Summary

We have learned the various authentication schemes supported by Squid. We also learned about the various authentication helpers available for different authentication schemes.

Specifically, we have covered:

  • A lot of different ways to authenticate using the HTTP Basic authentication
  • HTTP Digest authentication and helpers supporting Digest authentication
  • Microsoft NTLM authentication
  • Negotiate authentication
  • Writing our own custom authentication helper, using which we can authenticate against various types of user databases.

Now, we know several ways to protect our Squid proxy server from unauthorized access. In the next chapter, we'll learn about building a hierarchy of Squid proxy servers to distribute load and optimize performance.

Get Squid Proxy Server 3.1 Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.