- Browsers remember passwords
When a user enters his username and password into a browser authentication dialog box-such as that shown in Figure 9-1-the browser remembers the credentials until the browser program is terminated or a new set of credentials are collected. When the user finishes with a web application-even if the application includes a logout page-the browser remembers the user credentials and allows access back to the same pages without challenge. Users may think they have logged off from an application correctly, only to leave an unattended browser as a security risk. By typing in a URL or simply using the Back button, another user can access the application unchallenged. The only sure way to protect against this kind of access is to terminate the browser.
Applications can be written to minimize this risk. By writing scripts that deliberately respond as unauthorized to a request that contains authenticated credentials, an application can enforce the intention of a logout. However, the application has to remember that the user logged out-or timed out-and respond accordingly. Such schemes lead to clumsy interactions with the user
- Limited to the browser authentication dialog
When an application uses HTTP authentication, the method for collecting user credentials is limited to the authentication dialog box provided by the browser. An online application might want to present the login page with some site advertising. For example, the login page of an online store, such as our winestore, can include new arrivals of stock as advertisements.
Another feature that isn't supported using the basic HTTP authentication is allowing users to authenticate themselves with credentials other than a username and a password. You can allow a user who has forgotten his password, to go to an alternate login page that asks for his date of birth, his mother's maiden name, or other personal details to authenticate. For this kind of application you should collect a new password and restrict the number of attempts to the alternate login screen; otherwise, there could be a security risk.
Some applications require multiple logins. For example, an application might be a corporate information system that requires all users to log in for basic access but then requires an additional username and password to access a restricted part of the site. HTTP doesn't allow for multiple
Authorizationheader fields in the one request
Authentication can be built into session-based applications by collecting user credentials in a
<form>. When the
<form> is submitted, the username and password are authenticated, and the authenticated state is recorded as a session variable. The authentication and authorization techniques developed earlier in this chapter-for example the
authenticateUser( ) function shown in Example 9-7-can easily be modified to work with
<form> data rather than
Collecting user credentials in a
<form> and storing the authenticated state in a session has disadvantages. First, the username and password aren't encoded-not even in a basic form-when passed from the browser to the web server. This problem is solved by using the Secure Sockets Layer protocol as discussed later in this chapter. Second, session hijacking may arise because the state of the session is used to control access to the application.