Changeset 1344 for draft-ietf-httpbis/latest/p7-auth.html
- Timestamp:
- 24/07/11 18:59:48 (12 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
draft-ietf-httpbis/latest/p7-auth.html
r1343 r1344 543 543 </li> 544 544 <li>2. <a href="#access.authentication.framework">Access Authentication Framework</a><ul> 545 <li>2.1 <a href="#authentication.scheme.registry">Authentication Scheme Registry</a></li> 545 <li>2.1 <a href="#challenge.and.response">Challenge and Response</a></li> 546 <li>2.2 <a href="#protection.space">Protection Space (Realm)</a></li> 547 <li>2.3 <a href="#authentication.scheme.registry">Authentication Scheme Registry</a></li> 546 548 </ul> 547 549 </li> … … 629 631 <a href="#core.rules" class="smpl">OWS</a> = <OWS, defined in <a href="#Part1" id="rfc.xref.Part1.5"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, <a href="p1-messaging.html#basic.rules" title="Basic Rules">Section 1.2.2</a>> 630 632 </pre><h1 id="rfc.section.2"><a href="#rfc.section.2">2.</a> <a id="access.authentication.framework" href="#access.authentication.framework">Access Authentication Framework</a></h1> 631 <p id="rfc.section.2.p.1">HTTP provides a simple challenge-response authentication mechanism that can be used by a server to challenge a client request 633 <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a> <a id="challenge.and.response" href="#challenge.and.response">Challenge and Response</a></h2> 634 <p id="rfc.section.2.1.p.1">HTTP provides a simple challenge-response authentication mechanism that can be used by a server to challenge a client request 632 635 and by a client to provide authentication information. It uses an extensible, case-insensitive token to identify the authentication 633 636 scheme, followed by a comma-separated list of attribute-value pairs which carry the parameters necessary for achieving authentication … … 636 639 <div id="rfc.figure.u.2"></div><pre class="inline"><span id="rfc.iref.a.1"></span><span id="rfc.iref.a.2"></span> auth-scheme = token 637 640 auth-param = token "=" ( token / quoted-string ) 638 </pre><p id="rfc.section.2.p.3">The 401 (Unauthorized) response message is used by an origin server to challenge the authorization of a user agent. This response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one challenge applicable to the requested resource. The 407 (Proxy 639 Authentication Required) response message is used by a proxy to challenge the authorization of a client and <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing at least one challenge applicable to the proxy for the requested resource. 640 </p> 641 <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.c.1"></span> <a href="#access.authentication.framework" class="smpl">challenge</a> = <a href="#access.authentication.framework" class="smpl">auth-scheme</a> 1*<a href="#notation" class="smpl">SP</a> 1#<a href="#access.authentication.framework" class="smpl">auth-param</a> 642 </pre><div class="note" id="rfc.section.2.p.5"> 641 </pre><p id="rfc.section.2.1.p.3">The 401 (Unauthorized) response message is used by an origin server to challenge the authorization of a user agent. This response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one challenge applicable to the requested resource. 642 </p> 643 <p id="rfc.section.2.1.p.4">The 407 (Proxy Authentication Required) response message is used by a proxy to challenge the authorization of a client and <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing at least one challenge applicable to the proxy for the requested resource. 644 </p> 645 <div id="rfc.figure.u.3"></div><pre class="inline"><span id="rfc.iref.c.1"></span> <a href="#challenge.and.response" class="smpl">challenge</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> 1*<a href="#notation" class="smpl">SP</a> 1#<a href="#challenge.and.response" class="smpl">auth-param</a> 646 </pre><div class="note" id="rfc.section.2.1.p.6"> 643 647 <p> <b>Note:</b> User agents will need to take special care in parsing the WWW-Authenticate and Proxy-Authenticate header field values because 644 648 they can contain more than one challenge, or if more than one of each is provided, since the contents of a challenge can itself … … 646 650 </p> 647 651 </div> 648 <div class="note" id="rfc.section.2. p.6">652 <div class="note" id="rfc.section.2.1.p.7"> 649 653 <p> <b>Note:</b> Many browsers fail to parse challenges containing unknown schemes. A workaround for this problem is to list well-supported 650 schemes (such as "basic") first. 