Access Control lists


19-07-2014 23-10-59

Bypass a computer from authentication method

This post explain how to disable authentication for certain proxy objects while enabled for others. For example, I want machineA to pass the proxy without authentication and machineB is still being authenticated. To perform this rule you need to know how to define your whitelisted internal computer. Your computer can […]