1 | <!DOCTYPE html |
---|
2 | PUBLIC "-//W3C//DTD HTML 4.01//EN"> |
---|
3 | <html lang="en"> |
---|
4 | <head profile="http://www.w3.org/2006/03/hcard http://dublincore.org/documents/2008/08/04/dc-html/"> |
---|
5 | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> |
---|
6 | <title>HTTP/1.1, part 7: Authentication</title><script> |
---|
7 | var buttonsAdded = false; |
---|
8 | |
---|
9 | function init() { |
---|
10 | var fb = document.createElement("div"); |
---|
11 | fb.className = "feedback noprint"; |
---|
12 | fb.setAttribute("onclick", "feedback();"); |
---|
13 | fb.appendChild(document.createTextNode("feedback")); |
---|
14 | |
---|
15 | var bodyl = document.getElementsByTagName("body"); |
---|
16 | bodyl.item(0).appendChild(fb); |
---|
17 | } |
---|
18 | |
---|
19 | function feedback() { |
---|
20 | toggleButtonsToElementsByName("h1"); |
---|
21 | toggleButtonsToElementsByName("h2"); |
---|
22 | toggleButtonsToElementsByName("h3"); |
---|
23 | toggleButtonsToElementsByName("h4"); |
---|
24 | |
---|
25 | buttonsAdded = !buttonsAdded; |
---|
26 | } |
---|
27 | |
---|
28 | function toggleButtonsToElementsByName(name) { |
---|
29 | var list = document.getElementsByTagName(name); |
---|
30 | for (var i = 0; i < list.length; i++) { |
---|
31 | toggleButton(list.item(i)); |
---|
32 | } |
---|
33 | } |
---|
34 | |
---|
35 | function toggleButton(node) { |
---|
36 | if (! buttonsAdded) { |
---|
37 | |
---|
38 | // docname |
---|
39 | var template = "mailto:ietf-http-wg@w3.org?subject={docname},%20%22{section}%22&body=<{ref}>:"; |
---|
40 | |
---|
41 | var id = node.getAttribute("id"); |
---|
42 | // better id available? |
---|
43 | var titlelinks = node.getElementsByTagName("a"); |
---|
44 | for (var i = 0; i < titlelinks.length; i++) { |
---|
45 | var tl = titlelinks.item(i); |
---|
46 | if (tl.getAttribute("id")) { |
---|
47 | id = tl.getAttribute("id"); |
---|
48 | } |
---|
49 | } |
---|
50 | |
---|
51 | // ref |
---|
52 | var ref = window.location.toString(); |
---|
53 | var hash = ref.indexOf("#"); |
---|
54 | if (hash != -1) { |
---|
55 | ref = ref.substring(0, hash); |
---|
56 | } |
---|
57 | if (id != "") { |
---|
58 | ref += "#" + id; |
---|
59 | } |
---|
60 | |
---|
61 | // docname |
---|
62 | var docname = "draft-ietf-httpbis-p7-auth-latest"; |
---|
63 | |
---|
64 | // section |
---|
65 | var section = node.textContent; |
---|
66 | section = section.replace("\u00a0", " "); |
---|
67 | |
---|
68 | // build URI from template |
---|
69 | var uri = template.replace("{docname}", encodeURIComponent(docname)); |
---|
70 | uri = uri.replace("{section}", encodeURIComponent(section)); |
---|
71 | uri = uri.replace("{ref}", encodeURIComponent(ref)); |
---|
72 | |
---|
73 | var button = document.createElement("a"); |
---|
74 | button.className = "fbbutton noprint"; |
---|
75 | button.setAttribute("href", uri); |
---|
76 | button.appendChild(document.createTextNode("send feedback")); |
---|
77 | node.appendChild(button); |
---|
78 | } |
---|
79 | else { |
---|
80 | var buttons = node.getElementsByTagName("a"); |
---|
81 | for (var i = 0; i < buttons.length; i++) { |
---|
82 | var b = buttons.item(i); |
---|
83 | if (b.className == "fbbutton noprint") { |
---|
84 | node.removeChild(b); |
---|
85 | } |
---|
86 | } |
---|
87 | } |
---|
88 | }</script><style type="text/css" title="Xml2Rfc (sans serif)"> |
---|
89 | a { |
---|
90 | text-decoration: none; |
---|
91 | } |
---|
92 | a.smpl { |
---|
93 | color: black; |
---|
94 | } |
---|
95 | a:hover { |
---|
96 | text-decoration: underline; |
---|
97 | } |
---|
98 | a:active { |
---|
99 | text-decoration: underline; |
---|
100 | } |
---|
101 | address { |
---|
102 | margin-top: 1em; |
---|
103 | margin-left: 2em; |
---|
104 | font-style: normal; |
---|
105 | } |
---|
106 | body { |
---|
107 | color: black; |
---|
108 | font-family: verdana, helvetica, arial, sans-serif; |
---|
109 | font-size: 10pt; |
---|
110 | } |
---|
111 | cite { |
---|
112 | font-style: normal; |
---|
113 | } |
---|
114 | div.note { |
---|
115 | margin-left: 2em; |
---|
116 | } |
---|
117 | dd { |
---|
118 | margin-right: 2em; |
---|
119 | } |
---|
120 | dl { |
---|
121 | margin-left: 2em; |
---|
122 | } |
---|
123 | |
---|
124 | ul.empty { |
---|
125 | list-style-type: none; |
---|
126 | } |
---|
127 | ul.empty li { |
---|
128 | margin-top: .5em; |
---|
129 | } |
---|
130 | dl p { |
---|
131 | margin-left: 0em; |
---|
132 | } |
---|
133 | dt { |
---|
134 | margin-top: .5em; |
---|
135 | } |
---|
136 | h1 { |
---|
137 | font-size: 14pt; |
---|
138 | line-height: 21pt; |
---|
139 | page-break-after: avoid; |
---|
140 | } |
---|
141 | h1.np { |
---|
142 | page-break-before: always; |
---|
143 | } |
---|
144 | h1 a { |
---|
145 | color: #333333; |
---|
146 | } |
---|
147 | h2 { |
---|
148 | font-size: 12pt; |
---|
149 | line-height: 15pt; |
---|
150 | page-break-after: avoid; |
---|
151 | } |
---|
152 | h3, h4, h5, h6 { |
---|
153 | font-size: 10pt; |
---|
154 | page-break-after: avoid; |
---|
155 | } |
---|
156 | h2 a, h3 a, h4 a, h5 a, h6 a { |
---|
157 | color: black; |
---|
158 | } |
---|
159 | img { |
---|
160 | margin-left: 3em; |
---|
161 | } |
---|
162 | li { |
---|
163 | margin-left: 2em; |
---|
164 | margin-right: 2em; |
---|
165 | } |
---|
166 | ol { |
---|
167 | margin-left: 2em; |
---|
168 | margin-right: 2em; |
---|
169 | } |
---|
170 | ol.la { |
---|
171 | list-style-type: lower-alpha; |
---|
172 | } |
---|
173 | ol.ua { |
---|
174 | list-style-type: upper-alpha; |
---|
175 | } |
---|
176 | ol p { |
---|
177 | margin-left: 0em; |
---|
178 | } |
---|
179 | p { |
---|
180 | margin-left: 2em; |
---|
181 | margin-right: 2em; |
---|
182 | } |
---|
183 | pre { |
---|
184 | margin-left: 3em; |
---|
185 | background-color: lightyellow; |
---|
186 | padding: .25em; |
---|
187 | } |
---|
188 | pre.text2 { |
---|
189 | border-style: dotted; |
---|
190 | border-width: 1px; |
---|
191 | background-color: #f0f0f0; |
---|
192 | width: 69em; |
---|
193 | } |
---|
194 | pre.inline { |
---|
195 | background-color: white; |
---|
196 | padding: 0em; |
---|
197 | } |
---|
198 | pre.text { |
---|
199 | border-style: dotted; |
---|
200 | border-width: 1px; |
---|
201 | background-color: #f8f8f8; |
---|
202 | width: 69em; |
---|
203 | } |
---|
204 | pre.drawing { |
---|
205 | border-style: solid; |
---|
206 | border-width: 1px; |
---|
207 | background-color: #f8f8f8; |
---|
208 | padding: 2em; |
---|
209 | } |
---|
210 | table { |
---|
211 | margin-left: 2em; |
---|
212 | } |
---|
213 | table.tt { |
---|
214 | vertical-align: top; |
---|
215 | } |
---|
216 | table.full { |
---|
217 | border-style: outset; |
---|
218 | border-width: 1px; |
---|
219 | } |
---|
220 | table.headers { |
---|
221 | border-style: outset; |
---|
222 | border-width: 1px; |
---|
223 | } |
---|
224 | table.tt td { |
---|
225 | vertical-align: top; |
---|
226 | } |
---|
227 | table.full td { |
---|
228 | border-style: inset; |
---|
229 | border-width: 1px; |
---|
230 | } |
---|
231 | table.tt th { |
---|
232 | vertical-align: top; |
---|
233 | } |
---|
234 | table.full th { |
---|
235 | border-style: inset; |
---|
236 | border-width: 1px; |
---|
237 | } |
---|
238 | table.headers th { |
---|
239 | border-style: none none inset none; |
---|
240 | border-width: 1px; |
---|
241 | } |
---|
242 | table.left { |
---|
243 | margin-right: auto; |
---|
244 | } |
---|
245 | table.right { |
---|
246 | margin-left: auto; |
---|
247 | } |
---|
248 | table.center { |
---|
249 | margin-left: auto; |
---|
250 | margin-right: auto; |
---|
251 | } |
---|
252 | caption { |
---|
253 | caption-side: bottom; |
---|
254 | font-weight: bold; |
---|
255 | font-size: 9pt; |
---|
256 | margin-top: .5em; |
---|
257 | } |
---|
258 | |
---|
259 | table.header { |
---|
260 | border-spacing: 1px; |
---|
261 | width: 95%; |
---|
262 | font-size: 10pt; |
---|
263 | color: white; |
---|
264 | } |
---|
265 | td.top { |
---|
266 | vertical-align: top; |
---|
267 | } |
---|
268 | td.topnowrap { |
---|
269 | vertical-align: top; |
---|
270 | white-space: nowrap; |
---|
271 | } |
---|
272 | table.header td { |
---|
273 | background-color: gray; |
---|
274 | width: 50%; |
---|
275 | } |
---|
276 | table.header a { |
---|
277 | color: white; |
---|
278 | } |
---|
279 | td.reference { |
---|
280 | vertical-align: top; |
---|
281 | white-space: nowrap; |
---|
282 | padding-right: 1em; |
---|
283 | } |
---|
284 | thead { |
---|
285 | display:table-header-group; |
---|
286 | } |
---|
287 | ul.toc, ul.toc ul { |
---|
288 | list-style: none; |
---|
289 | margin-left: 1.5em; |
---|
290 | margin-right: 0em; |
---|
291 | padding-left: 0em; |
---|
292 | } |
---|
293 | ul.toc li { |
---|
294 | line-height: 150%; |
---|
295 | font-weight: bold; |
---|
296 | font-size: 10pt; |
---|
297 | margin-left: 0em; |
---|
298 | margin-right: 0em; |
---|
299 | } |
---|
300 | ul.toc li li { |
---|
301 | line-height: normal; |
---|
302 | font-weight: normal; |
---|
303 | font-size: 9pt; |
---|
304 | margin-left: 0em; |
---|
305 | margin-right: 0em; |
---|
306 | } |
---|
307 | li.excluded { |
---|
308 | font-size: 0pt; |
---|
309 | } |
---|
310 | ul p { |
---|
311 | margin-left: 0em; |
---|
312 | } |
---|
313 | ul.ind, ul.ind ul { |
---|
314 | list-style: none; |
---|
315 | margin-left: 1.5em; |
---|
316 | margin-right: 0em; |
---|
317 | padding-left: 0em; |
---|
318 | page-break-before: avoid; |
---|
319 | } |
---|
320 | ul.ind li { |
---|
321 | font-weight: bold; |
---|
322 | line-height: 200%; |
---|
323 | margin-left: 0em; |
---|
324 | margin-right: 0em; |
---|
325 | } |
---|
326 | ul.ind li li { |
---|
327 | font-weight: normal; |
---|
328 | line-height: 150%; |
---|
329 | margin-left: 0em; |
---|
330 | margin-right: 0em; |
---|
331 | } |
---|
332 | .avoidbreak { |
---|
333 | page-break-inside: avoid; |
---|
334 | } |
---|
335 | .bcp14 { |
---|
336 | font-style: normal; |
---|
337 | text-transform: lowercase; |
---|
338 | font-variant: small-caps; |
---|
339 | } |
---|
340 | .comment { |
---|
341 | background-color: yellow; |
---|
342 | } |
---|
343 | .center { |
---|
344 | text-align: center; |
---|
345 | } |
---|
346 | .error { |
---|
347 | color: red; |
---|
348 | font-style: italic; |
---|
349 | font-weight: bold; |
---|
350 | } |
---|
351 | .figure { |
---|
352 | font-weight: bold; |
---|
353 | text-align: center; |
---|
354 | font-size: 9pt; |
---|
355 | } |
---|
356 | .filename { |
---|
357 | color: #333333; |
---|
358 | font-weight: bold; |
---|
359 | font-size: 12pt; |
---|
360 | line-height: 21pt; |
---|
361 | text-align: center; |
---|
362 | } |
---|
363 | .fn { |
---|
364 | font-weight: bold; |
---|
365 | } |
---|
366 | .hidden { |
---|
367 | display: none; |
---|
368 | } |
---|
369 | .left { |
---|
370 | text-align: left; |
---|
371 | } |
---|
372 | .right { |
---|
373 | text-align: right; |
---|
374 | } |
---|
375 | .title { |
---|
376 | color: #990000; |
---|
377 | font-size: 18pt; |
---|
378 | line-height: 18pt; |
---|
379 | font-weight: bold; |
---|
380 | text-align: center; |
---|
381 | margin-top: 36pt; |
---|
382 | } |
---|
383 | .vcardline { |
---|
384 | display: block; |
---|
385 | } |
---|
386 | .warning { |
---|
387 | font-size: 14pt; |
---|
388 | background-color: yellow; |
---|
389 | } |
---|
390 | .feedback { |
---|
391 | position: fixed; |
---|
392 | bottom: 1%; |
---|
393 | right: 1%; |
---|
394 | padding: 3px 5px; |
---|
395 | color: white; |
---|
396 | border-radius: 5px; |
---|
397 | background: #a00000; |
---|
398 | border: 1px solid silver; |
---|
399 | } |
---|
400 | .fbbutton { |
---|
401 | margin-left: 1em; |
---|
402 | color: #303030; |
---|
403 | font-size: small; |
---|
404 | font-weight: normal; |
---|
405 | background: #d0d000; |
---|
406 | padding: 1px 4px; |
---|
407 | border: 1px solid silver; |
---|
408 | border-radius: 5px; |
---|
409 | } |
---|
410 | |
---|
411 | @media print { |
---|
412 | .noprint { |
---|
413 | display: none; |
---|
414 | } |
---|
415 | |
---|
416 | a { |
---|
417 | color: black; |
---|
418 | text-decoration: none; |
---|
419 | } |
---|
420 | |
---|
421 | table.header { |
---|
422 | width: 90%; |
---|
423 | } |
---|
424 | |
---|
425 | td.header { |
---|
426 | width: 50%; |
---|
427 | color: black; |
---|
428 | background-color: white; |
---|
429 | vertical-align: top; |
---|
430 | font-size: 12pt; |
---|
431 | } |
---|
432 | |
---|
433 | ul.toc a::after { |
---|
434 | content: leader('.') target-counter(attr(href), page); |
---|
435 | } |
---|
436 | |
---|
437 | ul.ind li li a { |
---|
438 | content: target-counter(attr(href), page); |
---|
439 | } |
---|
440 | |
---|
441 | .print2col { |
---|
442 | column-count: 2; |
---|
443 | -moz-column-count: 2; |
---|
444 | column-fill: auto; |
---|
445 | } |
---|
446 | } |
---|
447 | |
---|
448 | @page { |
---|
449 | @top-left { |
---|
450 | content: "Internet-Draft"; |
---|
451 | } |
---|
452 | @top-right { |
---|
453 | content: "March 2012"; |
---|
454 | } |
---|
455 | @top-center { |
---|
456 | content: "HTTP/1.1, Part 7"; |
---|
457 | } |
---|
458 | @bottom-left { |
---|
459 | content: "Fielding, et al."; |
---|
460 | } |
---|
461 | @bottom-center { |
---|
