In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains the "Linux server proxy authentication", the content of the article is simple and clear, easy to learn and understand, the following please follow the editor's ideas slowly in depth, together to study and learn "Linux server proxy authentication" bar!
Agent authentication
Proxy proxy service is widely used. For the sake of security, we can add a layer of security authentication mechanism on the server. Htpasswd is used here to set up authentication accounts and passwords
1. Create authentication account and password
[root@localhost wj] # htpasswd-c / etc/squid/passwd david
New password:
Re-type new password:
Adding password for user david
2. Modify the authentication file so that other users can read it.
[root@localhost wj] # chmod ostatr / etc/squid/passwd
3. View certification service documents
[root@localhost wj] # rpm-ql squid | grep ncsa_auth
/ usr/lib/squid/ncsa_auth / / remember this address, which will be used below
/ usr/share/man/man8/ncsa_auth.8.gz
4. Modify the configuration file squid.conf
[root@localhost wj] # gedit / etc/squid/squid.conf
Auth_param basic program / usr/lib/squid/ncsa_auth / etc/squid/passwd / / account location, password location
Auth_param basic children 5
The three sentences above the auth_param basic realm you must author / / welcome message must be placed at the beginning of the configuration file.
Acl squid_user proxy_auth REQUIRED / / acl syntax
Http_access allow squid_user / / only authenticated people are allowed to use
5. Test. After restarting the service, use the computer that uses this agent to surf the Internet, and the pop-up window will require authentication.
[root@localhost wj] # service squid restart
Stop squid:. [OK]
Starting squid:. [OK]
Thank you for your reading, the above is the content of "proxy authentication of Linux server". After the study of this article, I believe you have a deeper understanding of the proxy authentication of Linux server, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.