654 schemes (such as "basic") first. 651 655 </p> 652 656 </div> 653 <p id="rfc.section.2.p.7">The authentication parameter realm is defined for all authentication schemes:</p> 654 <div id="rfc.figure.u.4"></div><pre class="inline"><span id="rfc.iref.r.1"></span><span id="rfc.iref.r.2"></span> realm = "realm" "=" realm-value 657 <p id="rfc.section.2.1.p.8">A user agent that wishes to authenticate itself with an origin server — usually, but not necessarily, after receiving a 401 658 (Unauthorized) — <em class="bcp14">MAY</em> do so by including an Authorization header field with the request. 659 </p> 660 <p id="rfc.section.2.1.p.9">A client that wishes to authenticate itself with a proxy — usually, but not necessarily, after receiving a 407 (Proxy Authentication 661 Required) — <em class="bcp14">MAY</em> do so by including a Proxy-Authorization header field with the request. 662 </p> 663 <p id="rfc.section.2.1.p.10">Both the Authorization field value and the Proxy-Authorization field value consist of credentials containing the authentication 664 information of the client for the realm of the resource being requested. The user agent <em class="bcp14">MUST</em> choose to use one of the challenges with the strongest auth-scheme it understands and request credentials from the user based 665 upon that challenge. 666 </p> 667 <div id="rfc.figure.u.4"></div><pre class="inline"><span id="rfc.iref.c.2"></span> <a href="#challenge.and.response" class="smpl">credentials</a> = <a href="#challenge.and.response" class="smpl">auth-scheme</a> ( <a href="#core.rules" class="smpl">token</a> 668 / <a href="#core.rules" class="smpl">quoted-string</a> 669 / #<a href="#challenge.and.response" class="smpl">auth-param</a> ) 670 </pre><p id="rfc.section.2.1.p.12">If the origin server does not wish to accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 401 (Unauthorized) response. The response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one (possibly new) challenge applicable to the requested resource. 671 </p> 672 <p id="rfc.section.2.1.p.13">If a proxy does not accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 407 (Proxy Authentication Required). The response <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing a (possibly new) challenge applicable to the proxy for the requested 673 resource. 674 </p> 675 <p id="rfc.section.2.1.p.14">The HTTP protocol does not restrict applications to this simple challenge-response mechanism for access authentication. Additional 676 mechanisms <em class="bcp14">MAY</em> be used, such as encryption at the transport level or via message encapsulation, and with additional header fields specifying 677 authentication information. However, such additional mechanisms are not defined by this specification. 678 </p> 679 <p id="rfc.section.2.1.p.15">Proxies <em class="bcp14">MUST</em> forward the WWW-Authenticate and Authorization headers unmodified and follow the rules found in <a href="#header.authorization" id="rfc.xref.header.authorization.1" title="Authorization">Section 4.1</a>. 680 </p> 681 <h2 id="rfc.section.2.2"><a href="#rfc.section.2.2">2.2</a> <a id="protection.space" href="#protection.space">Protection Space (Realm)</a></h2> 682 <p id="rfc.section.2.2.p.1">The authentication parameter realm is defined for all authentication schemes:</p> 683 <div id="rfc.figure.u.5"></div><pre class="inline"><span id="rfc.iref.r.1"></span><span id="rfc.iref.r.2"></span> realm = "realm" "=" realm-value 655 684 realm-value = quoted-string 656 </pre><p id="rfc.section.2. p.9">The realm directive (case-insensitive) is required for all authentication schemes that issue a challenge. The realm value685 </pre><p id="rfc.section.2.2.p.3">The realm directive (case-insensitive) is required for all authentication schemes that issue a challenge. The realm value 657 686 (case-sensitive), in combination with the canonical root URI (the scheme and authority components of the effective request 658 687 URI; see <a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.6"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) of the server being accessed, defines the protection space. These realms allow the protected resources on a server to be … … 661 690 scheme. Note that there can be multiple challenges with the same auth-scheme but different realms. 