462 | content: "Expires September 11, 2012"; |
---|
463 | } |
---|
464 | @bottom-right { |
---|
465 | content: "[Page " counter(page) "]"; |
---|
466 | } |
---|
467 | } |
---|
468 | |
---|
469 | @page:first { |
---|
470 | @top-left { |
---|
471 | content: normal; |
---|
472 | } |
---|
473 | @top-right { |
---|
474 | content: normal; |
---|
475 | } |
---|
476 | @top-center { |
---|
477 | content: normal; |
---|
478 | } |
---|
479 | } |
---|
480 | </style><link rel="Contents" href="#rfc.toc"> |
---|
481 | <link rel="Author" href="#rfc.authors"> |
---|
482 | <link rel="Copyright" href="#rfc.copyrightnotice"> |
---|
483 | <link rel="Index" href="#rfc.index"> |
---|
484 | <link rel="Chapter" title="1 Introduction" href="#rfc.section.1"> |
---|
485 | <link rel="Chapter" title="2 Access Authentication Framework" href="#rfc.section.2"> |
---|
486 | <link rel="Chapter" title="3 Status Code Definitions" href="#rfc.section.3"> |
---|
487 | <link rel="Chapter" title="4 Header Field Definitions" href="#rfc.section.4"> |
---|
488 | <link rel="Chapter" title="5 IANA Considerations" href="#rfc.section.5"> |
---|
489 | <link rel="Chapter" title="6 Security Considerations" href="#rfc.section.6"> |
---|
490 | <link rel="Chapter" title="7 Acknowledgments" href="#rfc.section.7"> |
---|
491 | <link rel="Chapter" href="#rfc.section.8" title="8 References"> |
---|
492 | <link rel="Appendix" title="A Changes from RFCs 2616 and 2617" href="#rfc.section.A"> |
---|
493 | <link rel="Appendix" title="B Collected ABNF" href="#rfc.section.B"> |
---|
494 | <link rel="Appendix" title="C Change Log (to be removed by RFC Editor before publication)" href="#rfc.section.C"> |
---|
495 | <link href="p6-cache.html" rel="prev"> |
---|
496 | <meta name="generator" content="http://greenbytes.de/tech/webdav/rfc2629.xslt, Revision 1.570, 2012-02-13 19:17:35, XSLT vendor: SAXON 8.9 from Saxonica http://www.saxonica.com/"> |
---|
497 | <link rel="schema.dct" href="http://purl.org/dc/terms/"> |
---|
498 | <meta name="dct.creator" content="Fielding, R."> |
---|
499 | <meta name="dct.creator" content="Gettys, J."> |
---|
500 | <meta name="dct.creator" content="Mogul, J."> |
---|
501 | <meta name="dct.creator" content="Frystyk, H."> |
---|
502 | <meta name="dct.creator" content="Masinter, L."> |
---|
503 | <meta name="dct.creator" content="Leach, P."> |
---|
504 | <meta name="dct.creator" content="Berners-Lee, T."> |
---|
505 | <meta name="dct.creator" content="Lafon, Y."> |
---|
506 | <meta name="dct.creator" content="Reschke, J. F."> |
---|
507 | <meta name="dct.identifier" content="urn:ietf:id:draft-ietf-httpbis-p7-auth-latest"> |
---|
508 | <meta name="dct.issued" scheme="ISO8601" content="2012-03-10"> |
---|
509 | <meta name="dct.replaces" content="urn:ietf:rfc:2616"> |
---|
510 | <meta name="dct.abstract" content="The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document is Part 7 of the seven-part specification that defines the protocol referred to as "HTTP/1.1" and, taken together, obsoletes RFC 2616. Part 7 defines the HTTP Authentication framework."> |
---|
511 | <meta name="description" content="The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document is Part 7 of the seven-part specification that defines the protocol referred to as "HTTP/1.1" and, taken together, obsoletes RFC 2616. Part 7 defines the HTTP Authentication framework."> |
---|
512 | </head> |
---|
513 | <body onload="init();"> |
---|
514 | <table class="header"> |
---|
515 | <tbody> |
---|
516 | <tr> |
---|
517 | <td class="left">HTTPbis Working Group</td> |
---|
518 | <td class="right">R. Fielding, Editor</td> |
---|
519 | </tr> |
---|
520 | <tr> |
---|
521 | <td class="left">Internet-Draft</td> |
---|
522 | <td class="right">Adobe</td> |
---|
523 | </tr> |
---|
524 | <tr> |
---|
525 | <td class="left">Obsoletes: <a href="http://tools.ietf.org/html/rfc2616">2616</a> (if approved) |
---|
526 | </td> |
---|
527 | <td class="right">J. Gettys</td> |
---|
528 | </tr> |
---|
529 | <tr> |
---|
530 | <td class="left">Updates: <a href="http://tools.ietf.org/html/rfc2617">2617</a> (if approved) |
---|
531 | </td> |
---|
532 | <td class="right">Alcatel-Lucent</td> |
---|
533 | </tr> |
---|
534 | <tr> |
---|
535 | <td class="left">Intended status: Standards Track</td> |
---|
536 | <td class="right">J. Mogul</td> |
---|
537 | </tr> |
---|
538 | <tr> |
---|
539 | <td class="left">Expires: September 11, 2012</td> |
---|
540 | <td class="right">HP</td> |
---|
541 | </tr> |
---|
542 | <tr> |
---|
543 | <td class="left"></td> |
---|
544 | <td class="right">H. Frystyk</td> |
---|
545 | </tr> |
---|
546 | <tr> |
---|
547 | <td class="left"></td> |
---|
548 | <td class="right">Microsoft</td> |
---|
549 | </tr> |
---|
550 | <tr> |
---|
551 | <td class="left"></td> |
---|
552 | <td class="right">L. Masinter</td> |
---|
553 | </tr> |
---|
554 | <tr> |
---|
555 | <td class="left"></td> |
---|
556 | <td class="right">Adobe</td> |
---|
557 | </tr> |
---|
558 | <tr> |
---|
559 | <td class="left"></td> |
---|
560 | <td class="right">P. Leach</td> |
---|
561 | </tr> |
---|
562 | <tr> |
---|
563 | <td class="left"></td> |
---|
564 | <td class="right">Microsoft</td> |
---|
565 | </tr> |
---|
566 | <tr> |
---|
567 | <td class="left"></td> |
---|
568 | <td class="right">T. Berners-Lee</td> |
---|
569 | </tr> |
---|
570 | <tr> |
---|
571 | <td class="left"></td> |
---|
572 | <td class="right">W3C/MIT</td> |
---|
573 | </tr> |
---|
574 | <tr> |
---|
575 | <td class="left"></td> |
---|
576 | <td class="right">Y. Lafon, Editor</td> |
---|
577 | </tr> |
---|
578 | <tr> |
---|
579 | <td class="left"></td> |
---|
580 | <td class="right">W3C</td> |
---|
581 | </tr> |
---|
582 | <tr> |
---|
583 | <td class="left"></td> |
---|
584 | <td class="right">J. Reschke, Editor</td> |
---|
585 | </tr> |
---|
586 | <tr> |
---|
587 | <td class="left"></td> |
---|
588 | <td class="right">greenbytes</td> |
---|
589 | </tr> |
---|
590 | <tr> |
---|
591 | <td class="left"></td> |
---|
592 | <td class="right">March 10, 2012</td> |
---|
593 | </tr> |
---|
594 | </tbody> |
---|
595 | </table> |
---|
596 | <p class="title">HTTP/1.1, part 7: Authentication<br><span class="filename">draft-ietf-httpbis-p7-auth-latest</span></p> |
---|
597 | <h1 id="rfc.abstract"><a href="#rfc.abstract">Abstract</a></h1> |
---|
598 | <p>The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information |
---|
599 | systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document is Part 7 of the |
---|
600 | seven-part specification that defines the protocol referred to as "HTTP/1.1" and, taken together, obsoletes RFC 2616. |
---|
601 | </p> |
---|
602 | <p>Part 7 defines the HTTP Authentication framework.</p> |
---|
603 | <h1 id="rfc.note.1"><a href="#rfc.note.1">Editorial Note (To be removed by RFC Editor)</a></h1> |
---|
604 | <p>Discussion of this draft should take place on the HTTPBIS working group mailing list (ietf-http-wg@w3.org), which is archived |
---|
605 | at <<a href="http://lists.w3.org/Archives/Public/ietf-http-wg/">http://lists.w3.org/Archives/Public/ietf-http-wg/</a>>. |
---|
606 | </p> |
---|
607 | <p>The current issues list is at <<a href="http://tools.ietf.org/wg/httpbis/trac/report/3">http://tools.ietf.org/wg/httpbis/trac/report/3</a>> and related documents (including fancy diffs) can be found at <<a href="http://tools.ietf.org/wg/httpbis/">http://tools.ietf.org/wg/httpbis/</a>>. |
---|
608 | </p> |
---|
609 | <p>The changes in this draft are summarized in <a href="#changes.since.18" title="Since draft-ietf-httpbis-p7-auth-18">Appendix C.20</a>. |
---|
610 | </p> |
---|
611 | <h1><a id="rfc.status" href="#rfc.status">Status of This Memo</a></h1> |
---|
612 | <p>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.</p> |
---|
613 | <p>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute |
---|
614 | working documents as Internet-Drafts. The list of current Internet-Drafts is at <a href="http://datatracker.ietf.org/drafts/current/">http://datatracker.ietf.org/drafts/current/</a>. |
---|
615 | </p> |
---|
616 | <p>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other |
---|
617 | documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work |
---|
618 | in progress”. |
---|
619 | </p> |
---|
620 | <p>This Internet-Draft will expire on September 11, 2012.</p> |
---|
621 | <h1><a id="rfc.copyrightnotice" href="#rfc.copyrightnotice">Copyright Notice</a></h1> |
---|
622 | <p>Copyright © 2012 IETF Trust and the persons identified as the document authors. All rights reserved.</p> |
---|
623 | <p>This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights |
---|
624 | and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License |
---|
625 | text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified |
---|
626 | BSD License. |
---|
627 | </p> |
---|
628 | <p>This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November |
---|
629 | 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to |
---|
630 | allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) |
---|
631 | controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative |
---|
632 | works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate |
---|
633 | it into languages other than English. |
---|
634 | </p> |
---|
635 | <hr class="noprint"> |
---|
636 | <h1 class="np" id="rfc.toc"><a href="#rfc.toc">Table of Contents</a></h1> |
---|
637 | <ul class="toc"> |
---|
638 | <li>1. <a href="#introduction">Introduction</a><ul> |
---|
639 | <li>1.1 <a href="#intro.conformance.and.error.handling">Conformance and Error Handling</a></li> |
---|
640 | <li>1.2 <a href="#notation">Syntax Notation</a><ul> |
---|
641 | <li>1.2.1 <a href="#core.rules">Core Rules</a></li> |
---|
642 | </ul> |
---|
643 | </li> |
---|
644 | </ul> |
---|
645 | </li> |
---|
646 | <li>2. <a href="#access.authentication.framework">Access Authentication Framework</a><ul> |
---|
647 | <li>2.1 <a href="#challenge.and.response">Challenge and Response</a></li> |
---|
648 | <li>2.2 <a href="#protection.space">Protection Space (Realm)</a></li> |
---|
649 | <li>2.3 <a href="#authentication.scheme.registry">Authentication Scheme Registry</a><ul> |
---|
650 | <li>2.3.1 <a href="#considerations.for.new.authentication.schemes">Considerations for New Authentication Schemes</a></li> |
---|
651 | </ul> |
---|
652 | </li> |
---|
653 | </ul> |
---|
654 | </li> |
---|
655 | <li>3. <a href="#status.code.definitions">Status Code Definitions</a><ul> |
---|
656 | <li>3.1 <a href="#status.401">401 Unauthorized</a></li> |
---|
657 | <li>3.2 <a href="#status.407">407 Proxy Authentication Required</a></li> |
---|
658 | </ul> |
---|
659 | </li> |
---|
660 | <li>4. <a href="#header.field.definitions">Header Field Definitions</a><ul> |
---|
661 | <li>4.1 <a href="#header.authorization">Authorization</a></li> |
---|
662 | <li>4.2 <a href="#header.proxy-authenticate">Proxy-Authenticate</a></li> |
---|
663 | <li>4.3 <a href="#header.proxy-authorization">Proxy-Authorization</a></li> |
---|
664 | <li>4.4 <a href="#header.www-authenticate">WWW-Authenticate</a></li> |
---|
665 | </ul> |
---|
666 | </li> |
---|
667 | <li>5. <a href="#IANA.considerations">IANA Considerations</a><ul> |
---|
668 | <li>5.1 <a href="#authentication.scheme.registration">Authenticaton Scheme Registry</a></li> |
---|
669 | <li>5.2 <a href="#status.code.registration">Status Code Registration</a></li> |
---|
670 | <li>5.3 <a href="#header.field.registration">Header Field Registration</a></li> |
---|
671 | </ul> |
---|
672 | </li> |
---|
673 | <li>6. <a href="#security.considerations">Security Considerations</a><ul> |
---|
674 | <li>6.1 <a href="#auth.credentials.and.idle.clients">Authentication Credentials and Idle Clients</a></li> |
---|
675 | </ul> |
---|
676 | </li> |
---|
677 | <li>7. <a href="#acks">Acknowledgments</a></li> |
---|
678 | <li>8. <a href="#rfc.references">References</a><ul> |
---|
679 | <li>8.1 <a href="#rfc.references.1">Normative References</a></li> |
---|
680 | <li>8.2 <a href="#rfc.references.2">Informative References</a></li> |
---|
681 | </ul> |
---|
682 | </li> |
---|
683 | <li><a href="#rfc.authors">Authors' Addresses</a></li> |
---|
684 | <li>A. <a href="#changes.from.rfc.2616">Changes from RFCs 2616 and 2617</a></li> |
---|
685 | <li>B. <a href="#collected.abnf">Collected ABNF</a></li> |
---|
686 | <li>C. <a href="#change.log">Change Log (to be removed by RFC Editor before publication)</a><ul> |
---|
687 | <li>C.1 <a href="#rfc.section.C.1">Since RFC 2616</a></li> |
---|
688 | <li>C.2 <a href="#rfc.section.C.2">Since draft-ietf-httpbis-p7-auth-00</a></li> |
---|
689 | <li>C.3 <a href="#rfc.section.C.3">Since draft-ietf-httpbis-p7-auth-01</a></li> |
---|
690 | <li>C.4 <a href="#changes.since.02">Since draft-ietf-httpbis-p7-auth-02</a></li> |
---|
691 | <li>C.5 <a href="#changes.since.03">Since draft-ietf-httpbis-p7-auth-03</a></li> |
---|
692 | <li>C.6 <a href="#changes.since.04">Since draft-ietf-httpbis-p7-auth-04</a></li> |
---|
693 | <li>C.7 <a href="#changes.since.05">Since draft-ietf-httpbis-p7-auth-05</a></li> |
---|
694 | <li>C.8 <a href="#changes.since.06">Since draft-ietf-httpbis-p7-auth-06</a></li> |
---|
