Solved

.htaccess & caching

Posted on 1998-04-21
6
142 Views
Last Modified: 2013-12-25
Not sure of this is the proper forum, but...
Scenario:
User arrives at the front door, hits "enter"...they sign in as "client1" , password "open"...they look at whatever and then decide that they would like to see the stuff in "client2" (because that's just another job for the same client) they go back to the enter page...they hit enter..and get sent to client1, without being asked for a sign-in...? It just remembers that they've already signed in as client1...

can I force the sign in?

I'm using a perl redirect script to send the user to the appropriate place based on username.

thanks,
sean
0
Comment
Question by:seanD
  • 3
  • 2
6 Comments
 
LVL 3

Accepted Solution

by:
percyn earned 100 total points
Comment Utility
You can force authentication (assuming that you are using Basic Auth) by sending a "401 access denied" HTTP status message.

0
 

Author Comment

by:seanD
Comment Utility
thanks for the helpi am using Basic Auth...but how do i force a "401 access..."?

sean
0
 
LVL 3

Expert Comment

by:percyn
Comment Utility
Depends on what server you are using. In IIS, you can set the Response.Status to "401 access denied". There is something similar for Netscape servers too, but you will have to check your server docs.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 5

Expert Comment

by:julio011597
Comment Utility
Doesn't a 401 rensponse generate a "Authentication failed. Retry? OK - Cancel" confirm dialog first?
0
 
LVL 3

Expert Comment

by:percyn
Comment Utility
Yes, but that's the only way.
0
 
LVL 5

Expert Comment

by:julio011597
Comment Utility
Duh!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In this tutorial I will show you how to provide a dynamic RTF document on your website generated with data from your database. For this tutorial you will need Microsoft Word or WordPad, WhizBase and Microsoft Access. In this tutorial I will show …
I hope you'll find this tutorial useful and interesting. So let's try to extend Tcl with a new package.  For anyone more deeply interested please check out the book "Practical Programming in Tcl and Tk". It's really one of the best written books abo…
The viewer will learn the basics of jQuery, including how to invoke it on a web page. Reference your jQuery libraries: (CODE) Include your new external js/jQuery file: (CODE) Write your first lines of code to setup your site for jQuery.: (CODE)
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now