You can configure the
Alternatively, you can choose to not
authenticate users; in which case, any machine whose IP address is contained
in a Machine List will
be able to use the
You can apply HTTP and HTTPS authentication across both explicit and transparent proxy modes.