reschke.</p> |
---|
604 | <h1 id="rfc.references"><a href="#rfc.section.7" id="rfc.section.7">7.</a> References |
---|
605 | </h1> |
---|
606 | <table summary="References"> |
---|
607 | <tr> |
---|
608 | <td class="reference"><b id="Part6">[Part6]</b></td> |
---|
609 | <td class="top"><a title="Day Software">Fielding, R., Ed.</a>, <a title="One Laptop per Child">Gettys, J.</a>, <a title="Hewlett-Packard Company">Mogul, J.</a>, <a title="Microsoft Corporation">Frystyk, H.</a>, <a title="Adobe Systems, Incorporated">Masinter, L.</a>, <a title="Microsoft Corporation">Leach, P.</a>, and <a title="World Wide Web Consortium">T. Berners-Lee</a>, “<a href="http://tools.ietf.org/html/draft-fielding-p6-cache-latest">HTTP/1.1, part 6: Caching</a>”, Internet-Draft draft-fielding-p6-cache-latest (work in progress), December 2007. |
---|
610 | </td> |
---|
611 | </tr> |
---|
612 | <tr> |
---|
613 | <td class="reference"><b id="RFC2616">[RFC2616]</b></td> |
---|
614 | <td class="top"><a title="University of California, Irvine">Fielding, R.</a>, <a title="W3C">Gettys, J.</a>, <a title="Compaq Computer Corporation">Mogul, J.</a>, <a title="MIT Laboratory for Computer Science">Frystyk, H.</a>, <a title="Xerox Corporation">Masinter, L.</a>, <a title="Microsoft Corporation">Leach, P.</a>, and <a title="W3C">T. Berners-Lee</a>, “<a href="http://tools.ietf.org/html/rfc2616">Hypertext Transfer Protocol -- HTTP/1.1</a>”, RFC 2616, June 1999. |
---|
615 | </td> |
---|
616 | </tr> |
---|
617 | <tr> |
---|
618 | <td class="reference"><b id="RFC2617">[RFC2617]</b></td> |
---|
619 | <td class="top"><a title="Northwestern University, Department of Mathematics">Franks, J.</a>, <a title="Verisign Inc.">Hallam-Baker, P.M.</a>, <a title="AbiSource, Inc.">Hostetler, J.L.</a>, <a title="Agranat Systems, Inc.">Lawrence, S.D.</a>, <a title="Microsoft Corporation">Leach, P.J.</a>, Luotonen, A., and <a title="Open Market, Inc.">L. Stewart</a>, “<a href="http://tools.ietf.org/html/rfc2617">HTTP Authentication: Basic and Digest Access Authentication</a>”, RFC 2617, June 1999. |
---|
620 | </td> |
---|
621 | </tr> |
---|
622 | </table> |
---|
623 | <h1 id="rfc.authors"><a href="#rfc.authors">Authors' Addresses</a></h1> |
---|
624 | <address class="vcard"><span class="vcardline"><span class="fn">Roy T. Fielding</span> |
---|
625 | (editor) |
---|
626 | <span class="n hidden"><span class="family-name">Fielding</span><span class="given-name">Roy T.</span></span></span><span class="org vcardline">Day Software</span><span class="adr"><span class="street-address vcardline">23 Corporate Plaza DR, Suite 280</span><span class="vcardline"><span class="locality">Newport Beach</span>, <span class="region">CA</span> <span class="postal-code">92660</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline tel">Phone: <a href="tel:+1-949-706-5300"><span class="value">+1-949-706-5300</span></a></span><span class="vcardline tel"><span class="type">Fax</span>: <a href="fax:+1-949-706-5305"><span class="value">+1-949-706-5305</span></a></span><span class="vcardline">EMail: <a><span class="email">fielding@gbiv.com</span></a></span><span class="vcardline">URI: <a href="http://roy.gbiv.com/" class="url">http://roy.gbiv.com/</a></span></address> |
---|
627 | <address class="vcard"><span class="vcardline"><span class="fn">Jim Gettys</span><span class="n hidden"><span class="family-name">Gettys</span><span class="given-name">Jim</span></span></span><span class="org vcardline">One Laptop per Child</span><span class="adr"><span class="street-address vcardline">21 Oak Knoll Road</span><span class="vcardline"><span class="locality">Carlisle</span>, <span class="region">MA</span> <span class="postal-code">01741</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">EMail: <a><span class="email">jg@laptop.org</span></a></span><span class="vcardline">URI: <a href="http://www.laptop.org/" class="url">http://www.laptop.org/</a></span></address> |