695 | <li>C.9 <a href="#changes.since.07">Since draft-ietf-httpbis-p7-auth-07</a></li> |
---|
696 | <li>C.10 <a href="#changes.since.08">Since draft-ietf-httpbis-p7-auth-08</a></li> |
---|
697 | <li>C.11 <a href="#changes.since.09">Since draft-ietf-httpbis-p7-auth-09</a></li> |
---|
698 | <li>C.12 <a href="#changes.since.10">Since draft-ietf-httpbis-p7-auth-10</a></li> |
---|
699 | <li>C.13 <a href="#changes.since.11">Since draft-ietf-httpbis-p7-auth-11</a></li> |
---|
700 | <li>C.14 <a href="#changes.since.12">Since draft-ietf-httpbis-p7-auth-12</a></li> |
---|
701 | <li>C.15 <a href="#changes.since.13">Since draft-ietf-httpbis-p7-auth-13</a></li> |
---|
702 | <li>C.16 <a href="#changes.since.14">Since draft-ietf-httpbis-p7-auth-14</a></li> |
---|
703 | <li>C.17 <a href="#changes.since.15">Since draft-ietf-httpbis-p7-auth-15</a></li> |
---|
704 | <li>C.18 <a href="#changes.since.16">Since draft-ietf-httpbis-p7-auth-16</a></li> |
---|
705 | <li>C.19 <a href="#changes.since.17">Since draft-ietf-httpbis-p7-auth-17</a></li> |
---|
706 | <li>C.20 <a href="#changes.since.18">Since draft-ietf-httpbis-p7-auth-18</a></li> |
---|
707 | </ul> |
---|
708 | </li> |
---|
709 | <li><a href="#rfc.index">Index</a></li> |
---|
710 | </ul> |
---|
711 | <h1 id="rfc.section.1" class="np"><a href="#rfc.section.1">1.</a> <a id="introduction" href="#introduction">Introduction</a></h1> |
---|
712 | <p id="rfc.section.1.p.1">This document defines HTTP/1.1 access control and authentication. It includes the relevant parts of <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2616.1">RFC 2616</cite> with only minor changes, plus the general framework for HTTP authentication, as previously defined in "HTTP Authentication: |
---|
713 | Basic and Digest Access Authentication" (<a href="#RFC2617" id="rfc.xref.RFC2617.1"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a>). |
---|
714 | </p> |
---|
715 | <p id="rfc.section.1.p.2">HTTP provides several <em class="bcp14">OPTIONAL</em> challenge-response authentication mechanisms which can be used by a server to challenge a client request and by a client to |
---|
716 | provide authentication information. The "basic" and "digest" authentication schemes continue to be specified in <cite title="HTTP Authentication: Basic and Digest Access Authentication" id="rfc.xref.RFC2617.2">RFC 2617</cite>. |
---|
717 | </p> |
---|
718 | <h2 id="rfc.section.1.1"><a href="#rfc.section.1.1">1.1</a> <a id="intro.conformance.and.error.handling" href="#intro.conformance.and.error.handling">Conformance and Error Handling</a></h2> |
---|
719 | <p id="rfc.section.1.1.p.1">The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" |
---|
720 | in this document are to be interpreted as described in <a href="#RFC2119" id="rfc.xref.RFC2119.1"><cite title="Key words for use in RFCs to Indicate Requirement Levels">[RFC2119]</cite></a>. |
---|
721 | </p> |
---|
722 | <p id="rfc.section.1.1.p.2">This document defines conformance criteria for several roles in HTTP communication, including Senders, Recipients, Clients, |
---|
723 | Servers, User-Agents, Origin Servers, Intermediaries, Proxies and Gateways. See <a href="p1-messaging.html#architecture" title="Architecture">Section 2</a> of <a href="#Part1" id="rfc.xref.Part1.1"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for definitions of these terms. |
---|
724 | </p> |
---|
725 | <p id="rfc.section.1.1.p.3">An implementation is considered conformant if it complies with all of the requirements associated with its role(s). Note that |
---|
726 | SHOULD-level requirements are relevant here, unless one of the documented exceptions is applicable. |
---|
727 | </p> |
---|
728 | <p id="rfc.section.1.1.p.4">This document also uses ABNF to define valid protocol elements (<a href="#notation" title="Syntax Notation">Section 1.2</a>). In addition to the prose requirements placed upon them, Senders <em class="bcp14">MUST NOT</em> generate protocol elements that are invalid. |
---|
729 | </p> |
---|
730 | <p id="rfc.section.1.1.p.5">Unless noted otherwise, Recipients <em class="bcp14">MAY</em> take steps to recover a usable protocol element from an invalid construct. However, HTTP does not define specific error handling |
---|
731 | mechanisms, except in cases where it has direct impact on security. This is because different uses of the protocol require |
---|
732 | different error handling strategies; for example, a Web browser may wish to transparently recover from a response where the |
---|
733 | Location header field doesn't parse according to the ABNF, whereby in a systems control protocol using HTTP, this type of |
---|
734 | error recovery could lead to dangerous consequences. |
---|
735 | </p> |
---|
736 | <h2 id="rfc.section.1.2"><a href="#rfc.section.1.2">1.2</a> <a id="notation" href="#notation">Syntax Notation</a></h2> |
---|
737 | <p id="rfc.section.1.2.p.1">This specification uses the Augmented Backus-Naur Form (ABNF) notation of <a href="#RFC5234" id="rfc.xref.RFC5234.1"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a> with the list rule extension defined in <a href="p1-messaging.html#notation" title="Syntax Notation">Section 1.2</a> of <a href="#Part1" id="rfc.xref.Part1.2"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>. <a href="#collected.abnf" title="Collected ABNF">Appendix B</a> shows the collected ABNF with the list rule expanded. |
---|
738 | </p> |
---|
739 | <p id="rfc.section.1.2.p.2">The following core rules are included by reference, as defined in <a href="#RFC5234" id="rfc.xref.RFC5234.2"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a>, <a href="http://tools.ietf.org/html/rfc5234#appendix-B.1">Appendix B.1</a>: ALPHA (letters), CR (carriage return), CRLF (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double quote), HEXDIG |
---|
740 | (hexadecimal 0-9/A-F/a-f), LF (line feed), OCTET (any 8-bit sequence of data), SP (space), and VCHAR (any visible US-ASCII |
---|
741 | character). |
---|
742 | </p> |
---|
743 | <h3 id="rfc.section.1.2.1"><a href="#rfc.section.1.2.1">1.2.1</a> <a id="core.rules" href="#core.rules">Core Rules</a></h3> |
---|
744 | <p id="rfc.section.1.2.1.p.1">The core rules below are defined in <a href="#Part1" id="rfc.xref.Part1.3"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>: |
---|
745 | </p> |
---|
746 | <div id="rfc.figure.u.1"></div><pre class="inline"> <a href="#core.rules" class="smpl">BWS</a> = <BWS, defined in <a href="#Part1" id="rfc.xref.Part1.4"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, <a href="p1-messaging.html#whitespace" title="Whitespace">Section 3.2.1</a>> |
---|
747 | <a href="#core.rules" class="smpl">OWS</a> = <OWS, defined in <a href="#Part1" id="rfc.xref.Part1.5"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, <a href="p1-messaging.html#whitespace" title="Whitespace">Section 3.2.1</a>> |
---|
748 | <a href="#core.rules" class="smpl">quoted-string</a> = <quoted-string, defined in <a href="#Part1" id="rfc.xref.Part1.6"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, <a href="p1-messaging.html#field.components" title="Field value components">Section 3.2.4</a>> |
---|
749 | <a href="#core.rules" class="smpl">token</a> = <token, defined in <a href="#Part1" id="rfc.xref.Part1.7"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, <a href="p1-messaging.html#field.components" title="Field value components">Section 3.2.4</a>> |
---|
750 | </pre><h1 id="rfc.section.2"><a href="#rfc.section.2">2.</a> <a id="access.authentication.framework" href="#access.authentication.framework">Access Authentication Framework</a></h1> |
---|
751 | <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a> <a id="challenge.and.response" href="#challenge.and.response">Challenge and Response</a></h2> |
---|
752 | <p id="rfc.section.2.1.p.1">HTTP provides a simple challenge-response authentication mechanism that can be used by a server to challenge a client request |
---|
753 | and by a client to provide authentication information. It uses an extensible, case-insensitive token to identify the authentication |
---|
754 | scheme, followed by additional information necessary for achieving authentication via that scheme. The latter can either be |
---|
755 | a comma-separated list of parameters or a single sequence of characters capable of holding base64-encoded information. |
---|
756 | </p> |
---|
757 | <p id="rfc.section.2.1.p.2">Parameters are name-value pairs where the name is matched case-insensitively, and each parameter name <em class="bcp14">MUST</em> only occur once per challenge. |
---|
758 | </p> |
---|
759 | <div id="rfc.figure.u.2"></div><pre class="inline"><span id="rfc.iref.a.1"></span><span id="rfc.iref.a.2"></span><span id="rfc.iref.g.1"></span><span id="rfc.iref.g.2"></span><span id="rfc.iref.b.1"></span><span id="rfc.iref.g.3"></span> auth-scheme = <a href="#core.rules" class="smpl">token</a> |
---|
760 | |
---|
761 | auth-param = <a href="#core.rules" class="smpl">token</a> <a href="#core.rules" class="smpl">BWS</a> "=" <a href="#core.rules" class="smpl">BWS</a> ( <a href="#core.rules" class="smpl">token</a> / <a href="#core.rules" class="smpl">quoted-string</a> ) |
---|
762 | |
---|
763 | b64token = 1*( <a href="#notation" class="smpl">ALPHA</a> / <a href="#notation" class="smpl">DIGIT</a> / |
---|
764 | "-" / "." / "_" / "~" / "+" / "/" ) *"=" |
---|
765 | </pre><p id="rfc.section.2.1.p.4">The "b64token" syntax allows the 66 unreserved URI characters (<a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>), plus a few others, so that it can hold a base64, base64url (URL and filename safe alphabet), base32, or base16 (hex) encoding, |
---|
766 | with or without padding, but excluding whitespace (<a href="#RFC4648" id="rfc.xref.RFC4648.1"><cite title="The Base16, Base32, and Base64 Data Encodings">[RFC4648]</cite></a>). |
---|
767 | </p> |
---|
768 | <p id="rfc.section.2.1.p.5">The 401 (Unauthorized) response message is used by an origin server to challenge the authorization of a user agent. This response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one challenge applicable to the requested resource. |
---|
769 | </p> |
---|
770 | <p id="rfc.section.2.1.p.6">The 407 (Proxy Authentication Required) response message is used by a proxy to challenge the authorization of a client and <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing at least one challenge applicable to the proxy for the requested resource. |
---|
771 | </p> |
---|
772 | <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.c.1"></span><span id="rfc.iref.g.4"></span> <a href="#challenge.and.response" class="smpl">challenge</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#notation" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">b64token</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] |
---|
773 | </pre><div class="note" id="rfc.section.2.1.p.8"> |
---|
774 | <p> <b>Note:</b> User agents will need to take special care in parsing the WWW-Authenticate and Proxy-Authenticate header field values because |
---|
775 | they can contain more than one challenge, or if more than one of each is provided, since the contents of a challenge can itself |
---|
776 | contain a comma-separated list of authentication parameters. |
---|
777 | </p> |
---|
778 | </div> |
---|
779 | <div class="note" id="rfc.section.2.1.p.9"> |
---|
780 | <p> <b>Note:</b> Many browsers fail to parse challenges containing unknown schemes. A workaround for this problem is to list well-supported |
---|
781 | schemes (such as "basic") first. |
---|
782 | </p> |
---|
783 | </div> |
---|
784 | <p id="rfc.section.2.1.p.10">A user agent that wishes to authenticate itself with an origin server — usually, but not necessarily, after receiving a 401 |
---|
785 | (Unauthorized) — <em class="bcp14">MAY</em> do so by including an Authorization header field with the request. |
---|
786 | </p> |
---|
787 | <p id="rfc.section.2.1.p.11">A client that wishes to authenticate itself with a proxy — usually, but not necessarily, after receiving a 407 (Proxy Authentication |
---|
788 | Required) — <em class="bcp14">MAY</em> do so by including a Proxy-Authorization header field with the request. |
---|
789 | </p> |
---|
790 | <p id="rfc.section.2.1.p.12">Both the Authorization field value and the Proxy-Authorization field value consist of credentials containing the authentication |
---|
791 | information of the client for the realm of the resource being requested. The user agent <em class="bcp14">MUST</em> choose to use one of the challenges with the strongest auth-scheme it understands and request credentials from the user based |
---|
792 | upon that challenge. |
---|
793 | </p> |
---|
794 | <div id="rfc.figure.u.4"></div><pre class="inline"><span id="rfc.iref.c.2"></span><span id="rfc.iref.g.5"></span> <a href="#challenge.and.response" class="smpl">credentials</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> [ 1*<a href="#notation" class="smpl">SP</a> ( <a href="#challenge.and.response" class="smpl">b64token</a> / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) ] |
---|
