Description
The HTTP Authentication plugin allows you to use existing means of authenticating people to WordPress. This includes Apache’s basic HTTP authentication module, Shibboleth, and many others.
To follow updates to this plugin, visit:
https://danieltwc.com/
For help with this version, visit:
https://danieltwc.com/2011/http-authentication-4-0/
Screenshots
Installation
- Login as an existing user, such as admin.
- Upload the
http-authentication
folder to your plugins folder, usuallywp-content/plugins
. (Or simply via the built-in installer.) - Activate the plugin on the Plugins screen.
- Add one or more users to WordPress, specifying the external username for the « Username » field. Also be sure to set the role for each user.
- Logout.
- Protect
wp-login.php
andwp-admin
using your external authentication (using, for example,.htaccess
files). - Try logging in as one of the users added in step 4.
FAQ
-
What authentication mechanisms can I use?
-
Any authentication mechanism which sets the
REMOTE_USER
(orREDIRECT_REMOTE_USER
, in the case of ScriptAlias’d PHP-as-CGI) environment variable can be used in conjunction with this plugin. Examples include Apache’smod_auth
andmod_auth_ldap
. -
How should I set up external authentication?
-
This depends on your hosting environment and your means of authentication.
Many Apache installations allow configuration of authentication via
.htaccess
files, while some do not. Try adding the following to your blog’s top-level.htaccess
file:AuthName « WordPress »
AuthType Basic
AuthUserFile /path/to/passwords
Require user dwc(You may also want to protect your
xmlrpc.php
file, which uses separate authentication code.)Then, create another
.htaccess
file in yourwp-admin
directory with the following contents:
AuthName « WordPress »
AuthType Basic
AuthUserFile /path/to/passwords
Require user dwcIn both files, be sure to set
/path/to/passwords
to the location of your password file. For more information on creating this file, see below. -
Where can I find more information on configuring Apache authentication?
-
See Apache’s HOWTO: Authentication, Authorization, and Access Control.
-
How does this plugin authenticate users?
-
This plugin doesn’t actually authenticate users. It simply feeds WordPress the name of a user who has successfully authenticated through Apache.
To determine the username, this plugin uses the
REMOTE_USER
or theREDIRECT_REMOTE_USER
environment variable, which is set by many Apache authentication modules. If someone can find a way to spoof this value, this plugin is not guaranteed to be secure.By default, this plugin generates a random password each time you create a user or edit an existing user’s profile. However, since this plugin requires an external authentication mechanism, this password is not requested by WordPress. Generating a random password helps protect accounts, preventing one authorized user from pretending to be another.
-
If I disable this plugin, how will I login?
-
Because this plugin generates a random password when you create a new user or edit an existing user’s profile, you will most likely have to reset each user’s password if you disable this plugin. WordPress provides a link for requesting a new password on the login screen.
Also, you should leave the
admin
user as a fallback, i.e. create a new account to use with this plugin. As long as you don’t edit theadmin
profile, WordPress will store the password set when you installed WordPress.In the worst case scenario, you may have to use phpMyAdmin or the MySQL command line to reset a user’s password.
-
Can I configure the plugin to support standard WordPress logins?
-
Yes. You can authenticate some users via an external, single sign-on system and other users via the built-in username and password combination. (Note: When mixed authentication is in use, this plugin does not scramble passwords as described above.)
When you configure your external authentication system, make sure that you allow users in even if they have not authenticated externally. Using Shibboleth as an example:
AuthName « Shibboleth »
AuthType Shibboleth
Require ShibbolethThis enables Shibboleth authentication in « passive » mode.
Then, in WordPress:
- Set the plugin to allow WordPress authentication.
- Configure the login URI to match your Shibboleth system. For example, if your blog is hosted at
http://example.com/
, then your login URI should behttp://example.com/Shibboleth.sso/Login?target=%redirect_encoded%
. - Configure the logout URI to match your Shibboleth system. Following the above example, your logout URI would be
http://example.com/Shibboleth.sso/Logout?return=%redirect_encoded%
.
After saving the options, authentication will work as follows:
- If a user is already authenticated via Shibboleth, and he or she exists in the WordPress database, this plugin will log them in automatically.
- If a user is not authenticated via Shibboleth, the plugin will present the standard WordPress login form with an additional link to login via Shibboleth.
Other authentication systems (particularly those without a login or logout URI) will need to be configured differently.
-
Does this plugin support multisite (WordPress MU) setups?
-
Yes, you can enable this plugin across a network or on individual sites. However, options will need to be set on individual sites.
If you have suggestions on how to improve network support, please submit a comment.
-
How do you handle staged deployments (dev, test, prod) with the plugin?
-
If you have a WordPress site with multiple environments (e.g.
dev.example.com
,test.example.com
, andexample.com
) you can use additional variables in the login and logout URIs:%host%
– The current value of$_SERVER['HTTP_HOST']
%base%
– The base domain URL (everything before the path)%site%
– The WordPress home URI%redirect%
– The return URI provided by WordPress
You can also use
%host_encoded%
,%site_encoded%
, and%redirect_encoded%
for URL-encoded values.For example, your login URI could be:
https://%host%/Shibboleth.sso/Login?target=%redirect_encoded%
This would be modified for each environment as appropriate.
Reviews
Contributors & Developers
“HTTP Authentication” is open source software. The following people have contributed to this plugin.
ContributorsTranslate “HTTP Authentication” into your language.
Interested in development?
Browse the code, check out the SVN repository, or subscribe to the development log by RSS.
Changelog
4.6
- Add PHP 7/8 compatibility by updating constructor to use __construct
4.5
- Avoid some PHP notices due to saving options (William Schneider)
- Fix for redirect loop on some multisite setups (#1497)
- Add option to support additional $_SERVER variables in authentication (#1477)
- Remove use of call-time pass by reference to avoid warnings on PHP 5.3 and newer
- Fix deprecation notice in WordPress 3.3 on
get_userdatabylogin
(#1513) - Fix deprecation notice in WordPress 3.1 and later for including wp-includes/registration.php
- Associate options page label tags with their input fields (#1514)
4.4
- Update CSS to correctly center login button on WordPress 3.3
4.3
- Update plugin URIs
4.2
- Declare support for WordPress 3.2.1
- Extend variable replacement for staged deployments
- Wrap redirect parameter on login to force us through
wp-login.php
so we can check the external authentication (thanks to Josh Larios)
4.1
- Declare support for WordPress 3.2
- Update screenshots for WordPress 3.2
4.0
- Restore (and improve) support for falling back to WordPress password authentication
- Remove migration of old options format (we’ll assume enough people have upgraded)
3.3
- Update options handling to better support WordPress MU
3.2
- Restore password generation for adding and editing users
3.1
- Bump version number to make 3.0.1 the latest version on wordpress.org
3.0.1
- Handle authentication cookies more gracefully
3.0
- Add support for WordPress 3.0
- Update WordPress MU support for WordPress 3.0
2.4
- Add support for WordPress MU (Elliot Kendall)
- Allow for mixed HTTP and built-in authentication by falling back to wp-login.php (Elliot Kendall)