---|
628 | <address class="vcard"><span class="vcardline"><span class="fn">Jeffrey C. Mogul</span><span class="n hidden"><span class="family-name">Mogul</span><span class="given-name">Jeffrey C.</span></span></span><span class="org vcardline">Hewlett-Packard Company</span><span class="adr"><span class="street-address vcardline">HP Labs, Large Scale Systems Group</span><span class="street-address vcardline">1501 Page Mill Road, MS 1177</span><span class="vcardline"><span class="locality">Palo Alto</span>, <span class="region">CA</span> <span class="postal-code">94304</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">EMail: <a><span class="email">JeffMogul@acm.org</span></a></span></address> |
---|
629 | <address class="vcard"><span class="vcardline"><span class="fn">Henrik Frystyk Nielsen</span><span class="n hidden"><span class="family-name">Frystyk</span></span></span><span class="org vcardline">Microsoft Corporation</span><span class="adr"><span class="street-address vcardline">1 Microsoft Way</span><span class="vcardline"><span class="locality">Redmond</span>, <span class="region">WA</span> <span class="postal-code">98052</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">EMail: <a><span class="email">henrikn@microsoft.com</span></a></span></address> |
---|
630 | <address class="vcard"><span class="vcardline"><span class="fn">Larry Masinter</span><span class="n hidden"><span class="family-name">Masinter</span><span class="given-name">Larry</span></span></span><span class="org vcardline">Adobe Systems, Incorporated</span><span class="adr"><span class="street-address vcardline">345 Park Ave</span><span class="vcardline"><span class="locality">San Jose</span>, <span class="region">CA</span> <span class="postal-code">95110</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">EMail: <a><span class="email">LMM@acm.org</span></a></span><span class="vcardline">URI: <a href="http://larry.masinter.net/" class="url">http://larry.masinter.net/</a></span></address> |
---|
631 | <address class="vcard"><span class="vcardline"><span class="fn">Paul J. Leach</span><span class="n hidden"><span class="family-name">Leach</span><span class="given-name">Paul J.</span></span></span><span class="org vcardline">Microsoft Corporation</span><span class="adr"><span class="street-address vcardline">1 Microsoft Way</span><span class="vcardline"><span class="locality">Redmond</span>, <span class="region">WA</span> <span class="postal-code">98052</span></span></span><span class="vcardline">EMail: <a><span class="email">paulle@microsoft.com</span></a></span></address> |
---|
632 | <address class="vcard"><span class="vcardline"><span class="fn">Tim Berners-Lee</span><span class="n hidden"><span class="family-name">Berners-Lee</span><span class="given-name">Tim</span></span></span><span class="org vcardline">World Wide Web Consortium</span><span class="adr"><span class="street-address vcardline">MIT Computer Science and Artificial Intelligence Laboratory</span><span class="street-address vcardline">The Stata Center, Building 32</span><span class="street-address vcardline">32 Vassar Street</span><span class="vcardline"><span class="locality">Cambridge</span>, <span class="region">MA</span> <span class="postal-code">02139</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">EMail: <a><span class="email">timbl@w3.org</span></a></span><span class="vcardline">URI: <a href="http://www.w3.org/People/Berners-Lee/" class="url">http://www.w3.org/People/Berners-Lee/</a></span></address> |