795 | </pre><p id="rfc.section.2.1.p.14">If the origin server does not wish to accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 401 (Unauthorized) response. The response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one (possibly new) challenge applicable to the requested resource. |
---|
796 | </p> |
---|
797 | <p id="rfc.section.2.1.p.15">If a proxy does not accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 407 (Proxy Authentication Required). The response <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing a (possibly new) challenge applicable to the proxy for the requested |
---|
798 | resource. |
---|
799 | </p> |
---|
800 | <p id="rfc.section.2.1.p.16">The HTTP protocol does not restrict applications to this simple challenge-response mechanism for access authentication. Additional |
---|
801 | mechanisms <em class="bcp14">MAY</em> be used, such as encryption at the transport level or via message encapsulation, and with additional header fields specifying |
---|
802 | authentication information. However, such additional mechanisms are not defined by this specification. |
---|
803 | </p> |
---|
804 | <p id="rfc.section.2.1.p.17">Proxies <em class="bcp14">MUST</em> forward the WWW-Authenticate and Authorization headers unmodified and follow the rules found in <a href="#header.authorization" id="rfc.xref.header.authorization.1" title="Authorization">Section 4.1</a>. |
---|
805 | </p> |
---|
806 | <div id="rfc.iref.p.1"></div> |
---|
807 | <div id="rfc.iref.r.1"></div> |
---|
808 | <h2 id="rfc.section.2.2"><a href="#rfc.section.2.2">2.2</a> <a id="protection.space" href="#protection.space">Protection Space (Realm)</a></h2> |
---|
809 | <p id="rfc.section.2.2.p.1">The authentication parameter realm is reserved for use by authentication schemes that wish to indicate the scope of protection.</p> |
---|
810 | <p id="rfc.section.2.2.p.2">A <dfn>protection space</dfn> is defined by the canonical root URI (the scheme and authority components of the effective request URI; see <a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 5.6</a> of <a href="#Part1" id="rfc.xref.Part1.8"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) of the server being accessed, in combination with the realm value if present. These realms allow the protected resources |
---|
811 | on a server to be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization |
---|
812 | database. The realm value is a string, generally assigned by the origin server, which can have additional semantics specific |
---|
813 | to the authentication scheme. Note that there can be multiple challenges with the same auth-scheme but different realms. |
---|
814 | </p> |
---|
815 | <p id="rfc.section.2.2.p.3">The protection space determines the domain over which credentials can be automatically applied. If a prior request has been |
---|
816 | authorized, the same credentials <em class="bcp14">MAY</em> be reused for all other requests within that protection space for a period of time determined by the authentication scheme, |
---|
817 | parameters, and/or user preference. Unless otherwise defined by the authentication scheme, a single protection space cannot |
---|
818 | extend outside the scope of its server. |
---|
819 | </p> |
---|
820 | <p id="rfc.section.2.2.p.4">For historical reasons, senders <em class="bcp14">MUST</em> only use the quoted-string syntax. Recipients might have to support both token and quoted-string syntax for maximum interoperability |
---|
821 | with existing clients that have been accepting both notations for a long time. |
---|
822 | </p> |
---|
823 | <h2 id="rfc.section.2.3"><a href="#rfc.section.2.3">2.3</a> <a id="authentication.scheme.registry" href="#authentication.scheme.registry">Authentication Scheme Registry</a></h2> |
---|
824 | <p id="rfc.section.2.3.p.1">The HTTP Authentication Scheme Registry defines the name space for the authentication schemes in challenges and credentials.</p> |
---|
825 | <p id="rfc.section.2.3.p.2">Registrations <em class="bcp14">MUST</em> include the following fields: |
---|
826 | </p> |
---|
827 | <ul> |
---|
828 | <li>Authentication Scheme Name</li> |
---|
829 | <li>Pointer to specification text</li> |
---|
830 | <li>Notes (optional)</li> |
---|
831 | </ul> |
---|
832 | <p id="rfc.section.2.3.p.3">Values to be added to this name space require IETF Review (see <a href="#RFC5226" id="rfc.xref.RFC5226.1"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>, <a href="http://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a>). |
---|
833 | </p> |
---|
834 | <p id="rfc.section.2.3.p.4">The registry itself is maintained at <<a href="http://www.iana.org/assignments/http-authschemes">http://www.iana.org/assignments/http-authschemes</a>>. |
---|
835 | </p> |
---|
836 | <h3 id="rfc.section.2.3.1"><a href="#rfc.section.2.3.1">2.3.1</a> <a id="considerations.for.new.authentication.schemes" href="#considerations.for.new.authentication.schemes">Considerations for New Authentication Schemes</a></h3> |
---|
837 | <p id="rfc.section.2.3.1.p.1">There are certain aspects of the HTTP Authentication Framework that put constraints on how new authentication schemes can |
---|
838 | work: |
---|
839 | </p> |
---|
840 | <p id="rfc.section.2.3.1.p.2"> </p> |
---|
841 | <ul> |
---|
842 | <li> |
---|
843 | <p>HTTP authentication is presumed to be stateless: all of the information necessary to authenticate a request <em class="bcp14">MUST</em> be provided in the request, rather than be dependent on the server remembering prior requests. Authentication based on, or |
---|
844 | bound to, the underlying connection is outside the scope of this specification and inherently flawed unless steps are taken |
---|
845 | to ensure that the connection cannot be used by any party other than the authenticated user (see <a href="p1-messaging.html#intermediaries" title="Intermediaries">Section 2.3</a> of <a href="#Part1" id="rfc.xref.Part1.9"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). |
---|
846 | </p> |
---|
847 | </li> |
---|
848 | <li> |
---|
849 | <p>The authentication parameter "realm" is reserved for defining Protection Spaces as defined in <a href="#protection.space" title="Protection Space (Realm)">Section 2.2</a>. New schemes <em class="bcp14">MUST NOT</em> use it in a way incompatible with that definition. |
---|
850 | </p> |
---|
851 | </li> |
---|
852 | <li> |
---|
853 | <p>The "b64token" notation was introduced for compatibility with existing authentication schemes and can only be used once per |
---|
854 | challenge/credentials. New schemes thus ought to use the "auth-param" syntax instead, because otherwise future extensions |
---|
855 | will be impossible. |
---|
856 | </p> |
---|
857 | </li> |
---|
858 | <li> |
---|
859 | <p>The parsing of challenges and credentials is defined by this specification, and cannot be modified by new authentication schemes. |
---|
860 | When the auth-param syntax is used, all parameters ought to support both token and quoted-string syntax, and syntactical constraints |
---|
861 | ought to be defined on the field value after parsing (i.e., quoted-string processing). This is necessary so that recipients |
---|
862 | can use a generic parser that applies to all authentication schemes. |
---|
863 | </p> |
---|
864 | <p> <b>Note:</b> the fact that the value syntax for the "realm" parameter is restricted to quoted-string was a bad design choice not to be |
---|
865 | repeated for new parameters. |
---|
866 | </p> |
---|
867 | </li> |
---|
868 | <li> |
---|
869 | <p>Definitions of new schemes ought to define the treatment of unknown extension parameters. In general, a "must-ignore" rule |
---|
870 | is preferable over "must-understand", because otherwise it will be hard to introduce new parameters in the presence of legacy |
---|
871 | recipients. Furthermore, it's good to describe the policy for defining new parameters (such as "update the specification", |
---|
872 | or "use this registry"). |
---|
873 | </p> |
---|
874 | </li> |
---|
875 | <li> |
---|
876 | <p>Authentication schemes need to document whether they are usable in origin-server authentication (i.e., using WWW-Authenticate), |
---|
877 | and/or proxy authentication (i.e., using Proxy-Authenticate). |
---|
878 | </p> |
---|
879 | </li> |
---|
880 | <li> |
---|
881 | <p>The credentials carried in an Authorization header field are specific to the User Agent, and therefore have the same effect |
---|
882 | on HTTP caches as the "private" Cache-Control response directive, within the scope of the request they appear in. |
---|
883 | </p> |
---|
884 | <p>Therefore, new authentication schemes which choose not to carry credentials in the Authorization header (e.g., using a newly |
---|
885 | defined header) will need to explicitly disallow caching, by mandating the use of either Cache-Control request directives |
---|
886 | (e.g., "no-store") or response directives (e.g., "private"). |
---|
887 | </p> |
---|
888 | </li> |
---|
889 | </ul> |
---|
890 | <h1 id="rfc.section.3"><a href="#rfc.section.3">3.</a> <a id="status.code.definitions" href="#status.code.definitions">Status Code Definitions</a></h1> |
---|
891 | <div id="rfc.iref.12"></div> |
---|
892 | <div id="rfc.iref.s.1"></div> |
---|
893 | <h2 id="rfc.section.3.1"><a href="#rfc.section.3.1">3.1</a> <a id="status.401" href="#status.401">401 Unauthorized</a></h2> |
---|
894 | <p id="rfc.section.3.1.p.1">The request requires user authentication. The response <em class="bcp14">MUST</em> include a WWW-Authenticate header field (<a href="#header.www-authenticate" id="rfc.xref.header.www-authenticate.1" title="WWW-Authenticate">Section 4.4</a>) containing a challenge applicable to the target resource. The client <em class="bcp14">MAY</em> repeat the request with a suitable Authorization header field (<a href="#header.authorization" id="rfc.xref.header.authorization.2" title="Authorization">Section 4.1</a>). If the request already included Authorization credentials, then the 401 response indicates that authorization has been |
---|
895 | refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has |
---|
896 | already attempted authentication at least once, then the user <em class="bcp14">SHOULD</em> be presented the representation that was given in the response, since that representation might include relevant diagnostic |
---|
897 | information. |
---|
898 | </p> |
---|
899 | <div id="rfc.iref.13"></div> |
---|
900 | <div id="rfc.iref.s.2"></div> |
---|
901 | <h2 id="rfc.section.3.2"><a href="#rfc.section.3.2">3.2</a> <a id="status.407" href="#status.407">407 Proxy Authentication Required</a></h2> |
---|
902 | <p id="rfc.section.3.2.p.1">This code is similar to 401 (Unauthorized), but indicates that the client ought to first authenticate itself with the proxy. |
---|
903 | The proxy <em class="bcp14">MUST</em> return a Proxy-Authenticate header field (<a href="#header.proxy-authenticate" id="rfc.xref.header.proxy-authenticate.1" title="Proxy-Authenticate">Section 4.2</a>) containing a challenge applicable to the proxy for the target resource. The client <em class="bcp14">MAY</em> repeat the request with a suitable Proxy-Authorization header field (<a href="#header.proxy-authorization" id="rfc.xref.header.proxy-authorization.1" title="Proxy-Authorization">Section 4.3</a>). |
---|
904 | </p> |
---|
905 | <h1 id="rfc.section.4"><a href="#rfc.section.4">4.</a> <a id="header.field.definitions" href="#header.field.definitions">Header Field Definitions</a></h1> |
---|
906 | <p id="rfc.section.4.p.1">This section defines the syntax and semantics of HTTP/1.1 header fields related to authentication.</p> |
---|
907 | <div id="rfc.iref.a.3"></div> |
---|
908 | <div id="rfc.iref.h.1"></div> |
---|
909 | <h2 id="rfc.section.4.1"><a href="#rfc.section.4.1">4.1</a> <a id="header.authorization" href="#header.authorization">Authorization</a></h2> |
---|
910 | <p id="rfc.section.4.1.p.1">The "Authorization" header field allows a user agent to authenticate itself with a server — usually, but not necessarily, |
---|
911 | after receiving a 401 (Unauthorized) response. Its value consists of credentials containing information of the user agent |
---|
912 | for the realm of the resource being requested. |
---|
913 | </p> |
---|
914 | <div id="rfc.figure.u.5"></div><pre class="inline"><span id="rfc.iref.g.6"></span> <a href="#header.authorization" class="smpl">Authorization</a> = <a href="#challenge.and.response" class="smpl">credentials</a> |
---|
915 | </pre><p id="rfc.section.4.1.p.3">If a request is authenticated and a realm specified, the same credentials <em class="bcp14">SHOULD</em> be valid for all other requests within this realm (assuming that the authentication scheme itself does not require otherwise, |
---|
916 | such as credentials that vary according to a challenge value or using synchronized clocks). |
---|
917 | </p> |
---|
918 | <p id="rfc.section.4.1.p.4">When a shared cache (see <a href="p6-cache.html#shared.and.non-shared.caches">Section 1.2</a> of <a href="#Part6" id="rfc.xref.Part6.1"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) receives a request containing an Authorization field, it <em class="bcp14">MUST NOT</em> return the corresponding response as a reply to any other request, unless one of the following specific exceptions holds: |
