The authentication provides a mechanism to restrict the access of some resources as directories, extensions or predefined requests. The authentication modules receive the name of Validators, and each one of them implements a different authentication mechanism. The scope of a validator is local to a directory, extension definition or request entry, inside of an Auth clause.
There are two kinds of authentications:
Cherokee distributes a number of validators: htpasswd, htdigest, PAM, and a Plain text file validator. Some of these validators are only suitable for certain authentication methods:
HTTP Basic | HTTP Digest | |
Plain | yes | yes |
htpasswd | yes | no |
htdigest | yes | yes |
PAM | yes | no |
One of the common features for all the validator is the user basedrestrictions. Basically, it is possible to specify a list of users who are allowed to authenticate with the validator.
The only users allowed to access to the directory /secret are alo and root, it doesn't matter is the systems has a hundred users.
Directory /secret { Auth Basic, Digest { Method pam User alo, root } }