662 691 </p> 663 <p id="rfc.section.2.p.10">A user agent that wishes to authenticate itself with an origin server — usually, but not necessarily, after receiving a 401 664 (Unauthorized) — <em class="bcp14">MAY</em> do so by including an Authorization header field with the request. A client that wishes to authenticate itself with a proxy 665 — usually, but not necessarily, after receiving a 407 (Proxy Authentication Required) — <em class="bcp14">MAY</em> do so by including a Proxy-Authorization header field with the request. Both the Authorization field value and the Proxy-Authorization 666 field value consist of credentials containing the authentication information of the client for the realm of the resource being 667 requested. The user agent <em class="bcp14">MUST</em> choose to use one of the challenges with the strongest auth-scheme it understands and request credentials from the user based 668 upon that challenge. 669 </p> 670 <div id="rfc.figure.u.5"></div><pre class="inline"><span id="rfc.iref.c.2"></span> <a href="#access.authentication.framework" class="smpl">credentials</a> = <a href="#access.authentication.framework" class="smpl">auth-scheme</a> ( <a href="#core.rules" class="smpl">token</a> 671 / <a href="#core.rules" class="smpl">quoted-string</a> 672 / #<a href="#access.authentication.framework" class="smpl">auth-param</a> ) 673 </pre><p id="rfc.section.2.p.12">The protection space determines the domain over which credentials can be automatically applied. If a prior request has been 692 <p id="rfc.section.2.2.p.4">The protection space determines the domain over which credentials can be automatically applied. If a prior request has been 674 693 authorized, the same credentials <em class="bcp14">MAY</em> be reused for all other requests within that protection space for a period of time determined by the authentication scheme, 675 694 parameters, and/or user preference. Unless otherwise defined by the authentication scheme, a single protection space cannot 676 695 extend outside the scope of its server. 677 696 </p> 678 <p id="rfc.section.2.p.13">If the origin server does not wish to accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 401 (Unauthorized) response. The response <em class="bcp14">MUST</em> include a WWW-Authenticate header field containing at least one (possibly new) challenge applicable to the requested resource. 679 If a proxy does not accept the credentials sent with a request, it <em class="bcp14">SHOULD</em> return a 407 (Proxy Authentication Required). The response <em class="bcp14">MUST</em> include a Proxy-Authenticate header field containing a (possibly new) challenge applicable to the proxy for the requested 680 resource. 681 </p> 682 <p id="rfc.section.2.p.14">The HTTP protocol does not restrict applications to this simple challenge-response mechanism for access authentication. Additional 683 mechanisms <em class="bcp14">MAY</em> be used, such as encryption at the transport level or via message encapsulation, and with additional header fields specifying 684 authentication information. However, such additional mechanisms are not defined by this specification. 685 </p> 686 <p id="rfc.section.2.p.15">Proxies <em class="bcp14">MUST</em> forward the WWW-Authenticate and Authorization headers unmodified and follow the rules found in <a href="#header.authorization" id="rfc.xref.header.authorization.1" title="Authorization">Section 4.1</a>. 687 </p> 688 <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a> <a id="authentication.scheme.registry" href="#authentication.scheme.registry">Authentication Scheme Registry</a></h2> 689 <p id="rfc.section.2.1.p.1">The HTTP Authentication Scheme Registry defines the name space for the authentication schemes in challenges and credentials.