Install
openclaw skills install htpasswdGenerate htpasswd entries for Apache/Nginx basic auth password management. Use when creating credentials, managing password files, or verifying users.
openclaw skills install htpasswdA real htpasswd file manager for Apache/Nginx HTTP basic authentication. Create password files, add/remove users, verify passwords, and list users. Supports apr1 (Apache MD5), SHA-256, and SHA-512 hash algorithms via openssl.
| Command | Description |
|---|---|
htpasswd create <file> <user> <password> | Create a new htpasswd file with the first user (fails if file exists) |
htpasswd add <file> <user> <password> | Add a user to an existing file (or update password if user exists) |
htpasswd delete <file> <user> | Remove a user from the htpasswd file |
htpasswd verify <file> <user> <password> | Verify a user's password (supports apr1, sha256, sha512, sha1, crypt) |
htpasswd list <file> | List all users with their hash algorithm type |
htpasswd version | Show version |
htpasswd help | Show available commands and usage |
| Variable | Default | Description |
|---|---|---|
HTPASSWD_ALGO | apr1 | Hash algorithm: apr1, sha256, or sha512 |
set -euo pipefail)openssl — for password hashing and verificationgrep, sed — standard text utilitieshtpasswd create /etc/nginx/.htpasswd admin secret to create a new filehtpasswd add to add users, htpasswd delete to remove themhtpasswd verify to check if a password is correcthtpasswd list shows all users and their hash typesHTPASSWD_ALGO=sha512 for SHA-512 instead of default apr1# Create a new htpasswd file
htpasswd create /etc/nginx/.htpasswd admin MySecretPass
# Add another user
htpasswd add /etc/nginx/.htpasswd editor AnotherPass
# Use SHA-512 for stronger hashing
HTPASSWD_ALGO=sha512 htpasswd add /etc/nginx/.htpasswd secure_user StrongPass
# List all users
htpasswd list /etc/nginx/.htpasswd
# Verify a password
htpasswd verify /etc/nginx/.htpasswd admin MySecretPass
# Delete a user
htpasswd delete /etc/nginx/.htpasswd editor
$ htpasswd create /tmp/.htpasswd admin secret123
┌──────────────────────────────────────────────────┐
│ htpasswd File Created │
├──────────────────────────────────────────────────┤
│ File: /tmp/.htpasswd │
│ User: admin │
│ Algo: apr1 │
│ Perms: 640 (owner rw, group r) │
├──────────────────────────────────────────────────┤
│ ✅ File created with 1 user │
└──────────────────────────────────────────────────┘
$ htpasswd list /tmp/.htpasswd
┌──────────────────────────────────────────────────┐
│ htpasswd Users │
├──────────────────────────────────────────────────┤
│ File: /tmp/.htpasswd │
│ Users: 2 │
├──────────────────────────────────────────────────┤
│ 1. admin [apr1 (MD5) ] │
│ 2. editor [sha512 ] │
└──────────────────────────────────────────────────┘
$ htpasswd verify /tmp/.htpasswd admin secret123
┌──────────────────────────────────────────────────┐
│ Password Verification │
├──────────────────────────────────────────────────┤
│ File: /tmp/.htpasswd │
│ User: admin │
│ Result: ✅ Password CORRECT │
└──────────────────────────────────────────────────┘
640 permissions (owner read/write, group read)apr1 (Apache MD5) — widely compatibleHTPASSWD_ALGO=sha512 for stronger hashing on modern systems: or whitespace charactersaddPowered by BytesAgain | bytesagain.com | hello@bytesagain.com