Mark Elsen wrote:
When using ntlm_auth, your are still *enforcing* authentication, though in that case, it's transparant for the end user (indeed). And usernames will be logged (indeed too).
Is there a way to: a) check authentication b) if authentication succeeds, access proxy with those credentials c) if it doesn't succeed, fall back to allow anyway I understand what your saying, but not if I can do what I am after :) Thanks for your quick responses btw. -- Jamie Heckford Network Manager Trident Microsystems Ltd. t: +44(0)1737-780790 f: +44(0)1737-771908 w: http://www.trident-uk.co.uk/