At 12:00 26/03/2003, Kristian Du wrote:
>Hi Everyone,
>
>I have looked through the FAQs but could not find an answer to my
>doubts.
>
>I was wondering whether the following scenario can be implemented or
>not:
>
>- A user logs on a Win 2K box authenticated via an LDAP server
>- Opens up a browser that has NOT been configured to use a
> proxy server for web access (transparent proxying comes into
> play behind the scenes)
>- When the user accesses an external site (i.e. outside the
> local intranet) he does NOT have to enter a username and a
> password for authenticating with the proxy server
>- The proxy administrator can generate reports and view
> surfing habits on a per user basis
And which particular branch of the secret police are you commissioning this
system for?
>What I am mainly doubtful about is whether the user identity can flow
>transparently from NT user logon to the proxy authentication stage.
>
>Any help will be much appreciated.
>
>--
>Kristian
Received on Wed Mar 26 2003 - 04:19:58 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:14:20 MST