=encoding utf-8 =head1 NAME ngx_http_auth_basic_module - Module ngx_http_auth_basic_module =head1 The C module allows limiting access to resources by validating the user name and password using the “HTTP Basic Authentication” protocol. Access can also be limited by L, by the L, or by L. Simultaneous limitation of access by address and by password is controlled by the L directive. =head1 Example Configuration location / { auth_basic "closed site"; auth_basic_user_file conf/htpasswd; } =head1 Directives =head2 auth_basic B auth_basic I> E C> B I B I B I B I B I Enables validation of user name and password using the “HTTP Basic Authentication” protocol. The specified parameter is used as a I>. Parameter value can contain variables (1.3.10, 1.2.7). The special value C allows cancelling the effect of the C directive inherited from the previous configuration level. =head2 auth_basic_user_file B auth_basic_user_file I>> B I B I B I B I Specifies a file that keeps user names and passwords, in the following format: # comment name1:password1 name2:password2:comment name3:password3 The I> name can contain variables. The following password types are supported: =over =item * encrypted with the C function; can be generated using the “C” utility from the Apache HTTP Server distribution or the “C” command; =item * hashed with the Apache variant of the MD5-based password algorithm (apr1); can be generated with the same tools; =item * specified by the “C<{>I>C<}>I>” syntax (1.0.3+) as described in L; currently implemented schemes include C (an example one, should not be used), C (1.3.13) (plain SHA-1 hashing, should not be used) and C (salted SHA-1 hashing, used by some software packages, notably OpenLDAP and Dovecot). B Support for C scheme was added only to aid in migration from other web servers. It should not be used for new passwords, since unsalted SHA-1 hashing that it employs is vulnerable to L attacks. =back