From 6c58a50db91f3956347618f6c20dbce13f94cd59 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Andr=C3=A9=20Malo?= Date: Thu, 5 Aug 2004 12:04:52 +0000 Subject: [PATCH] update transformation git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/APACHE_2_0_BRANCH@104506 13f79535-47bb-0310-9956-ffa450edef68 --- docs/manual/mod/mod_auth_digest.html.en | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/docs/manual/mod/mod_auth_digest.html.en b/docs/manual/mod/mod_auth_digest.html.en index 2258556b75b..de3d2ac21c4 100644 --- a/docs/manual/mod/mod_auth_digest.html.en +++ b/docs/manual/mod/mod_auth_digest.html.en @@ -88,9 +88,7 @@ than Basic authentication, but only works with supporting browsers. As of November 2002, the major browsers that support digest authentication are Opera, MS Internet - Explorer (fails when used with a query string - see the - AuthDigestEnableQueryStringHack - option below for a workaround), Amaya, Mozilla and Netscape since version 7. Since digest authentication is not + Explorer (fails when used with a query string - see "Working with MS Internet Explorer" below for a workaround), Amaya, Mozilla and Netscape since version 7. Since digest authentication is not as widely implemented as basic authentication, you should use it only in controlled environments.

@@ -109,9 +107,9 @@ limitation.

-

Apache also provides a workaround in the +

Since version 2.0.51 Apache also provides a workaround in the AuthDigestEnableQueryStringHack environment variable. - If AuthDigestEnableQueryStringHack is true for the + If AuthDigestEnableQueryStringHack is set for the request, Apache will take steps to work around the MSIE bug and remove the request URI from the digest comparison. Using this method would look similar to the following.

-- 2.47.2