Top http://yscal.org/ Secrets
The authentication mechanisms described above belong into the HTTP protocol and they are managed by client and server HTTP application (if configured to require authentication before permitting consumer access to one or more Website sources), rather than by the web purposes using a World wide web so