Sponsored Content
Full Discussion: Logging htaccess
Special Forums Cybersecurity Logging htaccess Post 61803 by omnibarb on Tuesday 8th of February 2005 11:30:10 PM
Old 02-09-2005
Logging htaccess

hi i am trying to make a log of all users who access my website, i am using htaccess to administrate logins, how does htaccess store a session i.e where is the valid user login temporarily stored while a user is using the site or is there already some sort of logging being done by htaccess.

ideally i would like to store the username, time of login and what was accessed. in the log file
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

.htaccess?

For a schoolproject, I have to set up an intranet at a company headquarters in the Netherlands. But they want to give the division in the United States access to that intranet. I have to find out how to do that. I've heard that you can do that by giving certain people access to the intranet with... (1 Reply)
Discussion started by: Puc conDoin
1 Replies

2. UNIX for Dummies Questions & Answers

.htaccess

i want to protect a folder on my HP.... does the folder need more than ".htaccess" and ".htpasswd" to be protected , and ask for login and password??? Please help ...... i use HTAdmin 1.2.1 to manage my access files.. The systemadmin cant or wount answer.....:confused: Avenger (3 Replies)
Discussion started by: Avenger
3 Replies

3. Cybersecurity

htaccess

Something is wrong. I do everything right make the .htaccess file and stuff, but when I try the htpasswd command it says command not found. I use Putty SSH client and I think server is running RedHat 7.1 with Apache some version. HELP!!! (1 Reply)
Discussion started by: _hp_
1 Replies

4. UNIX for Advanced & Expert Users

Redirect with htaccess

Hi, I would like to use htaccess 301 redirect with URL hiding. Ex: when browse the website 'abc.com' it should show the contents of the page 'xyz.com/start/index.html' but in addressbar should show the domain 'abc.com'. I know it works with html URL frame rewrite. But my question is it... (0 Replies)
Discussion started by: chandranjoy
0 Replies

5. Web Development

.htaccess redirect with #

I have the following directive in my .htaccess: #RewriteRule ^mozrank/?$ "http://www.seobook.com/#a_aid=dh" The problem is that the redirect is going to http://www.seobook.com/%23a_aid=dh How to preserve the # when redirecting? (2 Replies)
Discussion started by: rlopes
2 Replies

6. UNIX and Linux Applications

Authentication via .htaccess and .htpasswd

I've created .htaccess and use htpasswd comand to create .htpasswd Now when I try to access my protected area I still have loging panel. I checked apache error log lile and found that there is some problem with mismatch password. I use Apache 2.2 .22 Is there some erron in creating... (25 Replies)
Discussion started by: Budrys
25 Replies

7. Linux

Syslog not logging successful logging while unlocking server's console

When unlocking a Linux server's console there's no event indicating successful logging Is there a way I can fix this ? I have the following in my rsyslog.conf auth.info /var/log/secure authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
LOGIN(1)						    BSD General Commands Manual 						  LOGIN(1)

NAME
login -- authenticate users and set up their session environment SYNOPSIS
login [-Ffps] [-a address] [-h hostname] [user] DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system. If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of users is done via passwords. If the user can be authenticated via S/Key, then the S/Key challenge is incorporated in the password prompt. The user then has the option of entering their Kerberos or normal password or the S/Key response. Neither will be echoed. The options are as follows: -a The -a option specifies the address of the host from which the connection was received. It is used by various daemons such as telnetd(8). This option may only be used by the super-user. -F The -F option acts like the -f option, but also indicates to login that it should attempt to rewrite an existing Kerberos 5 creden- tials cache (specified by the KRB5CCNAME environment variable) after dropping permissions to the user logging in. This flag is not supported under pam(8). -f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves. -h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This option may only be used by the super-user. -p By default, login discards any previous environment. The -p option disables this behavior. -s Require a secure authentication mechanism like Kerberos or S/Key to be used. This flag is not supported under pam(8). If a user other than the superuser attempts to login while the file /etc/nologin exists, login displays its contents to the user and exits. This is used by shutdown(8) to prevent normal users from logging in when the system is about to go down. Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed. This is to simplify logins for non-human users. login then records an entry in the wtmp(5) and utmp(5) files, executes site-specific login commands via the ttyaction(3) facility with an action of "login", and executes the user's command interpreter. login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL), search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER). The user's login experience can be customized using login class capabilities as configured in /etc/login.conf and documented in login.conf(5). The standard shells, csh(1) and sh(1), do not fork before executing the login utility. FILES
/etc/login.conf login class capability database /etc/motd message-of-the-day /etc/nologin disallows non-superuser logins /var/run/utmp list of current logins /var/log/lastlog last login account records /var/log/wtmp login account records /var/mail/user system mailboxes .hushlogin makes login quieter SEE ALSO
chpass(1), newgrp(1), passwd(1), rlogin(1), skey(1), getpass(3), ttyaction(3), login.conf(5), passwd.conf(5), utmp(5), environ(7), kerberos(8), pam(8) HISTORY
A login appeared in Version 6 AT&T UNIX. TRADEMARKS AND PATENTS
S/Key is a trademark of Bellcore. BSD
November 19, 2008 BSD
All times are GMT -4. The time now is 07:15 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy