Improve company productivity with a Business Account.Sign Up

x
?
Solved

Where to supply authentication details to the Network Proxy (Central Proxy) on Fedora?

Posted on 2012-03-28
3
Medium Priority
?
479 Views
Last Modified: 2012-04-02
Im running Fedora 16 on my system at the office. We use LAN to connect to the Internet. And for this, we use an http proxy with authentication (username & password). I tried putting the proxyaddress:port in the Network Proxy settings after going to the Network Settings window. However, it never asked for an authentication and the programs that use the internet are unable connect, except for Firefox because it asks for authentication.

Can someone help me out with this problem?

Thank you.
0
Comment
Question by:tanopatrice
  • 2
3 Comments
 
LVL 11

Assisted Solution

by:legolasthehansy
legolasthehansy earned 1002 total points
ID: 37778133
Do this,
In /etc/profile.d create a file like a_proxy.sh with the followling,

export http_proxy=http://host.com:port/
export ftp_proxy=http://host.com:port/
export no_proxy=.domain.com
export HTTP_PROXY=http://host.com:port/
export FTP_PROXY=http://host.com:port/

save and exit
chmod +x /etc/profile.d/a_proxy.sh

Logout and login (or create a new terminal)
echo $http_proxy (see if the output matches the first line of a_proxy.sh)

Now check if your system takes the proxy settings.
0
 
LVL 10

Assisted Solution

by:pclinuxguru
pclinuxguru earned 498 total points
ID: 37778167
Close but no cigar:
You missed "authentication" in the op

export http_proxy=http://username:password@host.com:port/

In the network thingy type
 http://username:password@proxyserver

put whatever port they use in the port section.
0
 
LVL 11

Accepted Solution

by:
legolasthehansy earned 1002 total points
ID: 37778184
For entering the auth details, try

export http_proxy=http://user:pasword@host.com:port/
etc..
0

Featured Post

What Kind of Coding Program is Right for You?

There are many ways to learn to code these days. From coding bootcamps like Flatiron School to online courses to totally free beginner resources. The best way to learn to code depends on many factors, but the most important one is you. See what course is best for you.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
This article is about building a site to site VPN tunnels in Cisco CSR1000V router with IOS XE. There are two Policy Based IPsec VPN tunnels configured on CSR1000V router one with NAT and another without NAT.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question