Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
Information in this chapter:
▪ Build It and They Will Come
Products, Tools, and Methods:
▪ TMG
▪ AD
▪ Hyper-V
▪ Alternate Network in TMG
▪ Web Proxy
▪ Server Publishing
▪ Custom Protocol
This chapter entails building a proxy segment to publish externally for users, and how to secure that segment and provide authentication.
Keywords: TMG External Proxy Authentication

Introduction

One of the great things about being in this business is that you get to meet people from around the world, either in person or virtually. I am quite fortunate to have some really cool friends around the globe. A couple of them, Steve and Greg, who are part of a little group we call The Boyz, live in ...

Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.