Skip to main content

Controlling Access I: Authentication

  • Chapter
Pro PHP Security
  • 814 Accesses

Summary

In this chapter, we have surveyed the complex task of authenticating your users, that is, attempting to identify them to make sure that they are indeed exactly who they are representing themselves to be. We have discussed both the Basic and Digest flavors of HTTP Authentication, two-factor authentication, certificate-based authentication schemes, and Single Sign-On schemes; and where appropriate, we have provided PHP-based solutions to the dilemma of accomplishing this authentication safely and easily.

Now that we can have some confidence in who our users are, we will turn in Chapter 10 to controlling their access to the various parts of your server’s resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Chris Snyder and Michael Southwell

About this chapter

Cite this chapter

(2005). Controlling Access I: Authentication. In: Pro PHP Security. Apress. https://doi.org/10.1007/978-1-4302-0057-4_9

Download citation

Publish with us

Policies and ethics