Summary
We have learned the various authentication schemes supported by Squid. We also learned about the various authentication helpers available for different authentication schemes.
Specifically, we have covered:
A lot of different ways to authenticate using the HTTP Basic authentication
HTTP Digest authentication and helpers supporting Digest authentication
Microsoft NTLM authentication
Negotiate authentication
Writing our own custom authentication helper, using which we can authenticate against various types of user databases.
Now, we know several ways to protect our Squid proxy server from unauthorized access. In the next chapter, we'll learn about building a hierarchy of Squid proxy servers to distribute load and optimize performance.