… sniff the password credentials on the wire. The Digest authentication scheme [ RFC7616 ] uses SHA-256 and SHA-512/256 (formerly SHA-1 and MD5) hash algorithms to hide the raw user password from network sniffers. However, if the number of possible candidate users' passwords is no…
…heme. This document generalizes the description for use not only in "Digest" ([ RFC7616 ]), but also in other future schemes that might have the same requirements for carrying additional information during authentication. . Notational Conventions This specification uses the Augme…
… defining the authentication framework), "HTTP Digest Access Authentication" ([ RFC7616 ], updating the definition of the "Digest" authentication scheme), and "HTTP Authentication-Info and Proxy-Authentication-Info Response Header Fields" ([ RFC7615 ]). Taken together, these four…
… cookie , or auto ) 5.3.3.6 DigestSecurityScheme Digest Access Authentication [ RFC7616 ] security configuration identified by the Vocabulary Term digest (i.e., "scheme": "digest" ). This scheme is similar to basic authentication but with added features to avoid man-in-the-middle…
… defining the authentication framework), "HTTP Digest Access Authentication" ([ RFC7616 ], updating the definition of the "Digest" authentication scheme), and "HTTP Authentication-Info and Proxy-Authentication-Info Response Header Fields" ([ RFC7615 ]). Taken together, these four…
…Qez6lgWjSQmu_uYSd5uX_Q/ 2312301 1681156 [http-auth] [Technical Errata Reported] RFC7616 (4897) [http-auth] [Technical Errata Reported] RFC7616 (4897) RFC Errata System 2016-12-29 http-auth /arch/msg/http-auth/oZwVQ1vNhqAMi8gfCE6x0zzgLm0/ 2311990 1681040 Re: [http-auth] Definition…
… defining the authentication framework), "HTTP Digest Access Authentication" ([ RFC7616 ], updating the definition of the "Digest" authentication scheme), and "HTTP Authentication-Info and Proxy-Authentication-Info Response Header Fields" ([ RFC7615 ]). Taken together, these four…
…ple, the "basic" and "digest" authentication schemes are defined by RFC7617 and RFC7616 , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separat…
…heme Name Reference Notes Basic RFC7617 Bearer RFC6750 Concealed RFC9729 Digest RFC7616 DPoP RFC9449, Section 7.1 GNAP RFC9635, Section 7.2 HOBA RFC7486, Section 3 The HOBA scheme can be used with either HTTP servers or proxies. When used in response to a 407 Proxy Authentication…
…, the "basic" and "digest" authentication schemes are defined by [RFC7617] and [RFC7616] , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separa…
…ple, the "basic" and "digest" authentication schemes are defined by RFC7617 and RFC7616 , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separat…
…ple, the "basic" and "digest" authentication schemes are defined by RFC7617 and RFC7616 , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separat…
…heme Name Reference Notes Basic RFC7617 Bearer RFC6750 Concealed RFC9729 Digest RFC7616 DPoP RFC9449, Section 7.1 GNAP RFC9635, Section 7.2 HOBA RFC7486, Section 3 The HOBA scheme can be used with either HTTP servers or proxies. When used in response to a 407 Proxy Authentication…
…, the "basic" and "digest" authentication schemes are defined by [RFC7617] and [RFC7616] , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separa…
…ple, the "basic" and "digest" authentication schemes are defined by RFC7617 and RFC7616 , respectively. 11.2. Authentication Parameters The authentication scheme is followed by additional information necessary for achieving authentication via that scheme as either a comma-separat…