Summary
In this chapter, we have surveyed the complex task of authenticating your users, that is, attempting to identify them to make sure that they are indeed exactly who they are representing themselves to be. We have discussed both the Basic and Digest flavors of HTTP Authentication, two-factor authentication, certificate-based authentication schemes, and Single Sign-On schemes; and where appropriate, we have provided PHP-based solutions to the dilemma of accomplishing this authentication safely and easily.
Now that we can have some confidence in who our users are, we will turn in Chapter 10 to controlling their access to the various parts of your server’s resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2005 Chris Snyder and Michael Southwell
About this chapter
Cite this chapter
(2005). Controlling Access I: Authentication. In: Pro PHP Security. Apress. https://doi.org/10.1007/978-1-4302-0057-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0057-4_9
Publisher Name: Apress
Print ISBN: 978-1-59059-508-4
Online ISBN: 978-1-4302-0057-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books