This module provides authentication front-ends such as
This module relies on
When using dbd
value.
Some users of DBD authentication in HTTPD 2.2 have reported that it
imposes a problematic load on the database. This is most likely where
an HTML page contains hundreds of objects (e.g. images, scripts, etc)
each of which requires authentication. Users affected (or concerned)
by this kind of problem should use
This simple example shows use of this module in the context of the Authentication and DBD frameworks.
# mod_dbd configuration # UPDATED to include authentication cacheing DBDriver pgsql DBDParams "dbname=apacheauth user=apache password=xxxxxx" DBDMin 4 DBDKeep 8 DBDMax 20 DBDExptime 300 <Directory /usr/www/myhost/private> # mod_authn_core and mod_auth_basic configuration # for mod_authn_dbd AuthType Basic AuthName "My Server" # To cache credentials, put socache ahead of dbd here AuthBasicProvider socache dbd # Also required for caching: tell the cache to cache dbd lookups! AuthnCacheProvideFor dbd AuthnCacheContext my-server # mod_authz_core configuration Require valid-user # mod_authn_dbd SQL query to authenticate a user AuthDBDUserPWQuery \ "SELECT password FROM authn WHERE user = %s" </Directory>
If httpd was built against
If a database query for example returned the username, full name and telephone number of a user, a CGI program will have access to this information without the need to make a second independent database query to gather this additional information.
This has the potential to dramatically simplify the coding and configuration required in some web applications.
The %s
format specifier.
AuthDBDUserPWQuery \ "SELECT password FROM authn WHERE user = %s"
The first column value of the first row returned by the query
statement should be a string containing the encrypted password.
Subsequent rows will be ignored. If no rows are returned, the user
will not be authenticated through
If httpd was built against AUTHENTICATE_COLUMN
.
The encrypted password format depends on which authentication
frontend (e.g.
The %s
format specifiers.
AuthDBDUserRealmQuery \ "SELECT password FROM authn WHERE user = %s AND realm = %s"
The first column value of the first row returned by the query
statement should be a string containing the encrypted password.
Subsequent rows will be ignored. If no rows are returned, the user
will not be authenticated through
If httpd was built against AUTHENTICATE_COLUMN
.
The encrypted password format depends on which authentication
frontend (e.g.