Solved

using cookie to authenticate ... ???

Posted on 1997-08-16
3
207 Views
Last Modified: 2013-12-25
Hi, I was assigned a task to design user authentication on our web site.  The brief explaination of this authentication is as following.

1. everytime a user want to access our web site should provide their legal user name and password.

2. the administrator can manage the user-name-password database, such as adding a user, delete a user, change the user priority ...

I have read some stuff.  And it seems like cookie can do user authentication.  but I don't know how to do it exactly.  I hope we can use C to implement so that we can seamlessly integrate with our other program like cgi bins.  Do you have any idea about that?  Or do you know where on the web I can find some more info. about cookie authentication?  Thank you for your time.

Gang
0
Comment
Question by:feng042497
  • 2
3 Comments
 
LVL 5

Expert Comment

by:icd
ID: 1854734
Cookies are not reliable in that many people either don't have browsers that support them, or they do and they have turned cookies off. There is a bit of a backlash against cookies due to some sites using them to track users and obtain information about them.

If your server is UNIX then consider the .htaccess method which is not so dependent upon the type of browser.

0
 

Author Comment

by:feng042497
ID: 1854735
Hi, thank you for your help.  I know .htaccess is another solution to this problem.  But it is very hard to do user management, isn't it?
0
 
LVL 5

Accepted Solution

by:
icd earned 50 total points
ID: 1854736
There are cgi scripts that allow you to do user management from the web. So long as these scripts are themselves in a secured directory then it should be secure enough for your purposes.

A good resource to look at for several scripts is:-

http://www.cgi-resources.com/Programs_and_Scripts/Perl/Password_Protection/

There are several here that use .htaccess and you may even find one that uses cookies.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Web Site Hosting 10 68
How to parametrize bing map on webbrowser control 6 58
Popup window in I.E. 8 38
Video on my site 4 27
Problem to be resolved in this article Currently, development of website and web application can be done without writing thousands of lines of programming code by hand. Description This can be done through by using a open source framework such …
Read about why website design really matters in today's demanding market.
The viewer will learn how to dynamically set the form action using jQuery.
The viewer will learn how to count occurrences of each item in an array.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now