---|
919 | </p> |
---|
920 | <p id="rfc.section.4.1.p.5"> </p> |
---|
921 | <ol> |
---|
922 | <li>If the response includes the "s-maxage" cache-control directive, the cache <em class="bcp14">MAY</em> use that response in replying to a subsequent request. But (if the specified maximum age has passed) a proxy cache <em class="bcp14">MUST</em> first revalidate it with the origin server, using the header fields from the new request to allow the origin server to authenticate |
---|
923 | the new request. (This is the defined behavior for s-maxage.) If the response includes "s-maxage=0", the proxy <em class="bcp14">MUST</em> always revalidate it before re-using it. |
---|
924 | </li> |
---|
925 | <li>If the response includes the "must-revalidate" cache-control directive, the cache <em class="bcp14">MAY</em> use that response in replying to a subsequent request. But if the response is stale, all caches <em class="bcp14">MUST</em> first revalidate it with the origin server, using the header fields from the new request to allow the origin server to authenticate |
---|
926 | the new request. |
---|
927 | </li> |
---|
928 | <li>If the response includes the "public" cache-control directive, it <em class="bcp14">MAY</em> be returned in reply to any subsequent request. |
---|
929 | </li> |
---|
930 | </ol> |
---|
931 | <div id="rfc.iref.p.2"></div> |
---|
932 | <div id="rfc.iref.h.2"></div> |
---|
933 | <h2 id="rfc.section.4.2"><a href="#rfc.section.4.2">4.2</a> <a id="header.proxy-authenticate" href="#header.proxy-authenticate">Proxy-Authenticate</a></h2> |
---|
934 | <p id="rfc.section.4.2.p.1">The "Proxy-Authenticate" header field consists of a challenge that indicates the authentication scheme and parameters applicable |
---|
935 | to the proxy for this effective request URI (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 5.6</a> of <a href="#Part1" id="rfc.xref.Part1.10"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). It <em class="bcp14">MUST</em> be included as part of a 407 (Proxy Authentication Required) response. |
---|
936 | </p> |
---|
937 | <div id="rfc.figure.u.6"></div><pre class="inline"><span id="rfc.iref.g.7"></span> <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> = 1#<a href="#challenge.and.response" class="smpl">challenge</a> |
---|
938 | </pre><p id="rfc.section.4.2.p.3">Unlike WWW-Authenticate, the Proxy-Authenticate header field applies only to the current connection and <em class="bcp14">SHOULD NOT</em> be passed on to downstream clients. However, an intermediate proxy might need to obtain its own credentials by requesting |
---|
939 | them from the downstream client, which in some circumstances will appear as if the proxy is forwarding the Proxy-Authenticate |
---|
940 | header field. |
---|
941 | </p> |
---|
942 | <p id="rfc.section.4.2.p.4">Note that the parsing considerations for WWW-Authenticate apply to this header field as well; see <a href="#header.www-authenticate" id="rfc.xref.header.www-authenticate.2" title="WWW-Authenticate">Section 4.4</a> for details. |
---|
943 | </p> |
---|
944 | <div id="rfc.iref.p.3"></div> |
---|
945 | <div id="rfc.iref.h.3"></div> |
---|
946 | <h2 id="rfc.section.4.3"><a href="#rfc.section.4.3">4.3</a> <a id="header.proxy-authorization" href="#header.proxy-authorization">Proxy-Authorization</a></h2> |
---|
947 | <p id="rfc.section.4.3.p.1">The "Proxy-Authorization" header field allows the client to identify itself (or its user) to a proxy which requires authentication. |
---|
948 | Its value consists of credentials containing the authentication information of the user agent for the proxy and/or realm of |
---|
949 | the resource being requested. |
---|
950 | </p> |
---|
951 | <div id="rfc.figure.u.7"></div><pre class="inline"><span id="rfc.iref.g.8"></span> <a href="#header.proxy-authorization" class="smpl">Proxy-Authorization</a> = <a href="#challenge.and.response" class="smpl">credentials</a> |
---|
952 | </pre><p id="rfc.section.4.3.p.3">Unlike Authorization, the Proxy-Authorization header field applies only to the next outbound proxy that demanded authentication |
---|
953 | using the Proxy-Authenticate field. When multiple proxies are used in a chain, the Proxy-Authorization header field is consumed |
---|
954 | by the first outbound proxy that was expecting to receive credentials. A proxy <em class="bcp14">MAY</em> relay the credentials from the client request to the next proxy if that is the mechanism by which the proxies cooperatively |
---|
955 | authenticate a given request. |
---|
956 | </p> |
---|
957 | <div id="rfc.iref.w.1"></div> |
---|
958 | <div id="rfc.iref.h.4"></div> |
---|
959 | <h2 id="rfc.section.4.4"><a href="#rfc.section.4.4">4.4</a> <a id="header.www-authenticate" href="#header.www-authenticate">WWW-Authenticate</a></h2> |
---|
960 | <p id="rfc.section.4.4.p.1">The "WWW-Authenticate" header field consists of at least one challenge that indicates the authentication scheme(s) and parameters |
---|
961 | applicable to the effective request URI (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 5.6</a> of <a href="#Part1" id="rfc.xref.Part1.11"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). |
---|
962 | </p> |
---|
963 | <p id="rfc.section.4.4.p.2">It <em class="bcp14">MUST</em> be included in 401 (Unauthorized) response messages and <em class="bcp14">MAY</em> be included in other response messages to indicate that supplying credentials (or different credentials) might affect the |
---|
964 | response. |
---|
965 | </p> |
---|
966 | <div id="rfc.figure.u.8"></div><pre class="inline"><span id="rfc.iref.g.9"></span> <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> = 1#<a href="#challenge.and.response" class="smpl">challenge</a> |
---|
967 | </pre><p id="rfc.section.4.4.p.4">User agents are advised to take special care in parsing the WWW-Authenticate field value as it might contain more than one |
---|
968 | challenge, or if more than one WWW-Authenticate header field is provided, the contents of a challenge itself can contain a |
---|
969 | comma-separated list of authentication parameters. |
---|
970 | </p> |
---|
971 | <div id="rfc.figure.u.9"></div> |
---|
972 | <p>For instance:</p> <pre class="text"> WWW-Authenticate: Newauth realm="apps", type=1, |
---|
973 | title="Login to \"apps\"", Basic realm="simple" |
---|
974 | </pre> <p>This header field contains two challenges; one for the "Newauth" scheme with a realm value of "apps", and two additional parameters |
---|
975 | "type" and "title", and another one for the "Basic" scheme with a realm value of "simple". |
---|
976 | </p> |
---|
977 | <div class="note" id="rfc.section.4.4.p.6"> |
---|
978 | <p> <b>Note:</b> The challenge grammar production uses the list syntax as well. Therefore, a sequence of comma, whitespace, and comma can be |
---|
979 | considered both as applying to the preceding challenge, or to be an empty entry in the list of challenges. In practice, this |
---|
980 | ambiguity does not affect the semantics of the header field value and thus is harmless. |
---|
981 | </p> |
---|
982 | </div> |
---|
983 | <h1 id="rfc.section.5"><a href="#rfc.section.5">5.</a> <a id="IANA.considerations" href="#IANA.considerations">IANA Considerations</a></h1> |
---|
984 | <h2 id="rfc.section.5.1"><a href="#rfc.section.5.1">5.1</a> <a id="authentication.scheme.registration" href="#authentication.scheme.registration">Authenticaton Scheme Registry</a></h2> |
---|
985 | <p id="rfc.section.5.1.p.1">The registration procedure for HTTP Authentication Schemes is defined by <a href="#authentication.scheme.registry" title="Authentication Scheme Registry">Section 2.3</a> of this document. |
---|
986 | </p> |
---|
987 | <p id="rfc.section.5.1.p.2">The HTTP Method Authentication Scheme shall be created at <<a href="http://www.iana.org/assignments/http-authschemes">http://www.iana.org/assignments/http-authschemes</a>>. |
---|
988 | </p> |
---|
989 | <h2 id="rfc.section.5.2"><a href="#rfc.section.5.2">5.2</a> <a id="status.code.registration" href="#status.code.registration">Status Code Registration</a></h2> |
---|
990 | <p id="rfc.section.5.2.p.1">The HTTP Status Code Registry located at <<a href="http://www.iana.org/assignments/http-status-codes">http://www.iana.org/assignments/http-status-codes</a>> shall be updated with the registrations below: |
---|
991 | </p> |
---|
992 | <div id="rfc.table.1"> |
---|
993 | <div id="iana.status.code.registration.table"></div> |
---|
994 | <table class="tt full left" cellpadding="3" cellspacing="0"> |
---|
995 | <thead> |
---|
996 | <tr> |
---|
997 | <th>Value</th> |
---|
998 | <th>Description</th> |
---|
999 | <th>Reference</th> |
---|
1000 | </tr> |
---|
1001 | </thead> |
---|
1002 | <tbody> |
---|
1003 | <tr> |
---|
1004 | <td class="left">401</td> |
---|
1005 | <td class="left">Unauthorized</td> |
---|
1006 | <td class="left"> <a href="#status.401" id="rfc.xref.status.401.1" title="401 Unauthorized">Section 3.1</a> |
---|
1007 | </td> |
---|
1008 | </tr> |
---|
1009 | <tr> |
---|
1010 | <td class="left">407</td> |
---|
1011 | <td class="left">Proxy Authentication Required</td> |
---|
1012 | <td class="left"> <a href="#status.407" id="rfc.xref.status.407.1" title="407 Proxy Authentication Required">Section 3.2</a> |
---|
1013 | </td> |
---|
1014 | </tr> |
---|
1015 | </tbody> |
---|
1016 | </table> |
---|
1017 | </div> |
---|
1018 | <h2 id="rfc.section.5.3"><a href="#rfc.section.5.3">5.3</a> <a id="header.field.registration" href="#header.field.registration">Header Field Registration</a></h2> |
---|
1019 | <p id="rfc.section.5.3.p.1">The Message Header Field Registry located at <<a href="http://www.iana.org/assignments/message-headers/message-header-index.html">http://www.iana.org/assignments/message-headers/message-header-index.html</a>> shall be updated with the permanent registrations below (see <a href="#RFC3864" id="rfc.xref.RFC3864.1"><cite title="Registration Procedures for Message Header Fields">[RFC3864]</cite></a>): |
---|
1020 | </p> |
---|
1021 | <div id="rfc.table.2"> |
---|
1022 | <div id="iana.header.registration.table"></div> |
---|
1023 | <table class="tt full left" cellpadding="3" cellspacing="0"> |
---|
1024 | <thead> |
---|
1025 | <tr> |
---|
1026 | <th>Header Field Name</th> |
---|
1027 | <th>Protocol</th> |
---|
1028 | <th>Status</th> |
---|
1029 | <th>Reference</th> |
---|
1030 | </tr> |
---|
1031 | </thead> |
---|
1032 | <tbody> |
---|
1033 | <tr> |
---|
1034 | <td class="left">Authorization</td> |
---|
1035 | <td class="left">http</td> |
---|
1036 | <td class="left">standard</td> |
---|
1037 | <td class="left"> <a href="#header.authorization" id="rfc.xref.header.authorization.3" title="Authorization">Section 4.1</a> |
---|
1038 | </td> |
---|
1039 | </tr> |
---|
1040 | <tr> |
---|
1041 | <td class="left">Proxy-Authenticate</td> |
---|
1042 | <td class="left">http</td> |
---|
1043 | <td class="left">standard</td> |
---|
1044 | <td class="left"> <a href="#header.proxy-authenticate" id="rfc.xref.header.proxy-authenticate.2" title="Proxy-Authenticate">Section 4.2</a> |
---|
1045 | </td> |
---|
1046 | </tr> |
---|
1047 | <tr> |
---|
1048 | <td class="left">Proxy-Authorization</td> |
---|
1049 | <td class="left">http</td> |
---|
1050 | <td class="left">standard</td> |
---|
1051 | <td class="left"> <a href="#header.proxy-authorization" id="rfc.xref.header.proxy-authorization.2" title="Proxy-Authorization">Section 4.3</a> |
---|
1052 | </td> |
---|
1053 | </tr> |
---|
1054 | <tr> |
---|
1055 | <td class="left">WWW-Authenticate</td> |
---|
1056 | <td class="left">http</td> |
---|
1057 | <td class="left">standard</td> |
---|
1058 | <td class="left"> <a href="#header.www-authenticate" id="rfc.xref.header.www-authenticate.3" title="WWW-Authenticate">Section 4.4</a> |
---|
1059 | </td> |
---|
1060 | </tr> |
---|
1061 | </tbody> |
---|
1062 | </table> |
---|
1063 | </div> |
---|
1064 | <p id="rfc.section.5.3.p.2">The change controller is: "IETF (iesg@ietf.org) - Internet Engineering Task Force".</p> |
---|
1065 | <h1 id="rfc.section.6"><a href="#rfc.section.6">6.</a> <a id="security.considerations" href="#security.considerations">Security Considerations</a></h1> |
---|
1066 | <p id="rfc.section.6.p.1">This section is meant to inform application developers, information providers, and users of the security limitations in HTTP/1.1 |
---|
1067 | as described by this document. The discussion does not include definitive solutions to the problems revealed, though it does |
---|
1068 | make some suggestions for reducing security risks. |
---|
1069 | </p> |
---|
1070 | <h2 id="rfc.section.6.1"><a href="#rfc.section.6.1">6.1</a> <a id="auth.credentials.and.idle.clients" href="#auth.credentials.and.idle.clients">Authentication Credentials and Idle Clients</a></h2> |
---|
1071 | <p id="rfc.section.6.1.p.1">Existing HTTP clients and user agents typically retain authentication information indefinitely. HTTP/1.1 does not provide |
---|