---|
633 | <h1><a id="rfc.copyright" href="#rfc.copyright">Full Copyright Statement</a></h1> |
---|
634 | <p>Copyright © The IETF Trust (2007).</p> |
---|
635 | <p>This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the |
---|
636 | authors retain all their rights. |
---|
637 | </p> |
---|
638 | <p>This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION |
---|
639 | HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE |
---|
640 | DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN |
---|
641 | WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. |
---|
642 | </p> |
---|
643 | <h1><a id="rfc.ipr" href="#rfc.ipr">Intellectual Property</a></h1> |
---|
644 | <p>The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might |
---|
645 | be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any |
---|
646 | license under such rights might or might not be available; nor does it represent that it has made any independent effort to |
---|
647 | identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and |
---|
648 | BCP 79. |
---|
649 | </p> |
---|
650 | <p>Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result |
---|
651 | of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users |
---|
652 | of this specification can be obtained from the IETF on-line IPR repository at <<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>>. |
---|
653 | </p> |
---|
654 | <p>The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary |
---|
655 | rights that may cover technology that may be required to implement this standard. Please address the information to the IETF |
---|
656 | at <a href="mailto:ietf-ipr@ietf.org">ietf-ipr@ietf.org</a>. |
---|
657 | </p> |
---|
658 | <h1>Acknowledgement</h1> |
---|
659 | <p>Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA).</p> |
---|
660 | <h1 id="rfc.index"><a href="#rfc.index">Index</a></h1> |
---|
661 | <p class="noprint"><a href="#rfc.index.4">4</a> <a href="#rfc.index.A">A</a> <a href="#rfc.index.G">G</a> <a href="#rfc.index.H">H</a> <a href="#rfc.index.P">P</a> <a href="#rfc.index.R">R</a> <a href="#rfc.index.S">S</a> <a href="#rfc.index.W">W</a> |
---|
662 | </p> |
---|
663 | <div class="print2col"> |
---|
664 | <ul class="ind"> |
---|
665 | <li class="indline0"><a id="rfc.index.4" href="#rfc.index.4"><b>4</b></a><ul class="ind"> |
---|
666 | <li class="indline1">401 Unauthorized (status code) <a class="iref" href="#rfc.iref."><b>2.1</b></a></li> |
---|
667 | <li class="indline1">407 Proxy Authentication Required (status code) <a class="iref" href="#rfc.iref.1"><b>2.2</b></a></li> |
---|
668 | </ul> |
---|
669 | </li> |
---|
670 | <li class="indline0"><a id="rfc.index.A" href="#rfc.index.A"><b>A</b></a><ul class="ind"> |
---|
671 | <li class="indline1">Authorization header <a class="iref" href="#rfc.xref.header.authorization.1">2.1</a>, <a class="iref" href="#rfc.iref.a.1"><b>3.1</b></a></li> |
---|
672 | </ul> |
---|
673 | </li> |
---|
674 | <li class="indline0"><a id="rfc.index.G" href="#rfc.index.G"><b>G</b></a><ul class="ind"> |
---|
675 | <li class="indline1"><tt>Grammar</tt> |
---|
676 | <ul class="ind"> |
---|
677 | <li class="indline1"><tt>Authorization</tt> <a class="iref" href="#rfc.iref.g.1"><b>3.1</b></a></li> |
---|
678 | <li class="indline1"><tt>Proxy-Authenticate</tt> <a class="iref" href="#rfc.iref.g.2"><b>3.2</b></a></li> |
---|
679 | <li class="indline1"><tt>Proxy-Authorization</tt> <a class="iref" href="#rfc.iref.g.3"><b>3.3</b></a></li> |
---|
