Solved

Authenticating throught ip address

Posted on 2008-09-30
3
189 Views
Last Modified: 2012-05-05
We need to access a site from a block of ip's heres an example.

User goes to our site, when they go to our site they have their home ip address they login and then click on a link that link needs to generate a request that looks like it's comming from our server. our server send a request to the destination site with our server ip and then passes the user on. We can't setup a proxy so looking for other solutions.
0
Comment
Question by:ucfperson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 40

Expert Comment

by:Richard Quadling
ID: 22608858
Hello ucfperson,

You are talking about a proxy. What stops them from directly accessing the remote site?

Regards,

RQuadling
0
 

Author Comment

by:ucfperson
ID: 22609192
We want to do it without a proxy.  The ip address cannot be that of the clint but that of the server.
0
 
LVL 40

Accepted Solution

by:
Richard Quadling earned 500 total points
ID: 22609270
That's what a proxy does. Hiding the client IP from the distant server.

You can do it with a NAT capable firewall also.

Are you intending to develop a server for this?
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: rfc1180
The Maximum Segment size (MSS) is an important consideration when troubleshooting connectivity via the Internet/Intranet. As the packets are routed via the Internet/Intranet, the packets must traverse through multiple routers in the path between two…
Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question