|Highwinds Software Product Documentation: Typhoon, Twister, Tornado, Hurricane, and Cyclone|
|<<< Previous||Chapter 7. Program-Based Authentication||Next >>>|
Both "authenticate" and "connect" requests allow a 5 byte response followed by optional "Field: value\r\n" lines terminated by a 3 byte ".\r\n" response. For example, as a response to the "authenticate" request, the authentication program can indicate that authentication has failed along with a reason, by responding with:
502\r\n WelcomeMessage: Permission denied -- Contact email@example.com.\r\n .\r\n
To indicate that authentication has succeeded and that the values from the feed object should be used, the program should respond with:
To indicate that authentication has succeeded and that the AllowReading, AllowPosting and AllowNewNews directives should be overridden and set to "True", the authentication program should respond with:
281\r\n AllowReading: True\r\n AllowPosting: True\r\n AllowNewNews: True\r\n .\r\n
We have included the Perl program sample_auth.pl in the etc directory as a simple example of program-based authentication. You may wish to refer to that program, or, if you prefer, you can use it as a starting point for your own authentication programs.