680 | <li class="indline1"><tt>WWW-Authenticate</tt> <a class="iref" href="#rfc.iref.g.4"><b>3.4</b></a></li> |
---|
681 | </ul> |
---|
682 | </li> |
---|
683 | </ul> |
---|
684 | </li> |
---|
685 | <li class="indline0"><a id="rfc.index.H" href="#rfc.index.H"><b>H</b></a><ul class="ind"> |
---|
686 | <li class="indline1">Headers |
---|
687 | <ul class="ind"> |
---|
688 | <li class="indline1">Authorization <a class="iref" href="#rfc.xref.header.authorization.1">2.1</a>, <a class="iref" href="#rfc.iref.h.1"><b>3.1</b></a></li> |
---|
689 | <li class="indline1">Proxy-Authenticate <a class="iref" href="#rfc.xref.header.proxy-authenticate.1">2.2</a>, <a class="iref" href="#rfc.iref.h.2"><b>3.2</b></a></li> |
---|
690 | <li class="indline1">Proxy-Authorization <a class="iref" href="#rfc.xref.header.proxy-authorization.1">2.2</a>, <a class="iref" href="#rfc.iref.h.3"><b>3.3</b></a></li> |
---|
691 | <li class="indline1">WWW-Authenticate <a class="iref" href="#rfc.xref.header.www-authenticate.1">2.1</a>, <a class="iref" href="#rfc.iref.h.4"><b>3.4</b></a></li> |
---|
692 | </ul> |
---|
693 | </li> |
---|
694 | </ul> |
---|
695 | </li> |
---|
696 | <li class="indline0"><a id="rfc.index.P" href="#rfc.index.P"><b>P</b></a><ul class="ind"> |
---|
697 | <li class="indline1"><em>Part6</em> <a class="iref" href="#rfc.xref.Part6.1">3.1</a>, <a class="iref" href="#Part6"><b>7</b></a><ul class="ind"> |
---|
698 | <li class="indline1"><em>Section 2.7</em> <a class="iref" href="#rfc.xref.Part6.1">3.1</a></li> |
---|
699 | </ul> |
---|
700 | </li> |
---|
701 | <li class="indline1">Proxy-Authenticate header <a class="iref" href="#rfc.xref.header.proxy-authenticate.1">2.2</a>, <a class="iref" href="#rfc.iref.p.1"><b>3.2</b></a></li> |
---|
702 | <li class="indline1">Proxy-Authorization header <a class="iref" href="#rfc.xref.header.proxy-authorization.1">2.2</a>, <a class="iref" href="#rfc.iref.p.2"><b>3.3</b></a></li> |
---|
703 | </ul> |
---|
704 | </li> |
---|
705 | <li class="indline0"><a id="rfc.index.R" href="#rfc.index.R"><b>R</b></a><ul class="ind"> |
---|
706 | <li class="indline1"><em>RFC2616</em> <a class="iref" href="#rfc.xref.RFC2616.1">§</a>, <a class="iref" href="#rfc.xref.RFC2616.2">1</a>, <a class="iref" href="#RFC2616"><b>7</b></a></li> |
---|
707 | <li class="indline1"><em>RFC2617</em> <a class="iref" href="#rfc.xref.RFC2617.1">1</a>, <a class="iref" href="#rfc.xref.RFC2617.2">2.1</a>, <a class="iref" href="#rfc.xref.RFC2617.3">2.2</a>, <a class="iref" href="#rfc.xref.RFC2617.4">3.1</a>, <a class="iref" href="#rfc.xref.RFC2617.5">3.2</a>, <a class="iref" href="#rfc.xref.RFC2617.6">3.3</a>, <a class="iref" href="#rfc.xref.RFC2617.7">3.4</a>, <a class="iref" href="#RFC2617"><b>7</b></a></li> |
---|
708 | </ul> |
---|
709 | </li> |
---|
710 | <li class="indline0"><a id="rfc.index.S" href="#rfc.index.S"><b>S</b></a><ul class="ind"> |
---|
711 | <li class="indline1">Status Codes |
---|
712 | <ul class="ind"> |
---|
713 | <li class="indline1">401 Unauthorized <a class="iref" href="#rfc.iref.s.1"><b>2.1</b></a></li> |
---|
714 | <li class="indline1">407 Proxy Authentication Required <a class="iref" href="#rfc.iref.s.2"><b>2.2</b></a></li> |
---|
715 | </ul> |
---|
716 | </li> |
---|
717 | </ul> |
---|
718 | </li> |
---|
719 | <li class="indline0"><a id="rfc.index.W" href="#rfc.index.W"><b>W</b></a><ul class="ind"> |
---|
720 | <li class="indline1">WWW-Authenticate header <a class="iref" href="#rfc.xref.header.www-authenticate.1">2.1</a>, <a class="iref" href="#rfc.iref.w.1"><b>3.4</b></a></li> |
---|
721 | </ul> |
---|
722 | </li> |
---|
723 | </ul> |
---|
724 | </div> |
---|
725 | </body> |
---|
726 | </html> |
---|