Matthew King wrote:
> It all sounds rather daunting :) Is there anyway for authentication to
> be done without any input from the user? Because i want
> computers, not people authenticated.. It is just so i can track
> usage..
Well, if you want computers authenticated then you should already have
this. Squid by default logs the IP address of every request, and that is
as close you can get as to a authenticated computer. It alone tells very
little about who is acutally using that station at that time thought,
but you should be able to find this information in the computer systems
logon logs if needed.
-- Henrik Nordstrom Spare time Squid hackerReceived on Sun Apr 04 1999 - 21:44:41 MDT
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:45:42 MST