Solved

Setting up Idhttp indy component to use a proxy server

Posted on 2013-02-06
2
1,600 Views
Last Modified: 2013-02-07
I recently added the ability for our program to connect to the bing tile server and use the bing map as an overlay for our map. My work was primarily on writing the section of code that constructs the URL and uses the INDY Idhttp component to communicate with web (it basically acts as a browser so we can display the tiles on a form rather than a webpage). Recently several clients have stated that they are unable to to access the tile server. We quickly realized it was environment specific. Two clients resolved this by adding exceptions to there Firewall settings. The remaining client uses a Proxy server, which we never planned for. Is anyone familiar with setting up the Idhttp component to use a proxy server? What are the parameters and or settings that must be used? Any help pointing me in the right direction would be greatly appreciated. I am fairly new to the concept of Proxy servers. Thanks in advance.
0
Comment
Question by:HopeRidesAlone
2 Comments
 
LVL 26

Accepted Solution

by:
Sinisa Vuk earned 500 total points
ID: 38862944
Setting proxy in indy is easy, just requires some lines of code. Follow this links for more help.
http://www.indyproject.org/KB/howdoiuseaproxywithindy.htm
https://forums.embarcadero.com/thread.jspa?threadID=76749

...this links is helpful for detecting user proxy settings:
http://stackoverflow.com/questions/8961257/detecting-ie-proxy-settings-and-using-with-tidhttp
http://stackoverflow.com/questions/2013802/how-can-a-delphi-application-detect-the-network-proxy-settings-of-a-windows-pc

...basically, you should use event SelectProxyAuthorization where you can set Proxy class
(for different type of proxy authorization) and event OnProxyAuthorization where you must set proxy settings (detected from IE or from some file) .

...If you encounter some "strange" errors or problems with Indy - think  about very good
Internet Component Suite
0
 

Author Closing Comment

by:HopeRidesAlone
ID: 38865016
Good reference material, thanks for sending me in the right direction.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
bigDiff challenge 17 84
countHi challenge 25 98
wordappend challenge 8 145
Support for Notepad++ (including downloading & installing a plugin) 5 64
There is an easy way, in .NET, to centralize the treatment of all unexpected errors. First of all, instead of launching the application directly in a Form, you need first to write a Sub called Main, in a module. Then, set the Startup Object to th…
Whether you’re a college noob or a soon-to-be pro, these tips are sure to help you in your journey to becoming a programming ninja and stand out from the crowd.
The viewer will learn how to implement Singleton Design Pattern in Java.
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now