Solved

Authenticating throught ip address

Posted on 2008-09-30
3
174 Views
Last Modified: 2012-05-05
We need to access a site from a block of ip's heres an example.

User goes to our site, when they go to our site they have their home ip address they login and then click on a link that link needs to generate a request that looks like it's comming from our server. our server send a request to the destination site with our server ip and then passes the user on. We can't setup a proxy so looking for other solutions.
0
Comment
Question by:ucfperson
  • 2
3 Comments
 
LVL 40

Expert Comment

by:RQuadling
ID: 22608858
Hello ucfperson,

You are talking about a proxy. What stops them from directly accessing the remote site?

Regards,

RQuadling
0
 

Author Comment

by:ucfperson
ID: 22609192
We want to do it without a proxy.  The ip address cannot be that of the clint but that of the server.
0
 
LVL 40

Accepted Solution

by:
RQuadling earned 500 total points
ID: 22609270
That's what a proxy does. Hiding the client IP from the distant server.

You can do it with a NAT capable firewall also.

Are you intending to develop a server for this?
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Subnet question 5 43
how to use a block of public IP addresses 7 94
Unable to access 52 120
Testing DSL speed/internal netwrk speed, etc. 3 86
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now