</p> 690 <p id="rfc.section.2.1.p.2">Registrations <em class="bcp14">MUST</em> include the following fields: 697 <h2 id="rfc.section.2.3"><a href="#rfc.section.2.3">2.3</a> <a id="authentication.scheme.registry" href="#authentication.scheme.registry">Authentication Scheme Registry</a></h2> 698 <p id="rfc.section.2.3.p.1">The HTTP Authentication Scheme Registry defines the name space for the authentication schemes in challenges and credentials.</p> 699 <p id="rfc.section.2.3.p.2">Registrations <em class="bcp14">MUST</em> include the following fields: 691 700 </p> 692 701 <ul> … … 694 703 <li>Pointer to specification text</li> 695 704 </ul> 696 <p id="rfc.section.2. 1.p.3">Values to be added to this name space are subject to IETF review (<a href="#RFC5226" id="rfc.xref.RFC5226.1"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>, <a href="http://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a>).697 </p> 698 <p id="rfc.section.2. 1.p.4">The registry itself is maintained at <<a href="http://www.iana.org/assignments/http-authschemes">http://www.iana.org/assignments/http-authschemes</a>>.705 <p id="rfc.section.2.3.p.3">Values to be added to this name space are subject to IETF review (<a href="#RFC5226" id="rfc.xref.RFC5226.1"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>, <a href="http://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a>). 706 </p> 707 <p id="rfc.section.2.3.p.4">The registry itself is maintained at <<a href="http://www.iana.org/assignments/http-authschemes">http://www.iana.org/assignments/http-authschemes</a>>. 699 708 </p> 700 709 <h1 id="rfc.section.3"><a href="#rfc.section.3">3.</a> <a id="status.code.definitions" href="#status.code.definitions">Status Code Definitions</a></h1> … … 722 731 for the realm of the resource being requested. 723 732 </p> 724 <div id="rfc.figure.u.6"></div><pre class="inline"><span id="rfc.iref.g.1"></span> <a href="#header.authorization" class="smpl">Authorization</a> = <a href="# access.authentication.framework" class="smpl">credentials</a>733 <div id="rfc.figure.u.6"></div><pre class="inline"><span id="rfc.iref.g.1"></span> <a href="#header.authorization" class="smpl">Authorization</a> = <a href="#challenge.and.response" class="smpl">credentials</a> 725 734 </pre><p id="rfc.section.4.1.p.3">If a request is authenticated and a realm specified, the same credentials <em class="bcp14">SHOULD</em> be valid for all other requests within this realm (assuming that the authentication scheme itself does not require otherwise, 726 735 such as credentials that vary according to a challenge value or using synchronized clocks). … … 745 754 to the proxy for this effective request URI (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.7"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). It <em class="bcp14">MUST</em> be included as part of a 407 (Proxy Authentication Required) response. 746 755 </p> 747 <div id="rfc.figure.u.7"></div><pre class="inline"><span id="rfc.iref.g.2"></span> <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> = 1#<a href="# access.authentication.framework" class="smpl">challenge</a>756 <div id="rfc.figure.u.7"></div><pre class="inline"><span id="rfc.iref.g.2"></span> <a href="#header.proxy-authenticate" class="smpl">Proxy-Authenticate</a> = 1#<a href="#challenge.and.response" class="smpl">challenge</a> 748 757 </pre><p id="rfc.section.4.2.p.3">Unlike WWW-Authenticate, the Proxy-Authenticate header field applies only to the current connection and <em class="bcp14">SHOULD NOT</em> be passed on to downstream clients. However, an intermediate proxy might need to obtain its own credentials by requesting 749 758 them from the downstream client, which in some circumstances will appear as if the proxy is forwarding the Proxy-Authenticate … … 757 766 the resource being requested. 