Cherokee Web Server: Authentication

Authentication

The authentication provides a mechanism to restrict the access of some resources as directories, extensions or predefined requests. The authentication modules receive the name of Validators, and each one of them implements a different authentication mechanism. The scope of a validator is local to a directory, extension definition or request entry, inside of an Auth clause.


There are two kinds of authentications:


Cherokee distributes a number of validators: htpasswd, htdigest, PAM, and a Plain text file validator. Some of these validators are only suitable for certain authentication methods:

HTTP BasicHTTP Digest
Plainyesyes
htpasswdyesno
htdigestyesyes
PAMyesno


User restriction

One of the common features for all the validator is the user basedrestrictions. Basically, it is possible to specify a list of users who are allowed to authenticate with the validator.

Example

The only users allowed to access to the directory /secret are alo and root, it doesn't matter is the systems has a hundred users.

Directory /secret {
    Auth Basic, Digest {
        Method pam
        User alo, root
    }
}