What is the authentication of the proxy server?

Proxy server is analogous to the office receptionist. The receptionist checks the identification and credentials of visitors, and if they go through this inspection, the receptionist asks for visitors. The receptionist may then inform whether the Office can help, according to politicians, skills and procedures of the office. In a similar way, when a computer is trying to access the web and use the database that will be there, it will often be required to identify and credentials in the form of username and password, proxy server is to determine whether the user address and internet protocol (IP) are. These are the first steps in the authentication of the proxy server and the simplest use of proxy servers to perform authentication tasks.

If everything goes well, the proxy server learns in what area the user wants to access. After checking its policy, the capabilities of the aposta - known as the protocol filters - the Proxy Server can allow the user to receive the user from the actual server on which the database is located. ViceTeli gets access to the research item from the actual database server.

Proxy server acts as a receptionist for clients and real servers as well as receptionists for officers in the company. This activity is what is called Proxy server verification. The use of Proxy authentication also protects the website from Denial of Service attacks and other such network attacks on their servers. These DOS attacks, if successful, can close the web and create a loss of computer networks, revenue and business opportunities, so the Proxy authentication feature is inexplicably valuable.

Another function of Proxy authentication is Encryption. The computer server on the website does not have to process its own encryption/security (SSL), but instead passes this task on the proxy server equipped with encryption and hardware acceleration of SSL. Proxy server with such a residIn fact, it could process the authentication of the Proxy and encryption for several websites. Just as the reception lobby in the office building could check the requests and direct the visitor to the right office to make the company requested, the proxy server that serves multiple websites, verifies and identifies a specific requirement.

If the offered brochure is not enough to serve with the needs of the visitor, then the receptionist gives instructions to the office. The reception lobby keeps record of all visitors, the office they visited, and each visitor's time in and out, as well as the proxy server. Sometimes it may be necessary to call safety to handle unwelcome OR threatening visitor. In a similar way, proxy servers can direct traffic to a specific website and also use antivirus and antispyware programs to turn off malware and viruses from access to the network.

Using the authentication of the proxy server allows you to set the filters for children that use internet. Users can set the verification so that only some parts of the Internet are open to the child based on the username and password provided to the child and there is constant monitoring to limit the child to certain places and/or undesirable content. Similarly, the office manager can set the proxy authentication logs for each employee he manages and enable access to certain modules and software for each employee according to types of jobs expected to be performed throughout the day.

For example, an employee's user name and password could only allow him to enter the shopping orders and work orders for the date. However, the same employee could be disabled by accessing the main book in the company's accounting software or disabled from planning software. Similarly, at many universities, the authentication of a reverse proxy server can block students and faculty members from the Internet areas that are not specific to their school work or obligationsnation. Username, password and IP address of the terminal used could block one of these users in access to gambling, pornography, sports, television programs and social sites using different content filtering protocols.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?