{"id":39,"date":"2013-01-12T02:30:41","date_gmt":"2013-01-12T02:30:41","guid":{"rendered":"http:\/\/www.siteuptime.com\/blog\/?p=39"},"modified":"2013-01-12T02:30:41","modified_gmt":"2013-01-12T02:30:41","slug":"keep-hackers-at-bay-with-http-authentication-monitoring","status":"publish","type":"post","link":"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/","title":{"rendered":"Keep Hackers at Bay with HTTP Authentication Monitoring"},"content":{"rendered":"<p>When you spend any significant chuck of time creating and maintaining a website, it becomes a labor of love. When you\u2019re heavily invested in your creation, protecting it should <em>always <\/em>be at the top of your list. In recent years, countless horror stories have surfaced about hijacked websites, hacking of sensitive hidden info, stolen user credentials, and more. In light of this sad reality, it would be insanely foolish to neglect website security.<\/p>\n<p>Basic HTTP authentication is one way to tighten up security around your site. Think of your overall security plan as the layers of an onion \u2013 the more layers you add, the harder it will be for a bad guy to break in. By enabling basic HTTP authentication on your site\u2019s private webpages, you\u2019re adding a much-needed layer of safety to your online masterpiece.<\/p>\n<h1>Understanding HTTP Authentication<\/h1>\n<p>In order to appreciate the benefits of HTTP authentication, you first need to understand what exactly it <em>is<\/em>. Let\u2019s break this down super simple style, shall we? Firs, there\u2019s the HTTP transaction. That\u2019s just the act of a browser sending a request to a server, followed by the server\u2019s response. Both request and response use HTTP when they\u2019re sent.<\/p>\n<p>Whenever an HTTP transaction happens, if the server has enabled HTTP authentication, the browser or client program must offer up some credentials in order to gain access. Once an Internet user enters the correct user name and password, he or she will gain access to the protected page.<\/p>\n<h1>Advantages and Warnings<\/h1>\n<p>The first major plus of using basic HTTP authentication is simply that all browsers support it. If your company runs a smaller website that\u2019s not open to the public, this option would be a <em>dynamite<\/em> addition to your existing website security plan. If you are the head of a large (and very public) online community, then you may need to opt for a different kind of authentication plan.<\/p>\n<p>If you\u2019re on team of programmers or system administrators, then you may have used basic HTTP authentication in your trusted network environment at some point or another. Since programmers must be able to read and diagnose activity, this form of authentication is preferable due to its simplicity. Bottom line: use this authentication technique in a trusted environment or on a private network. Otherwise, proceed with caution or enable additional security features to supplement HTTP authentication.<\/p>\n<h1>Introducing SiteUptime\u2019s HTTP Authentication Monitoring<\/h1>\n<p>Did you know that <a href=\"http:\/\/siteuptime.com\">SiteUptime<\/a> offers HTTP authentication along with its other website uptime monitoring services? When you purchase a website monitoring plan (you can compare the features of each <a href=\"https:\/\/www.siteuptime.com\/compare.php\">here<\/a>), you can add HTTP authentication for only <em>$5 extra per month<\/em>. We do all the heavy lifting \u2013 all you must do is select a user name and password for the page you want to protect, and we\u2019ll take it from there. No coding required.<\/p>\n<p>If someone tries to access the page and the login attempt fails, SiteUptime will automatically send you an alert so you can check out the situation immediately. If you have a private network with webpages you\u2019d like to protect, HTTP authentication is for you. If you have questions about this service,<a href=\"https:\/\/www.siteuptime.com\/ticket\/?frame=open.php\"> contact us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you spend any significant chuck of time creating and maintaining a website, it becomes a labor of love. When you\u2019re heavily invested in your creation, protecting it should always be at the top of your list. In recent years, countless horror stories have surfaced about hijacked websites, hacking of sensitive hidden info, stolen user [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[38,41,42,43,102],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keep Hackers at Bay with HTTP Authentication Monitoring<\/title>\n<meta name=\"description\" content=\"Learn how adding basic HTTP authentication monitoring to your sensitive webpages can up the security factor for your site.\" \/>\n<meta name=\"robots\" content=\"index, nofollow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keep Hackers at Bay with HTTP Authentication Monitoring\" \/>\n<meta property=\"og:description\" content=\"Learn how adding basic HTTP authentication monitoring to your sensitive webpages can up the security factor for your site.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"SiteUptime Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-12T02:30:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"SiteUptime\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\",\"name\":\"Site Uptime\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/wp-content\/uploads\/2016\/11\/logo.png\",\"width\":268,\"height\":67,\"caption\":\"Site Uptime\"},\"image\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#website\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/\",\"name\":\"SiteUptime Blog\",\"description\":\"Website Monitoring\",\"publisher\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.siteuptime.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/#webpage\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/\",\"name\":\"Keep Hackers at Bay with HTTP Authentication Monitoring\",\"isPartOf\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#website\"},\"datePublished\":\"2013-01-12T02:30:41+00:00\",\"dateModified\":\"2013-01-12T02:30:41+00:00\",\"description\":\"Learn how adding basic HTTP authentication monitoring to your sensitive webpages can up the security factor for your site.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#\/schema\/person\/ecbbd500e464bba4b18227fa3c2f30e2\"},\"headline\":\"Keep Hackers at Bay with HTTP Authentication Monitoring\",\"datePublished\":\"2013-01-12T02:30:41+00:00\",\"dateModified\":\"2013-01-12T02:30:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2013\/01\/12\/keep-hackers-at-bay-with-http-authentication-monitoring\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\"},\"keywords\":\"hackers,HTTP,HTTP authentication,HTTP authentication monitoring,website security\",\"articleSection\":\"Industry News &amp; Information\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#\/schema\/person\/ecbbd500e464bba4b18227fa3c2f30e2\",\"name\":\"SiteUptime\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/545f4b9369e0c592d416b5cf9f580773?s=96&d=mm&r=g\",\"caption\":\"SiteUptime\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts\/39"}],"collection":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":0,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}