758 767 </p> 759 <div id="rfc.figure.u.8"></div><pre class="inline"><span id="rfc.iref.g.3"></span> <a href="#header.proxy-authorization" class="smpl">Proxy-Authorization</a> = <a href="# access.authentication.framework" class="smpl">credentials</a>768 <div id="rfc.figure.u.8"></div><pre class="inline"><span id="rfc.iref.g.3"></span> <a href="#header.proxy-authorization" class="smpl">Proxy-Authorization</a> = <a href="#challenge.and.response" class="smpl">credentials</a> 760 769 </pre><p id="rfc.section.4.3.p.3">Unlike Authorization, the Proxy-Authorization header field applies only to the next outbound proxy that demanded authentication 761 770 using the Proxy-Authenticate field. When multiple proxies are used in a chain, the Proxy-Authorization header field is consumed … … 769 778 applicable to the effective request URI (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.8"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). It <em class="bcp14">MUST</em> be included in 401 (Unauthorized) response messages. 770 779 </p> 771 <div id="rfc.figure.u.9"></div><pre class="inline"><span id="rfc.iref.g.4"></span> <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> = 1#<a href="# access.authentication.framework" class="smpl">challenge</a>780 <div id="rfc.figure.u.9"></div><pre class="inline"><span id="rfc.iref.g.4"></span> <a href="#header.www-authenticate" class="smpl">WWW-Authenticate</a> = 1#<a href="#challenge.and.response" class="smpl">challenge</a> 772 781 </pre><p id="rfc.section.4.4.p.3">User agents are advised to take special care in parsing the WWW-Authenticate field value as it might contain more than one 773 782 challenge, or if more than one WWW-Authenticate header field is provided, the contents of a challenge itself can contain a … … 776 785 <h1 id="rfc.section.5"><a href="#rfc.section.5">5.</a> <a id="IANA.considerations" href="#IANA.considerations">IANA Considerations</a></h1> 777 786 <h2 id="rfc.section.5.1"><a href="#rfc.section.5.1">5.1</a> <a id="authentication.scheme.registration" href="#authentication.scheme.registration">Authenticaton Scheme Registry</a></h2> 778 <p id="rfc.section.5.1.p.1">The registration procedure for HTTP Authentication Schemes is defined by <a href="#authentication.scheme.registry" title="Authentication Scheme Registry">Section 2. 1</a> of this document.787 <p id="rfc.section.5.1.p.1">The registration procedure for HTTP Authentication Schemes is defined by <a href="#authentication.scheme.registry" title="Authentication Scheme Registry">Section 2.3</a> of this document. 779 788 </p> 780 789 <p id="rfc.section.5.1.p.2">The HTTP Method Authentication Scheme shall be created at <<a href="http://www.iana.org/assignments/http-authschemes">http://www.iana.org/assignments/http-authschemes</a>>. … … 969 978 ] ) 970 979 971 <a href="# access.authentication.framework" class="smpl">auth-param</a> = token "=" ( token / quoted-string )972 <a href="# access.authentication.framework" class="smpl">auth-scheme</a> = token973 974 <a href="# access.authentication.framework" class="smpl">challenge</a> = auth-scheme 1*SP *( "," OWS ) auth-param *( OWS "," [ OWS980 <a href="#challenge.and.response" class="smpl">auth-param</a> = token "=" ( token / quoted-string ) 981 <a href="#challenge.and.response" class="smpl">auth-scheme</a> = token 982 983 <a href="#challenge.and.response" class="smpl">challenge</a> = auth-scheme 1*SP *( "," OWS ) auth-param *( OWS "," [ OWS 975 984 auth-param ] ) 976 <a href="# access.authentication.framework" class="smpl">credentials</a> = auth-scheme ( token / quoted-string / [ ( "," /985 <a href="#challenge.and.response" class="smpl">credentials</a> = auth-scheme ( token / quoted-string / [ ( "," / 977 986 auth-param ) *( OWS "," [ OWS auth-param ] ) ] ) 978 987 … … 1088 1097 </li> 1089 1098 <li><a id="rfc.index.A" href="#rfc.index.A"><b>A</b></a><ul> 1090 <li><tt>auth-param</tt> <a href="#rfc.iref.a.2"><b>2 </b></a></li>1091 <li><tt>auth-scheme</tt> <a href="#rfc.iref.a.1"><b>2 </b></a></li>1092 <li>Authorization header field <a href="#rfc.xref.header.authorization.1">2 </a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.a.3"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li>1099 <li><tt>auth-param</tt> <a href="#rfc.iref.a.2"><b>2.1</b></a></li> 1100 <li><tt>auth-scheme</tt> <a href="#rfc.iref.a.1"><b>2.1</b></a></li> 1101 <li>Authorization header field <a