1072 | a method for a server to direct clients to discard these cached credentials. This is a significant defect that requires further |
---|
1073 | extensions to HTTP. Circumstances under which credential caching can interfere with the application's security model include |
---|
1074 | but are not limited to: |
---|
1075 | </p> |
---|
1076 | <ul> |
---|
1077 | <li>Clients which have been idle for an extended period following which the server might wish to cause the client to reprompt |
---|
1078 | the user for credentials. |
---|
1079 | </li> |
---|
1080 | <li>Applications which include a session termination indication (such as a "logout" or "commit" button on a page) after which |
---|
1081 | the server side of the application "knows" that there is no further reason for the client to retain the credentials. |
---|
1082 | </li> |
---|
1083 | </ul> |
---|
1084 | <p id="rfc.section.6.1.p.2">This is currently under separate study. There are a number of work-arounds to parts of this problem, and we encourage the |
---|
1085 | use of password protection in screen savers, idle time-outs, and other methods which mitigate the security problems inherent |
---|
1086 | in this problem. In particular, user agents which cache credentials are encouraged to provide a readily accessible mechanism |
---|
1087 | for discarding cached credentials under user control. |
---|
1088 | </p> |
---|
1089 | <h1 id="rfc.section.7"><a href="#rfc.section.7">7.</a> <a id="acks" href="#acks">Acknowledgments</a></h1> |
---|
1090 | <p id="rfc.section.7.p.1">This specification takes over the definition of the HTTP Authentication Framework, previously defined in <cite title="HTTP Authentication: Basic and Digest Access Authentication" id="rfc.xref.RFC2617.3">RFC 2617</cite>. We thank John Franks, Phillip M. Hallam-Baker, Jeffery L. Hostetler, Scott D. Lawrence, Paul J. Leach, Ari Luotonen, and |
---|
1091 | Lawrence C. Stewart for their work on that specification. See <a href="http://tools.ietf.org/html/rfc2617#section-6">Section 6</a> of <a href="#RFC2617" id="rfc.xref.RFC2617.4"><cite title="HTTP Authentication: Basic and Digest Access Authentication">[RFC2617]</cite></a> for further acknowledgements. |
---|
1092 | </p> |
---|
1093 | <p id="rfc.section.7.p.2">See <a href="p1-messaging.html#acks" title="Acknowledgments">Section 11</a> of <a href="#Part1" id="rfc.xref.Part1.12"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for the Acknowledgments related to this document revision. |
---|
1094 | </p> |
---|
1095 | <h1 id="rfc.references"><a id="rfc.section.8" href="#rfc.section.8">8.</a> References |
---|
1096 | </h1> |
---|
1097 | <h2 id="rfc.references.1"><a href="#rfc.section.8.1" id="rfc.section.8.1">8.1</a> Normative References |
---|
1098 | </h2> |
---|
1099 | <table> |
---|
1100 | <tr> |
---|
1101 | <td class="reference"><b id="Part1">[Part1]</b></td> |
---|
1102 | <td class="top"><a href="mailto:fielding@gbiv.com" title="Adobe Systems Incorporated">Fielding, R., Ed.</a>, <a href="mailto:jg@freedesktop.org" title="Alcatel-Lucent Bell Labs">Gettys, J.</a>, <a href="mailto:JeffMogul@acm.org" title="Hewlett-Packard Company">Mogul, J.</a>, <a href="mailto:henrikn@microsoft.com" title="Microsoft Corporation">Frystyk, H.</a>, <a href="mailto:LMM@acm.org" title="Adobe Systems Incorporated">Masinter, L.</a>, <a href="mailto:paulle@microsoft.com" title="Microsoft Corporation">Leach, P.</a>, <a href="mailto:timbl@w3.org" title="World Wide Web Consortium">Berners-Lee, T.</a>, <a href="mailto:ylafon@w3.org" title="World Wide Web Consortium">Lafon, Y., Ed.</a>, and <a href="mailto:julian.reschke@greenbytes.de" title="greenbytes GmbH">J. Reschke, Ed.</a>, “<a href="http://tools.ietf.org/html/draft-ietf-httpbis-p1-messaging-latest">HTTP/1.1, part 1: URIs, Connections, and Message Parsing</a>”, Internet-Draft draft-ietf-httpbis-p1-messaging-latest (work in progress), March 2012. |
---|
1103 | </td> |
---|
1104 | </tr> |
---|
1105 | <tr> |
---|
1106 | <td class="reference"><b id="Part6">[Part6]</b></td> |
---|
1107 | <td class="top"><a href="mailto:fielding@gbiv.com" title="Adobe Systems Incorporated">Fielding, R., Ed.</a>, <a href="mailto:jg@freedesktop.org" title="Alcatel-Lucent Bell Labs">Gettys, J.</a>, <a href="mailto:JeffMogul@acm.org" title="Hewlett-Packard Company">Mogul, J.</a>, <a href="mailto:henrikn@microsoft.com" title="Microsoft Corporation">Frystyk, H.</a>, <a href="mailto:LMM@acm.org" title="Adobe Systems Incorporated">Masinter, L.</a>, <a href="mailto:paulle@microsoft.com" title="Microsoft Corporation">Leach, P.</a>, <a href="mailto:timbl@w3.org" title="World Wide Web Consortium">Berners-Lee, T.</a>, <a href="mailto:ylafon@w3.org" title="World Wide Web Consortium">Lafon, Y., Ed.</a>, <a href="mailto:mnot@mnot.net" title="Rackspace">Nottingham, M., Ed.</a>, and <a href="mailto:julian.reschke@greenbytes.de" title="greenbytes GmbH">J. Reschke, Ed.</a>, “<a href="http://tools.ietf.org/html/draft-ietf-httpbis-p6-cache-latest">HTTP/1.1, part 6: Caching</a>”, Internet-Draft draft-ietf-httpbis-p6-cache-latest (work in progress), March 2012. |
---|
1108 | </td> |
---|
1109 | </tr> |
---|
1110 | <tr> |
---|
1111 | <td class="reference"><b id="RFC2119">[RFC2119]</b></td> |
---|
1112 | <td class="top"><a href="mailto:sob@harvard.edu" title="Harvard University">Bradner, S.</a>, “<a href="http://tools.ietf.org/html/rfc2119">Key words for use in RFCs to Indicate Requirement Levels</a>”, BCP 14, RFC 2119, March 1997. |
---|
1113 | </td> |
---|
1114 | </tr> |
---|
1115 | <tr> |
---|
1116 | <td class="reference"><b id="RFC5234">[RFC5234]</b></td> |
---|
1117 | <td class="top"><a href="mailto:dcrocker@bbiw.net" title="Brandenburg InternetWorking">Crocker, D., Ed.</a> and <a href="mailto:paul.overell@thus.net" title="THUS plc.">P. Overell</a>, “<a href="http://tools.ietf.org/html/rfc5234">Augmented BNF for Syntax Specifications: ABNF</a>”, STD 68, RFC 5234, January 2008. |
---|
1118 | </td> |
---|
1119 | </tr> |
---|
1120 | </table> |
---|
1121 | <h2 id="rfc.references.2"><a href="#rfc.section.8.2" id="rfc.section.8.2">8.2</a> Informative References |
---|
1122 | </h2> |
---|
1123 | <table> |
---|
1124 | <tr> |
---|
1125 | <td class="reference"><b id="RFC2616">[RFC2616]</b></td> |
---|
1126 | <td class="top"><a href="mailto:fielding@ics.uci.edu" title="University of California, Irvine">Fielding, R.</a>, <a href="mailto:jg@w3.org" title="W3C">Gettys, J.</a>, <a href="mailto:mogul@wrl.dec.com" title="Compaq Computer Corporation">Mogul, J.</a>, <a href="mailto:frystyk@w3.org" title="MIT Laboratory for Computer Science">Frystyk, H.</a>, <a href="mailto:masinter@parc.xerox.com" title="Xerox Corporation">Masinter, L.</a>, <a href="mailto:paulle@microsoft.com" title="Microsoft Corporation">Leach, P.</a>, and <a href="mailto:timbl@w3.org" title="W3C">T. Berners-Lee</a>, “<a href="http://tools.ietf.org/html/rfc2616">Hypertext Transfer Protocol -- HTTP/1.1</a>”, RFC 2616, June 1999. |
---|
1127 | </td> |
---|
1128 | </tr> |
---|
1129 | <tr> |
---|
1130 | <td class="reference"><b id="RFC2617">[RFC2617]</b></td> |
---|
1131 | <td class="top"><a href="mailto:john@math.nwu.edu" title="Northwestern University, Department of Mathematics">Franks, J.</a>, <a href="mailto:pbaker@verisign.com" title="Verisign Inc.">Hallam-Baker, P.</a>, <a href="mailto:jeff@AbiSource.com" title="AbiSource, Inc.">Hostetler, J.</a>, <a href="mailto:lawrence@agranat.com" title="Agranat Systems, Inc.">Lawrence, S.</a>, <a href="mailto:paulle@microsoft.com" title="Microsoft Corporation">Leach, P.</a>, Luotonen, A., and <a href="mailto:stewart@OpenMarket.com" title="Open Market, Inc.">L. Stewart</a>, “<a href="http://tools.ietf.org/html/rfc2617">HTTP Authentication: Basic and Digest Access Authentication</a>”, RFC 2617, June 1999. |
---|
1132 | </td> |
---|
1133 | </tr> |
---|
1134 | <tr> |
---|
1135 | <td class="reference"><b id="RFC3864">[RFC3864]</b></td> |
---|
1136 | <td class="top"><a href="mailto:GK-IETF@ninebynine.org" title="Nine by Nine">Klyne, G.</a>, <a href="mailto:mnot@pobox.com" title="BEA Systems">Nottingham, M.</a>, and <a href="mailto:JeffMogul@acm.org" title="HP Labs">J. Mogul</a>, “<a href="http://tools.ietf.org/html/rfc3864">Registration Procedures for Message Header Fields</a>”, BCP 90, RFC 3864, September 2004. |
---|
1137 | </td> |
---|
1138 | </tr> |
---|
1139 | <tr> |
---|
1140 | <td class="reference"><b id="RFC3986">[RFC3986]</b></td> |
---|
1141 | <td class="top"><a href="mailto:timbl@w3.org" title="World Wide Web Consortium">Berners-Lee, T.</a>, <a href="mailto:fielding@gbiv.com" title="Day Software">Fielding, R.</a>, and <a href="mailto:LMM@acm.org" title="Adobe Systems Incorporated">L. Masinter</a>, “<a href="http://tools.ietf.org/html/rfc3986">Uniform Resource Identifier (URI): Generic Syntax</a>”, STD 66, RFC 3986, January 2005. |
---|
1142 | </td> |
---|
1143 | </tr> |
---|
1144 | <tr> |
---|
1145 | <td class="reference"><b id="RFC4648">[RFC4648]</b></td> |
---|
1146 | <td class="top">Josefsson, S., “<a href="http://tools.ietf.org/html/rfc4648">The Base16, Base32, and Base64 Data Encodings</a>”, RFC 4648, October 2006. |
---|
1147 | </td> |
---|
1148 | </tr> |
---|
1149 | <tr> |
---|
1150 | <td class="reference"><b id="RFC5226">[RFC5226]</b></td> |
---|
1151 | <td class="top"><a href="mailto:narten@us.ibm.com" title="IBM">Narten, T.</a> and <a href="mailto:Harald@Alvestrand.no" title="Google">H. Alvestrand</a>, “<a href="http://tools.ietf.org/html/rfc5226">Guidelines for Writing an IANA Considerations Section in RFCs</a>”, BCP 26, RFC 5226, May 2008. |
---|
1152 | </td> |
---|
1153 | </tr> |
---|
1154 | </table> |
---|
1155 | <div class="avoidbreak"> |
---|
1156 | <h1 id="rfc.authors"><a href="#rfc.authors">Authors' Addresses</a></h1> |
---|
1157 | <address class="vcard"><span class="vcardline"><span class="fn">Roy T. Fielding</span> |
---|
1158 | (editor) |
---|
1159 | <span class="n hidden"><span class="family-name">Fielding</span><span class="given-name">Roy T.</span></span></span><span class="org vcardline">Adobe Systems Incorporated</span><span class="adr"><span class="street-address vcardline">345 Park Ave</span><span class="vcardline"><span class="locality">San Jose</span>, <span class="region">CA</span> <span class="postal-code">95110</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:fielding@gbiv.com"><span class="email">fielding@gbiv.com</span></a></span><span class="vcardline">URI: <a href="http://roy.gbiv.com/" class="url">http://roy.gbiv.com/</a></span></address> |
---|
1160 | <address class="vcard"><span class="vcardline"><span class="fn">Jim Gettys</span><span class="n hidden"><span class="family-name">Gettys</span><span class="given-name">Jim</span></span></span><span class="org vcardline">Alcatel-Lucent Bell Labs</span><span class="adr"><span class="street-address vcardline">21 Oak Knoll Road</span><span class="vcardline"><span class="locality">Carlisle</span>, <span class="region">MA</span> <span class="postal-code">01741</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:jg@freedesktop.org"><span class="email">jg@freedesktop.org</span></a></span><span class="vcardline">URI: <a href="http://gettys.wordpress.com/" class="url">http://gettys.wordpress.com/</a></span></address> |
---|
1161 | <address class="vcard"><span class="vcardline"><span class="fn">Jeffrey C. Mogul</span><span class="n hidden"><span class="family-name">Mogul</span><span class="given-name">Jeffrey C.</span></span></span><span class="org vcardline">Hewlett-Packard Company</span><span class="adr"><span class="street-address vcardline">HP Labs, Large Scale Systems Group</span><span class="street-address vcardline">1501 Page Mill Road, MS 1177</span><span class="vcardline"><span class="locality">Palo Alto</span>, <span class="region">CA</span> <span class="postal-code">94304</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:JeffMogul@acm.org"><span class="email">JeffMogul@acm.org</span></a></span></address> |
---|
1162 | <address class="vcard"><span class="vcardline"><span class="fn">Henrik Frystyk Nielsen</span><span class="n hidden"><span class="family-name">Frystyk</span></span></span><span class="org vcardline">Microsoft Corporation</span><span class="adr"><span class="street-address vcardline">1 Microsoft Way</span><span class="vcardline"><span class="locality">Redmond</span>, <span class="region">WA</span> <span class="postal-code">98052</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:henrikn@microsoft.com"><span class="email">henrikn@microsoft.com</span></a></span></address> |
---|
1163 | <address class="vcard"><span class="vcardline"><span class="fn">Larry Masinter</span><span class="n hidden"><span class="family-name">Masinter</span><span class="given-name">Larry</span></span></span><span class="org vcardline">Adobe Systems Incorporated</span><span class="adr"><span class="street-address vcardline">345 Park Ave</span><span class="vcardline"><span class="locality">San Jose</span>, <span class="region">CA</span> <span class="postal-code">95110</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:LMM@acm.org"><span class="email">LMM@acm.org</span></a></span><span class="vcardline">URI: <a href="http://larry.masinter.net/" class="url">http://larry.masinter.net/</a></span></address> |
