Authentication Method - Ident


Unlike the other authentication choices, the ident authentication method can be used to control user access without the user explicitly providing a user name and password. This allows the ident method to be used in transparent proxy mode.

Select identd and click 'Save' to configure the Common Identd Settings options.

Common identd settings

Require identd authentication

Activates the ident authentication process for requests received by the Web Proxy.

Ident timeout (in seconds)

Specifies the time for the ident authenticator to wait for a verification response from the user's machine.

Ident aware hosts (one per line)

Define the host and subnet addresses of the systems that may use the Web Proxy. Each host must run the RFC1413 Identification Protocol service so that the Web Proxy can ask for a user name for each request.

Require authentication for unrestricted source addresses

If enabled, the Web Proxy will apply the ident authentication check to hosts that have no other network access controls configured for them.

Domains without authentication (one per line)

Authentication is not used for the domains in this list and all hosts and all users can access these sites.

User based access restrictions


Use this option to list users who are allowed or denied external access through the Web Proxy. Either a whitelist or a blacklist may be used to manage the account names.

Use positive access control:

Authorized users (one per line)
Specify the user account names allowed access to external networks through the proxy service.

Use negative access control:

Unauthorized users (one per line)
Specify the user account names denied access to external networks through the proxy service.