O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
Information in this chapter:
▪ Build It and They Will Come
Products, Tools, and Methods:
▪ TMG
▪ AD
▪ Hyper-V
▪ Alternate Network in TMG
▪ Web Proxy
▪ Server Publishing
▪ Custom Protocol
This chapter entails building a proxy segment to publish externally for users, and how to secure that segment and provide authentication.
Keywords: TMG External Proxy Authentication

Introduction

One of the great things about being in this business is that you get to meet people from around the world, either in person or virtually. I am quite fortunate to have some really cool friends around the globe. A couple of them, Steve and Greg, who are part of a little group we call The Boyz, live in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required