---|
1164 | <address class="vcard"><span class="vcardline"><span class="fn">Paul J. Leach</span><span class="n hidden"><span class="family-name">Leach</span><span class="given-name">Paul J.</span></span></span><span class="org vcardline">Microsoft Corporation</span><span class="adr"><span class="street-address vcardline">1 Microsoft Way</span><span class="vcardline"><span class="locality">Redmond</span>, <span class="region">WA</span> <span class="postal-code">98052</span></span></span><span class="vcardline">Email: <a href="mailto:paulle@microsoft.com"><span class="email">paulle@microsoft.com</span></a></span></address> |
---|
1165 | <address class="vcard"><span class="vcardline"><span class="fn">Tim Berners-Lee</span><span class="n hidden"><span class="family-name">Berners-Lee</span><span class="given-name">Tim</span></span></span><span class="org vcardline">World Wide Web Consortium</span><span class="adr"><span class="street-address vcardline">MIT Computer Science and Artificial Intelligence Laboratory</span><span class="street-address vcardline">The Stata Center, Building 32</span><span class="street-address vcardline">32 Vassar Street</span><span class="vcardline"><span class="locality">Cambridge</span>, <span class="region">MA</span> <span class="postal-code">02139</span></span><span class="country-name vcardline">USA</span></span><span class="vcardline">Email: <a href="mailto:timbl@w3.org"><span class="email">timbl@w3.org</span></a></span><span class="vcardline">URI: <a href="http://www.w3.org/People/Berners-Lee/" class="url">http://www.w3.org/People/Berners-Lee/</a></span></address> |
---|
1166 | <address class="vcard"><span class="vcardline"><span class="fn">Yves Lafon</span> |
---|
1167 | (editor) |
---|
1168 | <span class="n hidden"><span class="family-name">Lafon</span><span class="given-name">Yves</span></span></span><span class="org vcardline">World Wide Web Consortium</span><span class="adr"><span class="street-address vcardline">W3C / ERCIM</span><span class="street-address vcardline">2004, rte des Lucioles</span><span class="vcardline"><span class="locality">Sophia-Antipolis</span>, <span class="region">AM</span> <span class="postal-code">06902</span></span><span class="country-name vcardline">France</span></span><span class="vcardline">Email: <a href="mailto:ylafon@w3.org"><span class="email">ylafon@w3.org</span></a></span><span class="vcardline">URI: <a href="http://www.raubacapeu.net/people/yves/" class="url">http://www.raubacapeu.net/people/yves/</a></span></address> |
---|
1169 | <address class="vcard"><span class="vcardline"><span class="fn">Julian F. Reschke</span> |
---|
1170 | (editor) |
---|
1171 | <span class="n hidden"><span class="family-name">Reschke</span><span class="given-name">Julian F.</span></span></span><span class="org vcardline">greenbytes GmbH</span><span class="adr"><span class="street-address vcardline">Hafenweg 16</span><span class="vcardline"><span class="locality">Muenster</span>, <span class="region">NW</span> <span class="postal-code">48155</span></span><span class="country-name vcardline">Germany</span></span><span class="vcardline tel">Phone: <a href="tel:+492512807760"><span class="value">+49 251 2807760</span></a></span><span class="vcardline tel"><span class="type">Fax</span>: <a href="fax:+492512807761"><span class="value">+49 251 2807761</span></a></span><span class="vcardline">Email: <a href="mailto:julian.reschke@greenbytes.de"><span class="email">julian.reschke@greenbytes.de</span></a></span><span class="vcardline">URI: <a href="http://greenbytes.de/tech/webdav/" class="url">http://greenbytes.de/tech/webdav/</a></span></address> |
---|
1172 | </div> |
---|
1173 | <h1 id="rfc.section.A" class="np"><a href="#rfc.section.A">A.</a> <a id="changes.from.rfc.2616" href="#changes.from.rfc.2616">Changes from RFCs 2616 and 2617</a></h1> |
---|
1174 | <p id="rfc.section.A.p.1">The "realm" parameter isn't required anymore in general; consequently, the ABNF allows challenges without any auth parameters. |
---|
1175 | (<a href="#access.authentication.framework" title="Access Authentication Framework">Section 2</a>) |
---|
1176 | </p> |
---|
1177 | <p id="rfc.section.A.p.2">The "b64token" alternative to auth-param lists has been added for consistency with legacy authentication schemes such as "Basic". |
---|
1178 | (<a href="#access.authentication.framework" title="Access Authentication Framework">Section 2</a>) |
---|
1179 | </p> |
---|
1180 | <p id="rfc.section.A.p.3">Change ABNF productions for header fields to only define the field value. (<a href="#header.field.definitions" title="Header Field Definitions">Section 4</a>) |
---|
1181 | </p> |
---|
1182 | <h1 id="rfc.section.B"><a href="#rfc.section.B">B.</a> <a id="collected.abnf" href="#collected.abnf">Collected ABNF</a></h1> |
---|
1183 | <div id="rfc.figure.u.10"></div> <pre class="inline"><a href="#header.authorization" class="smpl">Authorization</a> = credentials |
---|
1184 | |
---|
1185 | <a href="#core.rules" class="smpl">BWS</a> = <BWS, defined in [Part1], Section 3.2.1> |
---|
1186 | |
---|
1187 | <a href="#core.rules" class="smpl">OWS</a> = <OWS, defined in [Part1], Section 3.2.1> |
---|
1188 | |
---|
1189 | <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> = *( "," OWS ) challenge *( OWS "," [ OWS |
---|
1190 | challenge ] ) |
---|
1191 | <a href="#header.proxy-authorization" class="smpl">Proxy-Authorization</a> = credentials |
---|
1192 | |
---|
1193 | <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> = *( "," OWS ) challenge *( OWS "," [ OWS challenge |
---|
1194 | ] ) |
---|
1195 | |
---|
1196 | <a href="#challenge.and.response" class="smpl">auth-param</a> = token BWS "=" BWS ( token / quoted-string ) |
---|
1197 | <a href="#challenge.and.response" class="smpl">auth-scheme</a> = token |
---|
1198 | |
---|
1199 | <a href="#challenge.and.response" class="smpl">b64token</a> = 1*( ALPHA / DIGIT / "-" / "." / "_" / "~" / "+" / "/" ) |
---|
1200 | *"=" |
---|
1201 | |
---|
1202 | <a href="#challenge.and.response" class="smpl">challenge</a> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *( |
---|
1203 | OWS "," [ OWS auth-param ] ) ] ) ] |
---|
1204 | <a href="#challenge.and.response" class="smpl">credentials</a> = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) |
---|
1205 | *( OWS "," [ OWS auth-param ] ) ] ) ] |
---|
1206 | |
---|
1207 | <a href="#core.rules" class="smpl">quoted-string</a> = <quoted-string, defined in [Part1], Section 3.2.4> |
---|
1208 | |
---|
1209 | <a href="#core.rules" class="smpl">token</a> = <token, defined in [Part1], Section 3.2.4> |
---|
1210 | </pre> <div id="rfc.figure.u.11"></div> |
---|
1211 | <p>ABNF diagnostics:</p><pre class="inline">; Authorization defined but not used |
---|
1212 | ; Proxy-Authenticate defined but not used |
---|
1213 | ; Proxy-Authorization defined but not used |
---|
1214 | ; WWW-Authenticate defined but not used |
---|
1215 | </pre><h1 id="rfc.section.C"><a href="#rfc.section.C">C.</a> <a id="change.log" href="#change.log">Change Log (to be removed by RFC Editor before publication)</a></h1> |
---|
1216 | <h2 id="rfc.section.C.1"><a href="#rfc.section.C.1">C.1</a> Since RFC 2616 |
---|
1217 | </h2> |
---|
1218 | <p id="rfc.section.C.1.p.1">Extracted relevant partitions from <a href="#RFC2616" id="rfc.xref.RFC2616.2"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2616]</cite></a>. |
---|
1219 | </p> |
---|
1220 | <h2 id="rfc.section.C.2"><a href="#rfc.section.C.2">C.2</a> Since draft-ietf-httpbis-p7-auth-00 |
---|
1221 | </h2> |
---|
1222 | <p id="rfc.section.C.2.p.1">Closed issues: </p> |
---|
1223 | <ul> |
---|
1224 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/35">http://tools.ietf.org/wg/httpbis/trac/ticket/35</a>>: "Normative and Informative references" |
---|
1225 | </li> |
---|
1226 | </ul> |
---|
1227 | <h2 id="rfc.section.C.3"><a href="#rfc.section.C.3">C.3</a> Since draft-ietf-httpbis-p7-auth-01 |
---|
1228 | </h2> |
---|
1229 | <p id="rfc.section.C.3.p.1">Ongoing work on ABNF conversion (<<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/36">http://tools.ietf.org/wg/httpbis/trac/ticket/36</a>>): |
---|
1230 | </p> |
---|
1231 | <ul> |
---|
1232 | <li>Explicitly import BNF rules for "challenge" and "credentials" from RFC2617.</li> |
---|
1233 | <li>Add explicit references to BNF syntax and rules imported from other parts of the specification.</li> |
---|
1234 | </ul> |
---|
1235 | <h2 id="rfc.section.C.4"><a href="#rfc.section.C.4">C.4</a> <a id="changes.since.02" href="#changes.since.02">Since draft-ietf-httpbis-p7-auth-02</a></h2> |
---|
1236 | <p id="rfc.section.C.4.p.1">Ongoing work on IANA Message Header Field Registration (<<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/40">http://tools.ietf.org/wg/httpbis/trac/ticket/40</a>>): |
---|
1237 | </p> |
---|
1238 | <ul> |
---|
1239 | <li>Reference RFC 3984, and update header field registrations for header fields defined in this document.</li> |
---|
1240 | </ul> |
---|
1241 | <h2 id="rfc.section.C.5"><a href="#rfc.section.C.5">C.5</a> <a id="changes.since.03" href="#changes.since.03">Since draft-ietf-httpbis-p7-auth-03</a></h2> |
---|
1242 | <p id="rfc.section.C.5.p.1">None.</p> |
---|
1243 | <h2 id="rfc.section.C.6"><a href="#rfc.section.C.6">C.6</a> <a id="changes.since.04" href="#changes.since.04">Since draft-ietf-httpbis-p7-auth-04</a></h2> |
---|
1244 | <p id="rfc.section.C.6.p.1">Ongoing work on ABNF conversion (<<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/36">http://tools.ietf.org/wg/httpbis/trac/ticket/36</a>>): |
---|
1245 | </p> |
---|
1246 | <ul> |
---|
1247 | <li>Use "/" instead of "|" for alternatives.</li> |
---|
1248 | <li>Introduce new ABNF rules for "bad" whitespace ("BWS"), optional whitespace ("OWS") and required whitespace ("RWS").</li> |
---|
1249 | <li>Rewrite ABNFs to spell out whitespace rules, factor out header field value format definitions.</li> |
---|
1250 | </ul> |
---|
1251 | <h2 id="rfc.section.C.7"><a href="#rfc.section.C.7">C.7</a> <a id="changes.since.05" href="#changes.since.05">Since draft-ietf-httpbis-p7-auth-05</a></h2> |
---|
1252 | <p id="rfc.section.C.7.p.1">Final work on ABNF conversion (<<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/36">http://tools.ietf.org/wg/httpbis/trac/ticket/36</a>>): |
---|
1253 | </p> |
---|
1254 | <ul> |
---|
1255 | <li>Add appendix containing collected and expanded ABNF, reorganize ABNF introduction.</li> |
---|
1256 | </ul> |
---|
1257 | <h2 id="rfc.section.C.8"><a href="#rfc.section.C.8">C.8</a> <a id="changes.since.06" href="#changes.since.06">Since draft-ietf-httpbis-p7-auth-06</a></h2> |
---|
1258 | <p id="rfc.section.C.8.p.1">None.</p> |
---|
1259 | <h2 id="rfc.section.C.9"><a href="#rfc.section.C.9">C.9</a> <a id="changes.since.07" href="#changes.since.07">Since draft-ietf-httpbis-p7-auth-07</a></h2> |
---|
1260 | <p id="rfc.section.C.9.p.1">Closed issues: </p> |
---|
1261 | <ul> |
---|
1262 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/198">http://tools.ietf.org/wg/httpbis/trac/ticket/198</a>>: "move IANA registrations for optional status codes" |
---|
1263 | </li> |
---|
1264 | </ul> |
---|
1265 | <h2 id="rfc.section.C.10"><a href="#rfc.section.C.10">C.10</a> <a id="changes.since.08" href="#changes.since.08">Since draft-ietf-httpbis-p7-auth-08</a></h2> |
---|
1266 | <p id="rfc.section.C.10.p.1">No significant changes.</p> |
---|
1267 | <h2 id="rfc.section.C.11"><a href="#rfc.section.C.11">C.11</a> <a id="changes.since.09" href="#changes.since.09">Since draft-ietf-httpbis-p7-auth-09</a></h2> |
---|
1268 | <p id="rfc.section.C.11.p.1">Partly resolved issues: </p> |
---|
1269 | <ul> |
---|
1270 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/196">http://tools.ietf.org/wg/httpbis/trac/ticket/196</a>>: "Term for the requested resource's URI" |
---|
1271 | </li> |
---|
1272 | </ul> |
---|
1273 | <h2 id="rfc.section.C.12"><a href="#rfc.section.C.12">C.12</a> <a id="changes.since.10" href="#changes.since.10">Since draft-ietf-httpbis-p7-auth-10</a></h2> |
---|
1274 | <p id="rfc.section.C.12.p.1">None.</p> |
---|
1275 | <h2 id="rfc.section.C.13"><a href="#rfc.section.C.13">C.13</a> <a id="changes.since.11" href="#changes.since.11">Since draft-ietf-httpbis-p7-auth-11</a></h2> |
---|
1276 | <p id="rfc.section.C.13.p.1">Closed issues: </p> |
---|
1277 | <ul> |
---|
1278 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/130">http://tools.ietf.org/wg/httpbis/trac/ticket/130</a>>: "introduction to part 7 is work-in-progress" |
---|
1279 | </li> |
---|
1280 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/195">http://tools.ietf.org/wg/httpbis/trac/ticket/195</a>>: "auth-param syntax" |
---|
1281 | </li> |
---|
1282 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/224">http://tools.ietf.org/wg/httpbis/trac/ticket/224</a>>: "Header Classification" |
---|
1283 | </li> |
---|
1284 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/237">http://tools.ietf.org/wg/httpbis/trac/ticket/237</a>>: "absorbing the auth framework from 2617" |
