# if you are creating new pwd file then use attribute -c with command.. ex.:
sudo htpasswd -c /pwdlocation/.yourpwds_xxx user1# when appending another user then simply skip -c... ex.:
sudo htpasswd /pwdlocation/.yourpwds_xxx user2Here's a **clean, no-nonsense guide** to using
`htpasswd` for restricting webpage access in Apache and Nginx:
---
# **Restricting Webpage Access with `htpasswd`**
## **1. Install `htpasswd`**
On Debian/Ubuntu:
```sh
sudo apt install apache2-utils
```
On RHEL/CentOS:
```sh
sudo yum install httpd-tools
```
---
## **2. Create a Password File**
```sh
htpasswd -c /path/to/.htpasswd username
```
- `-c` creates a new file (use only the first time).
- Replace `username` with your desired username.
### **Add More Users**
```sh
htpasswd /path/to/.htpasswd anotheruser
```
---
## **3. Configure Apache or Nginx**
### **For Apache (`.htaccess` method)**
1. Create a `.htaccess` file in your protected directory:
```apache
AuthType Basic
AuthName "Restricted Area"
AuthUserFile /path/to/.htpasswd
Require valid-user
```
2. Enable `.htaccess` in your Apache config:
```apache
<Directory /var/www/html/protected>
AllowOverride AuthConfig
</Directory>
```
### **For Nginx**
Add this to your server block:
```nginx
location /protected {
auth_basic "Restricted Area";
auth_basic_user_file /path/to/.htpasswd;
}
```
## **4. Test It**
- Visit the protected page in a browser.
- You should be prompted for a username and password.