Adding authentication exclusions
December 13, 2023
You can add users' computers or web resources to authentication exclusions. If a request is sent from a computer that is on the list of exclusions, or if a web resource from the list of exclusions is requested, the user will not have to complete authentication to connect to the proxy server.
Exclusions are applied to Kerberos authentication and NTLM authentication.
To add authentication exclusions:
- In the application web interface, select the Settings → Built-in proxy server →Authentication section.
- If you want to allow specific computers to access all web resources without authentication on the proxy server, enter their IP addresses in the Source settings group.
- If you want to allow all computers to connect to the defined web resources without authentication on the proxy server, in the Destination settings group specify one of the following settings:
- Click Save.
The authentication exclusions will be added.