href="#rfc.xref.header.authorization.1">2.1</a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.a.3"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li> 1093 1102 </ul> 1094 1103 </li> 1095 1104 <li><a id="rfc.index.C" href="#rfc.index.C"><b>C</b></a><ul> 1096 <li><tt>challenge</tt> <a href="#rfc.iref.c.1"><b>2 </b></a></li>1097 <li><tt>credentials</tt> <a href="#rfc.iref.c.2"><b>2 </b></a></li>1105 <li><tt>challenge</tt> <a href="#rfc.iref.c.1"><b>2.1</b></a></li> 1106 <li><tt>credentials</tt> <a href="#rfc.iref.c.2"><b>2.1</b></a></li> 1098 1107 </ul> 1099 1108 </li> … … 1112 1121 <li>Header Fields 1113 1122 <ul> 1114 <li>Authorization <a href="#rfc.xref.header.authorization.1">2 </a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.h.1"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li>1123 <li>Authorization <a href="#rfc.xref.header.authorization.1">2.1</a>, <a href="#rfc.xref.header.authorization.2">3.1</a>, <a href="#rfc.iref.h.1"><b>4.1</b></a>, <a href="#rfc.xref.header.authorization.3">5.3</a></li> 1115 1124 <li>Proxy-Authenticate <a href="#rfc.xref.header.proxy-authenticate.1">3.2</a>, <a href="#rfc.iref.h.2"><b>4.2</b></a>, <a href="#rfc.xref.header.proxy-authenticate.2">5.3</a></li> 1116 1125 <li>Proxy-Authorization <a href="#rfc.xref.header.proxy-authorization.1">3.2</a>, <a href="#rfc.iref.h.3"><b>4.3</b></a>, <a href="#rfc.xref.header.proxy-authorization.2">5.3</a></li> … … 1121 1130 </li> 1122 1131 <li><a id="rfc.index.P" href="#rfc.index.P"><b>P</b></a><ul> 1123 <li><em>Part1</em> <a href="#rfc.xref.Part1.1">1.2</a>, <a href="#rfc.xref.Part1.2">1.2.1</a>, <a href="#rfc.xref.Part1.3">1.2.1</a>, <a href="#rfc.xref.Part1.4">1.2.1</a>, <a href="#rfc.xref.Part1.5">1.2.1</a>, <a href="#rfc.xref.Part1.6">2 </a>, <a href="#rfc.xref.Part1.7">4.2</a>, <a href="#rfc.xref.Part1.8">4.4</a>, <a href="#Part1"><b>8.1</b></a><ul>1132 <li><em>Part1</em> <a href="#rfc.xref.Part1.1">1.2</a>, <a href="#rfc.xref.Part1.2">1.2.1</a>, <a href="#rfc.xref.Part1.3">1.2.1</a>, <a href="#rfc.xref.Part1.4">1.2.1</a>, <a href="#rfc.xref.Part1.5">1.2.1</a>, <a href="#rfc.xref.Part1.6">2.2</a>, <a href="#rfc.xref.Part1.7">4.2</a>, <a href="#rfc.xref.Part1.8">4.4</a>, <a href="#Part1"><b>8.1</b></a><ul> 1124 1133 <li><em>Section 1.2</em> <a href="#rfc.xref.Part1.1">1.2</a></li> 1125 1134 <li><em>Section 1.2.2</em> <a href="#rfc.xref.Part1.2">1.2.1</a>, <a href="#rfc.xref.Part1.3">1.2.1</a>, <a href="#rfc.xref.Part1.4">1.2.1</a>, <a href="#rfc.xref.Part1.5">1.2.1</a></li> 1126 <li><em>Section 4.3</em> <a href="#rfc.xref.Part1.6">2 </a>, <a href="#rfc.xref.Part1.7">4.2</a>, <a href="#rfc.xref.Part1.8">4.4</a></li>1135 <li><em>Section 4.3</em> <a href="#rfc.xref.Part1.6">2.2</a>, <a href="#rfc.xref.Part1.7">4.2</a>, <a href="#rfc.xref.Part1.8">4.4</a></li> 1127 1136 </ul> 1128 1137 </li> … … 1136 1145 </li> 1137 1146 <li><a id="rfc.index.R" href="#rfc.index.R"><b>R</b></a><ul> 1138 <li><tt>realm</tt> <a href="#rfc.iref.r.1"><b>2 </b></a></li>1139 <li><tt>realm-value</tt> <a href="#rfc.iref.r.2"><b>2 </b></a></li>1147 <li><tt>realm</tt> <a href="#rfc.iref.r.1"><b>2.2</b></a></li> 1148 <li><tt>realm-value</tt> <a href="#rfc.iref.r.2"><b>2.2</b></a></li> 1140 1149 <li><em>RFC2119</em> <a href="#rfc.xref.RFC2119.1">1.1</a>, <a href="#RFC2119"><b>8.1</b></a></li> 1141 1150 <li><em>RFC2616</em> <a href="#rfc.xref.RFC2616.1">1</a>, <a href="#rfc.xref.RFC2616.2">7</a>, <a href="#RFC2616"><b>8.2</b></a>, <a href="#rfc.xref.RFC2616.3">C.1</a></li> 1142 1151 <li><em>RFC2617</em> <a href="#rfc.xref.RFC2617.1">1</a>, <a href="#rfc.xref.RFC2617.2">1</a>, <a href="#RFC2617"><b>8.2</b></a></li> 1143 1152 <li><em>RFC3864</em> <a href="#rfc.xref.RFC3864.1">5.3</a>, <a href="#RFC3864"><b>8.2</b></a></li> 1144 <li><em>RFC5226</em> <a href="#rfc.xref.RFC5226.1">2. 1</a>, <a href="#RFC5226"><b>8.2</b></a><ul>1145 <li><em>Section 4.1</em> <a href="#rfc.xref.RFC5226.1">2. 1</a></li>1153 <li><em>RFC5226</em> <a href="#rfc.xref.RFC5226.1">2.3</a>, <a href="#RFC5226"><b>8.2</b></a><ul> 1154 <li><em>Section 4.1</em> <a href="#rfc.xref.RFC5226.1">2.3</a></li> 1146 1155 </ul> 1147 1156 </li>
Note: See TracChangeset
for help on using the changeset viewer.