© Michael Schwartz, Maciej Machulak 2018
Michael Schwartz and Maciej MachulakSecuring the Perimeterhttps://doi.org/10.1007/978-1-4842-2601-8_6

6. Proxy

Michael Schwartz1  and Maciej Machulak2
(1)
Austin, TX, USA
(2)
London, UK
 
A proxy is a web server middle-man. It receives an HTTP request from a client, forwards it to another web server, and after receiving a response, returns it to the client (see Figure 6-1). Proxies should be “transparent,” meaning they don’t impact either the client or the backend web service.
../images/425975_1_En_6_Chapter/425975_1_En_6_Fig1_HTML.jpg
Figure 6-1

Proxy overview

In some cases, the proxy uses a path to map the upstream web service. For example, consider the URL https://www.example.com/myService ...

Get Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.