Solved

Authenticating throught ip address

Posted on 2008-09-30
3
179 Views
Last Modified: 2012-05-05
We need to access a site from a block of ip's heres an example.

User goes to our site, when they go to our site they have their home ip address they login and then click on a link that link needs to generate a request that looks like it's comming from our server. our server send a request to the destination site with our server ip and then passes the user on. We can't setup a proxy so looking for other solutions.
0
Comment
Question by:ucfperson
  • 2
3 Comments
 
LVL 40

Expert Comment

by:Richard Quadling
ID: 22608858
Hello ucfperson,

You are talking about a proxy. What stops them from directly accessing the remote site?

Regards,

RQuadling
0
 

Author Comment

by:ucfperson
ID: 22609192
We want to do it without a proxy.  The ip address cannot be that of the clint but that of the server.
0
 
LVL 40

Accepted Solution

by:
Richard Quadling earned 500 total points
ID: 22609270
That's what a proxy does. Hiding the client IP from the distant server.

You can do it with a NAT capable firewall also.

Are you intending to develop a server for this?
0

Featured Post

ScreenConnect 6.0 Free Trial

Explore all the enhancements in one game-changing release, ScreenConnect 6.0, based on partner feedback. New features include a redesigned UI, app configurations and chat acknowledgement to improve customer engagement!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cannot connect to SQL Server Express using TCP/IP 11 85
Subnet , TC/ip 4 79
SBS2011 server reports duplicate IP 5 75
Setup static routes for IP address in CentOS 2 66
Article by: rfc1180
The Maximum Segment size (MSS) is an important consideration when troubleshooting connectivity via the Internet/Intranet. As the packets are routed via the Internet/Intranet, the packets must traverse through multiple routers in the path between two…
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question