---|
1285 | </li> |
---|
1286 | </ul> |
---|
1287 | <p id="rfc.section.C.13.p.2">Partly resolved issues: </p> |
---|
1288 | <ul> |
---|
1289 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/141">http://tools.ietf.org/wg/httpbis/trac/ticket/141</a>>: "should we have an auth scheme registry" |
---|
1290 | </li> |
---|
1291 | </ul> |
---|
1292 | <h2 id="rfc.section.C.14"><a href="#rfc.section.C.14">C.14</a> <a id="changes.since.12" href="#changes.since.12">Since draft-ietf-httpbis-p7-auth-12</a></h2> |
---|
1293 | <p id="rfc.section.C.14.p.1">None.</p> |
---|
1294 | <h2 id="rfc.section.C.15"><a href="#rfc.section.C.15">C.15</a> <a id="changes.since.13" href="#changes.since.13">Since draft-ietf-httpbis-p7-auth-13</a></h2> |
---|
1295 | <p id="rfc.section.C.15.p.1">Closed issues: </p> |
---|
1296 | <ul> |
---|
1297 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/276">http://tools.ietf.org/wg/httpbis/trac/ticket/276</a>>: "untangle ABNFs for header fields" |
---|
1298 | </li> |
---|
1299 | </ul> |
---|
1300 | <h2 id="rfc.section.C.16"><a href="#rfc.section.C.16">C.16</a> <a id="changes.since.14" href="#changes.since.14">Since draft-ietf-httpbis-p7-auth-14</a></h2> |
---|
1301 | <p id="rfc.section.C.16.p.1">None.</p> |
---|
1302 | <h2 id="rfc.section.C.17"><a href="#rfc.section.C.17">C.17</a> <a id="changes.since.15" href="#changes.since.15">Since draft-ietf-httpbis-p7-auth-15</a></h2> |
---|
1303 | <p id="rfc.section.C.17.p.1">Closed issues: </p> |
---|
1304 | <ul> |
---|
1305 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/78">http://tools.ietf.org/wg/httpbis/trac/ticket/78</a>>: "Relationship between 401, Authorization and WWW-Authenticate" |
---|
1306 | </li> |
---|
1307 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/177">http://tools.ietf.org/wg/httpbis/trac/ticket/177</a>>: "Realm required on challenges" |
---|
1308 | </li> |
---|
1309 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/195">http://tools.ietf.org/wg/httpbis/trac/ticket/195</a>>: "auth-param syntax" |
---|
1310 | </li> |
---|
1311 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/257">http://tools.ietf.org/wg/httpbis/trac/ticket/257</a>>: "Considerations for new authentications schemes" |
---|
1312 | </li> |
---|
1313 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/287">http://tools.ietf.org/wg/httpbis/trac/ticket/287</a>>: "LWS in auth-param ABNF" |
---|
1314 | </li> |
---|
1315 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/309">http://tools.ietf.org/wg/httpbis/trac/ticket/309</a>>: "credentials ABNF missing SP (still using implied LWS?)" |
---|
1316 | </li> |
---|
1317 | </ul> |
---|
1318 | <h2 id="rfc.section.C.18"><a href="#rfc.section.C.18">C.18</a> <a id="changes.since.16" href="#changes.since.16">Since draft-ietf-httpbis-p7-auth-16</a></h2> |
---|
1319 | <p id="rfc.section.C.18.p.1">Closed issues: </p> |
---|
1320 | <ul> |
---|
1321 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/186">http://tools.ietf.org/wg/httpbis/trac/ticket/186</a>>: "Document HTTP's error-handling philosophy" |
---|
1322 | </li> |
---|
1323 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/320">http://tools.ietf.org/wg/httpbis/trac/ticket/320</a>>: "add advice on defining auth scheme parameters" |
---|
1324 | </li> |
---|
1325 | </ul> |
---|
1326 | <h2 id="rfc.section.C.19"><a href="#rfc.section.C.19">C.19</a> <a id="changes.since.17" href="#changes.since.17">Since draft-ietf-httpbis-p7-auth-17</a></h2> |
---|
1327 | <p id="rfc.section.C.19.p.1">Closed issues: </p> |
---|
1328 | <ul> |
---|
1329 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/314">http://tools.ietf.org/wg/httpbis/trac/ticket/314</a>>: "allow unquoted realm parameters" |
---|
1330 | </li> |
---|
1331 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/321">http://tools.ietf.org/wg/httpbis/trac/ticket/321</a>>: "Repeating auth-params" |
---|
1332 | </li> |
---|
1333 | </ul> |
---|
1334 | <h2 id="rfc.section.C.20"><a href="#rfc.section.C.20">C.20</a> <a id="changes.since.18" href="#changes.since.18">Since draft-ietf-httpbis-p7-auth-18</a></h2> |
---|
1335 | <p id="rfc.section.C.20.p.1">Closed issues: </p> |
---|
1336 | <ul> |
---|
1337 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/334">http://tools.ietf.org/wg/httpbis/trac/ticket/334</a>>: "recipient behavior for new auth parameters" |
---|
1338 | </li> |
---|
1339 | <li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/342">http://tools.ietf.org/wg/httpbis/trac/ticket/342</a>>: "WWW-Authenticate ABNF slightly ambiguous" |
---|
1340 | </li> |
---|
1341 | </ul> |
---|
1342 | <h1 id="rfc.index"><a href="#rfc.index">Index</a></h1> |
---|
1343 | <p class="noprint"><a href="#rfc.index.4">4</a> <a href="#rfc.index.A">A</a> <a href="#rfc.index.B">B</a> <a href="#rfc.index.C">C</a> <a href="#rfc.index.G">G</a> <a href="#rfc.index.H">H</a> <a href="#rfc.index.P">P</a> <a href="#rfc.index.R">R</a> <a href="#rfc.index.S">S</a> <a href="#rfc.index.W">W</a> |
---|
1344 | </p> |
---|
1345 | <div class="print2col"> |
---|
1346 | <ul class="ind"> |
---|
1347 | <li><a id="rfc.index.4" href="#rfc.index.4"><b>4</b></a><ul> |
---|
1348 | <li>401 Unauthorized (status code) <a href="#rfc.iref.12"><b>3.1</b></a>, <a href="#rfc.xref.status.401.1">5.2</a></li> |
---|
1349 | <li>407 Proxy Authentication Required (status code) <a href="#rfc.iref.13"><b>3.2</b></a>, <a href="#rfc.xref.status.407.1">5.2</a></li> |
---|
1350 | </ul> |
---|
1351 | </li> |
---|
1352 | <li><a id="rfc.index.A" href="#rfc.index.A"><b>A</b></a><ul> |
---|
1353 | <li><tt>auth-param</tt> <a href="#rfc.iref.a.2"><b>2.1</b></a></li> |
---|
1354 | <li><tt>auth-scheme</tt> <a href="#rfc.iref.a.1"><b>2.1</b></a></li> |
---|
1355 | <li>Authorization header field <a href="#rfc.xref.header.authorization.1">2.1</a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.a.3"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li> |
---|
1356 | </ul> |
---|
1357 | </li> |
---|
1358 | <li><a id="rfc.index.B" href="#rfc.index.B"><b>B</b></a><ul> |
---|
1359 | <li><tt>b64token</tt> <a href="#rfc.iref.b.1"><b>2.1</b></a></li> |
---|
1360 | </ul> |
---|
1361 | </li> |
---|
1362 | <li><a id="rfc.index.C" href="#rfc.index.C"><b>C</b></a><ul> |
---|
1363 | <li><tt>challenge</tt> <a href="#rfc.iref.c.1"><b>2.1</b></a></li> |
---|
1364 | <li><tt>credentials</tt> <a href="#rfc.iref.c.2"><b>2.1</b></a></li> |
---|
1365 | </ul> |
---|
1366 | </li> |
---|
1367 | <li><a id="rfc.index.G" href="#rfc.index.G"><b>G</b></a><ul> |
---|
1368 | <li><tt>Grammar</tt> |
---|
1369 | <ul> |
---|
1370 | <li><tt>auth-param</tt> <a href="#rfc.iref.g.2"><b>2.1</b></a></li> |
---|
1371 | <li><tt>auth-scheme</tt> <a href="#rfc.iref.g.1"><b>2.1</b></a></li> |
---|
1372 | <li><tt>Authorization</tt> <a href="#rfc.iref.g.6"><b>4.1</b></a></li> |
---|
1373 | <li><tt>b64token</tt> <a href="#rfc.iref.g.3"><b>2.1</b></a></li> |
---|
1374 | <li><tt>challenge</tt> <a href="#rfc.iref.g.4"><b>2.1</b></a></li> |
---|
1375 | <li><tt>credentials</tt> <a href="#rfc.iref.g.5"><b>2.1</b></a></li> |
---|
1376 | <li><tt>Proxy-Authenticate</tt> <a href="#rfc.iref.g.7"><b>4.2</b></a></li> |
---|
1377 | <li><tt>Proxy-Authorization</tt> <a href="#rfc.iref.g.8"><b>4.3</b></a></li> |
---|
1378 | <li><tt>WWW-Authenticate</tt> <a href="#rfc.iref.g.9"><b>4.4</b></a></li> |
---|
1379 | </ul> |
---|
1380 | </li> |
---|
1381 | </ul> |
---|
1382 | </li> |
---|
1383 | <li><a id="rfc.index.H" href="#rfc.index.H"><b>H</b></a><ul> |
---|
1384 | <li>Header Fields |
---|
1385 | <ul> |
---|
1386 | <li>Authorization <a href="#rfc.xref.header.authorization.1">2.1</a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.h.1"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li> |
---|
1387 | <li>Proxy-Authenticate <a href="#rfc.xref.header.proxy-authenticate.1">3.2</a>, <a href="#rfc.iref.h.2"><b>4.2</b></a>, <a href="#rfc.xref.header.proxy-authenticate.2">5.3</a></li> |
---|
1388 | <li>Proxy-Authorization <a href="#rfc.xref.header.proxy-authorization.1">3.2</a>, <a href="#rfc.iref.h.3"><b>4.3</b></a>, <a href="#rfc.xref.header.proxy-authorization.2">5.3</a></li> |
---|
1389 | <li>WWW-Authenticate <a href="#rfc.xref.header.www-authenticate.1">3.1</a>, <a href="#rfc.xref.header.www-authenticate.2">4.2</a>, <a href="#rfc.iref.h.4"><b>4.4</b></a>, <a href="#rfc.xref.header.www-authenticate.3">5.3</a></li> |
---|
1390 | </ul> |
---|
1391 | </li> |
---|
1392 | </ul> |
---|
1393 | </li> |
---|
1394 | <li><a id="rfc.index.P" href="#rfc.index.P"><b>P</b></a><ul> |
---|
1395 | <li><em>Part1</em> <a href="#rfc.xref.Part1.1">1.1</a>, <a href="#rfc.xref.Part1.2">1.2</a>, <a href="#rfc.xref.Part1.3">1.2.1</a>, <a href="#rfc.xref.Part1.4">1.2.1</a>, <a href="#rfc.xref.Part1.5">1.2.1</a>, <a href="#rfc.xref.Part1.6">1.2.1</a>, <a href="#rfc.xref.Part1.7">1.2.1</a>, <a href="#rfc.xref.Part1.8">2.2</a>, <a href="#rfc.xref.Part1.9">2.3.1</a>, <a href="#rfc.xref.Part1.10">4.2</a>, <a href="#rfc.xref.Part1.11">4.4</a>, <a href="#rfc.xref.Part1.12">7</a>, <a href="#Part1"><b>8.1</b></a><ul> |
---|
1396 | <li><em>Section 1.2</em> <a href="#rfc.xref.Part1.2">1.2</a></li> |
---|
1397 | <li><em>Section 2</em> <a href="#rfc.xref.Part1.1">1.1</a></li> |
---|
1398 | <li><em>Section 2.3</em> <a href="#rfc.xref.Part1.9">2.3.1</a></li> |
---|
1399 | <li><em>Section 3.2.1</em> <a href="#rfc.xref.Part1.4">1.2.1</a>, <a href="#rfc.xref.Part1.5">1.2.1</a></li> |
---|
1400 | <li><em>Section 3.2.4</em> <a href="#rfc.xref.Part1.6">1.2.1</a>, <a href="#rfc.xref.Part1.7">1.2.1</a></li> |
---|
1401 | <li><em>Section 5.6</em> <a href="#rfc.xref.Part1.8">2.2</a>, <a href="#rfc.xref.Part1.10">4.2</a>, <a href="#rfc.xref.Part1.11">4.4</a></li> |
---|
1402 | <li><em>Section 11</em> <a href="#rfc.xref.Part1.12">7</a></li> |
---|
1403 | </ul> |
---|
1404 | </li> |
---|
1405 | <li><em>Part6</em> <a href="#rfc.xref.Part6.1">4.1</a>, <a href="#Part6"><b>8.1</b></a><ul> |
---|
1406 | <li><em>Section 1.2</em> <a href="#rfc.xref.Part6.1">4.1</a></li> |
---|
1407 | </ul> |
---|
1408 | </li> |
---|
1409 | <li>Protection Space <a href="#rfc.iref.p.1">2.2</a></li> |
---|
1410 | <li>Proxy-Authenticate header field <a href="#rfc.xref.header.proxy-authenticate.1">3.2</a>, <a href="#rfc.iref.p.2"><b>4.2</b></a>, <a href="#rfc.xref.header.proxy-authenticate.2">5.3</a></li> |
---|
1411 | <li>Proxy-Authorization header field <a href="#rfc.xref.header.proxy-authorization.1">3.2</a>, <a href="#rfc.iref.p.3"><b>4.3</b></a>, <a href="#rfc.xref.header.proxy-authorization.2">5.3</a></li> |
---|
1412 | </ul> |
---|
1413 | </li> |
---|
1414 | <li><a id="rfc.index.R" href="#rfc.index.R"><b>R</b></a><ul> |
---|
1415 | <li>Realm <a href="#rfc.iref.r.1">2.2</a></li> |
---|
1416 | <li><em>RFC2119</em> <a href="#rfc.xref.RFC2119.1">1.1</a>, <a href="#RFC2119"><b>8.1</b></a></li> |
---|
1417 | <li><em>RFC2616</em> <a href="#rfc.xref.RFC2616.1">1</a>, <a href="#RFC2616"><b>8.2</b></a>, <a href="#rfc.xref.RFC2616.2">C.1</a></li> |
---|
1418 | <li><em>RFC2617</em> <a href="#rfc.xref.RFC2617.1">1</a>, <a href="#rfc.xref.RFC2617.2">1</a>, <a href="#rfc.xref.RFC2617.3">7</a>, <a href="#rfc.xref.RFC2617.4">7</a>, <a href="#RFC2617"><b>8.2</b></a><ul> |
---|
1419 | <li><em>Section 6</em> <a href="#rfc.xref.RFC2617.4">7</a></li> |
---|
1420 | </ul> |
---|
1421 | </li> |
---|
1422 | <li><em>RFC3864</em> <a href="#rfc.xref.RFC3864.1">5.3</a>, <a href="#RFC3864"><b>8.2</b></a></li> |
---|
1423 | <li><em>RFC3986</em> <a href="#rfc.xref.RFC3986.1">2.1</a>, <a href="#RFC3986"><b>8.2</b></a></li> |
---|
1424 | <li><em>RFC4648</em> <a href="#rfc.xref.RFC4648.1">2.1</a>, <a href="#RFC4648"><b>8.2</b></a></li> |
---|
1425 | <li><em>RFC5226</em> <a href="#rfc.xref.RFC5226.1">2.3</a>, <a href="#RFC5226"><b>8.2</b></a><ul> |
---|
1426 | <li><em>Section 4.1</em> <a href="#rfc.xref.RFC5226.1">2.3</a></li> |
---|
1427 | </ul> |
---|
1428 | </li> |
---|
1429 | <li><em>RFC5234</em> <a href="#rfc.xref.RFC5234.1">1.2</a>, <a href="#rfc.xref.RFC5234.2">1.2</a>, <a href="#RFC5234"><b>8.1</b></a><ul> |
---|
1430 | <li><em>Appendix B.1</em> <a href="#rfc.xref.RFC5234.2">1.2</a></li> |
---|
1431 | </ul> |
---|
1432 | </li> |
---|
1433 | </ul> |
---|
1434 | </li> |
---|
1435 | <li><a id="rfc.index.S" href="#rfc.index.S"><b>S</b></a><ul> |
---|
1436 | <li>Status Codes |
---|
1437 | <ul> |
---|
1438 | <li>401 Unauthorized <a href="#rfc.iref.s.1"><b>3.1</b></a>, <a href="#rfc.xref.status.401.1">5.2</a></li> |
---|
1439 | <li>407 Proxy Authentication Required <a href="#rfc.iref.s.2"><b>3.2</b></a>, <a href="#rfc.xref.status.407.1">5.2</a></li> |
---|
1440 | </ul> |
---|
1441 | </li> |
---|
1442 | </ul> |
---|
1443 | </li> |
---|
1444 | <li><a id="rfc.index.W" href="#rfc.index.W"><b>W</b></a><ul> |
---|
1445 | <li>WWW-Authenticate header field <a href="#rfc.xref.header.www-authenticate.1">3.1</a>, <a href="#rfc.xref.header.www-authenticate.2">4.2</a>, <a href="#rfc.iref.w.1"><b>4.4</b></a>, <a href="#rfc.xref.header.www-authenticate.3">5.3</a></li> |
---|
1446 | </ul> |
---|
1447 | </li> |
---|
1448 | </ul> |
---|
1449 | </div> |
---|
1450 | </body> |
---|
1451 | </html> |
---|