Chapter 7. Protecting your Squid Proxy Server with Authentication
In the previous chapters, we have learned about installing, configuring, running, and monitoring our Squid proxy server. In the last chapter, we also learned about analyzing the performance of our proxy server along with the usage statistics for different resources. In this chapter, we'll learn about protecting our Squid proxy server from unauthorized access, using the various authentication systems which are available. We'll also learn to develop a custom authentication helper, using which, we can design our own authentication system for our proxy server.
In this chapter, we will learn about:
Squid authentication
HTTP basic authentication
HTTP digest authentication
Microsoft NTLM authentication
Negotiate authentication
Using multiple authentication schemes
Writing a custom authentication helper
Making non-concurrent helpers concurrent
Common issues with authentication
So let's get on with it.