I now understand the two parts, but what exactly IS proxy authentication
then? Is that verifying access based on users? IP Address? Something else?
Adam Lang
Systems Engineer
Rutgers Casualty Insurance Company
http://www.rutgersinsurance.com
> > ----- Original Message -----
> > From: "Henrik Nordstrom" <hno@hem.passagen.se>
> > To: "Adam Lang" <aalang@rutgersinsurance.com>
> > Cc: <squid-users@ircache.net>
> > Sent: Thursday, February 15, 2001 5:30 PM
> > Subject: Re: [SQU] IBM Host On Demand
> <snip>
>
> > >
> > > You cannot use proxy authentication unless the browser is configured
to
> > > use a proxy. A intercepting proxy does not exists in the view of the
> > > browser, and therefore the idea of performing proxy-authentication to
a
> > > non-existing proxy won't be (and SHOULD NOT be) accepted by the
browser.
> > >
> > > --
> > > Henrik Nordstrom
> > > Squid hacker
>
>
>
-- To unsubscribe, see http://www.squid-cache.org/mailing-lists.htmlReceived on Wed Feb 21 2001 - 13:17:48 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:58:07 MST