Bypass Authentication

Bypass Authentication

Business challenge

Stark tech has 200 employees. Star tech need to use proxy authentication to track employees Internet usage.
The issue faced by Stark tech for automatic updates (AV, MS, etc), which can't get out because of the proxy authentication. Since for user identification they have enabled authentication. For certain applications (like dropbox) which does not support proxy authentication, they want to bypass authentication for that application.

How SafeSquid bypass Authentication?

Access the SafeSquid User Interface

clicking on configure in safesquid intgerface
clicking on search
 

Edit policy to Enable as TRUE (Access Restrictions)

clicking on edit to edit the policy
edit policy to bypass authentication for applications and for categories
cliking on add new to create a new policy as an example to bypass authentication

How to create new policy to bypass authentication for dropbox?

creating an example of dropbox 

Go to Request Types

going to request types
clicking on add new to add a new request type
creating a policy as an example to bypass HTTPS inspection for DROPBOX
setting smart TLD as true to match all the dropbox websites
giving a unique name for the policy in added request type

Go to Access Profiles

for binding the created request type, go to access profiles in Restriction policies section
creating a policy which will bind the created requst type by adding that in request type and giving a name for the policy in added profiles and writing relevant comment
creating a policy which will bind the created requst type by adding that in request type and giving a name for the policy in added profiles and writing relevant comment
clicking on save policy to save the policy


    • Related Articles

    • Bypass HTTPS Inspection by using Request Types

      Business challenge The HTTPS inspection Bypass option enables you to define specific websites that are not subject to decryption as they flow through the proxy. Some websites may include personal identification information that should not be decrypt. ...
    • Setup Authentication

      Authentication in SafeSquid Proxy Authentication: Proxies can serve as access-control devices. HTTP defines a mechanism called proxy authentication that blocks requests for content until the user provides valid access-permission credentials to the ...
    • Kerberos SSO Authentication Setup

      The main aim/objective of this particular authentication is that the user doesn’t have to enter its credentials the software will automatically detect from which user group does the user belong and will set the restrictions accordingly. Overview ...
    • IP based authentication

      Overview Almost all the proxy applications restrict access based on the IP address. Most of the organizations network administrator would always prefer to block access to a specific address or range of addresses that he/she suspect belong to ...
    • Adding users using SafeSquid interface for authentication

      Adding users using SafeSquid interface for authentication If you don't have Active Directory (AD) server to integrate with SafeSquid LDAP, but you want authenticate users by assigning usernames and passwords to your users.