This module allows the use of HTTP Basic Authentication to
    restrict access by looking up users in the given providers.
    HTTP Digest Authentication is provided by
    
The file provider is implemented
    by the 
Providers are queried in order until a provider finds a match for the requested username, at which point this sole provider will attempt to check the password. A failure to verify the password does not result in control being passed on to subsequent providers.
Providers are implemented by 
Normally, each authorization module listed in Off allows for both authentication and
    authorization to be passed on to other non-provider-based modules
    if there is no userID or rule
    matching the supplied userID.  This should only be necessary when
    combining 
The username and password specified are combined into an Authorization header, which is passed to the server or service behind the webserver. Both the username and password fields are interpreted using the expression parser, which allows both the username and password to be set based on request parameters.
If the password is not specified, the default value "password" will be used. To disable fake basic authentication for an URL space, specify "AuthBasicFake off".
In this example, we pass a fixed username and password to a backend server.
In this example, we pass the email address extracted from a client
    certificate, extending the functionality of the FakeBasicAuth option
    within the 
Extending the above example, we generate a password by hashing the email address with a fixed passphrase, and passing the hash to the backend server. This can be used to gate into legacy systems that do not support client certificates.
Normally, when using Basic Authentication, the providers listed in
    
When using 
As a consequence of the difference in the stored values between Basic and Digest Authentication, converting from Digest Authentication to Basic Authentication generally requires that all users be assigned new passwords, as their existing passwords cannot be recovered from the password storage scheme imposed on those providers which support Digest Authentication.
Setting the MD5 will cause the user's Basic Authentication password
    to be checked using the same encrypted format as for Digest
    Authentication.  First a string composed from the username, realm name,
    and password is hashed with MD5; then the username and this encrypted
    string are passed to the providers listed in
    Digest and Digest Authentication was in force.
    
Through the use of 
MD5.  Use of other providers will result
      in an error response and the client will be denied access.