You can configure the
Alternatively, you can choose to not
authenticate users; in which case, any machine whose IP address is contained
in a Machine List will
be able to use the
You can apply HTTP and HTTPS authentication across both explicit and transparent proxy modes.
For background information and configuration steps, see Client Integrated Authentication using the Domain Controller.
For background information and configuration steps, see Client Integrated and Basic Authentication using the Domain Controller.
For background information and configuration steps, see Kerberos Authentication using Kerberos Distribution Center.
For background information and configuration steps, see Kerberos Authentication and Basic Authentication using Kerberos Distribution Center.
© 1995–2018 Clearswift Ltd.