The digest of a password for a realm is obtained by taking the MD5 hash of the
concatenation of the user string, a colon, the realm, a colon and the password. As an
example to obtain the digest of password "j379dbh8" for user "admin" and realm
"Administrative Area" we take the MD5 hash of "admin:Administrative
Area:j379dbh8", which is "264970c8c425e1b30b9fcdf1d0fbfafa".
Setting up the password for the access of the “admin” area. The password is put in clear text in the
configuration file.
<user>
<username>admin</username>
<password>xxxx</password>
</user>
Removing all access control for the monitoring user.
<user>
<username>monitoring</username>
</user>
Setting up the access for the user “content” with password "j379dbh8". The digest of the password is
sent. As there is only one possible realm, the attribute may be omitted.
<user>
<username>content</username>
<digest>35a89af39847f135ffbcd1042963d80e</digest>
</user>
Setting up the access for the user “admin”. The digest of the password is sent. As the admin user has
access to the 3 different areas of the interface, protected by 3 different realms, the three digest
passwords must be sent.
<user>
<username>admin</username>
<digest realm="Administrative Area">8eb48…93f6ffe8b02</digest>
<digest realm="Content Area">221cf5b7d6…35e2c1641514f</digest>
<digest realm="Monitoring Area">86ded93d…2d5c12c80aca</digest>
</user>
Summary of Contents for HMP series
Page 1: ...www spinetix com ...