A server side validation is better (if we can't even say needed), and it's really easy to make.
Here's an example if needed :
if(!empty($_POST['pseudo']) && !empty($_POST['password'])) {
//Prevent SQL injection (if you use DB here)
$pseudo = addslashes($_POST['pseudo']);
$password = addslashes($_POST['password']);
}
addslashes()
isn't the best way but work on any DB engine, for example it's better to use mysql_real_escape_string()
if you have a MySQL engine.
And the associated form :
<form method="post" action="#">
<label for="pseudo">Identifiant</label>
<input type="text" name="pseudo" required>
<label for="password">Mot de passe</label>
<input type="password" name="password">
<input type="submit" value="Connexion" required>
</form>