Adding authentication exclusions

3 July 2024

ID 183704

You can add users' computers or web resources to authentication exclusions. If a request is sent from a computer that is on the list of exclusions, or if a web resource from the list of exclusions is requested, the user will not have to complete authentication to connect to the proxy server.

Exclusions are applied to Kerberos authentication and NTLM authentication.

To add authentication exclusions:

  1. In the application web interface, select the SettingsBuilt-in proxy serverAuthentication section.
  2. If you want to allow specific computers to access all web resources without authentication on the proxy server, enter their IP addresses in the Source settings group.
  3. If you want to allow all computers to connect to the defined web resources without authentication on the proxy server, in the Destination settings group specify one of the following settings:
    • IP address.
    • Host name.
  4. Click Save.

The authentication exclusions will be added.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.