Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have replaced my companies WinNT File and internet server with RH 7.3 using samba and squid. Thanks to the guys who made them
Now my problem:
How can i authenticate users in windows (clients) of my samba domain against squid so that they dont have to give username and password every time or anytime they make a connection. just like we use to have in microsoft proxy server.
Distribution: Fedora, Debian, OpenSuSE and Android
Posts: 1,820
Rep:
If you have no need for authentication in squid, turn it off. Any machine with the proxy settings set correctly in my network can access my squid server. The way we control access is simple. We just don't set up the proxy settings on the clients that don't get internet. Look in your squid.conf file. Post it if necessary..
but i want authentication so persons who dont have access should not get the connection. and ur method of access control will not work in my case because all the guys are real mean they will know it within an hour.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.