-
Notifications
You must be signed in to change notification settings - Fork 641
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question: RFC 7235 authentication #2959
Comments
Also I noticed that if i don't use So do i have other similar bugs where full HTTP responses aren't making their way to the browser. Maybe there is chunked encoding somewhere. I don't know. |
The flow you're using seems incorrect. The browser is free to open a new connection whenever it wants. Does your server logic rely on the assumption that the second request will be sent using the same connection? You might consider using cookies for session management to map subsequent requests to the same state stored on the server side.
|
I'm trying to implement basic authentication but struggling a bit.
I'm implementing
For the initial 401 response i'm using
The authorization request i get back from the browser is correct and I can decode the base64 encoded username and password. So that's all good.
I then reply with 200 response using:
However what follows is one of two behaviours:
Does that make sense? I'm forwarding the keep_alive requests everywhere trying to avoid multiple TCP connections.
Has anybody got authentication working reliably with Beast ?
The text was updated successfully, but these errors were encountered: