Configure Exemptions for Explicit Proxy Authentication
Focus
Focus

Configure Exemptions for Explicit Proxy Authentication

Table of Contents

Configure Exemptions for Explicit Proxy Authentication

Learn how you can exempt proxy traffic from authentication using a source, destination, or both.
Using a web proxy allows you to use the information from the proxy devices in your network through a unified interface. However, resources such as printers or other IoT devices can't respond to authentication requests from the proxy or support a certificate or PAC file.
You can exempt these devices from the authentication request from the proxy using an address object for the source, a custom URL category exception list as the destination, or both. Configuring an authentication exemption for the explicit proxy ensures that traffic from these key resources isn't interrupted and allows traffic from these trusted devices to pass through the proxy in compliance with your network architecture.
You can create up to 20 web proxy exemptions in your authentication policy.
If you do not need to authenticate your explicit proxy traffic, you can Exclude All Explicit Proxy Traffic From Authentication.
  1. If you have not already done so, Configure Explicit Proxy then define the type of proxy traffic that you want to exempt from authentication requests.
    You can exempt traffic based on the source, the destination domain, or both.
    • Configure an address object (ObjectsAddresses) that contains the source IP addresses of your trusted devices. The source IP can be an address or address group.
    • Configure a custom URL category exception list ( ObjectsCustom ObjectsURL Category) that contains the destination URL domain or domains of the web services you want to allow.
  2. Enable the Authentication Portal if you have not already done so.
    This step is required to enforce the policy rule.
  3. Edit or create your authentication policy rule (PoliciesAuthentication) and select Bypass Web Proxy Authentication.
    When you enable the Bypass Web Proxy Authentication option, the Authentication Enforcement option on the Action tab is set to None; you cannot change this setting while the Bypass Web Proxy Authentication option is enabled.
  4. Define the type of proxy traffic that you want to exempt from authentication in your authentication policy rule and Commit your changes.
    You can exempt a source, a destination, or both.
    • Select the Source tab then select the address object you configured in the first step as the Source Address and click OK.
    • Select the Destination tab then select the URL category you configured in the first step
      You must create the custom URL category exception list before you can select it as a destination. You can't create a new custom URL category exception list as a destination during this step.
  5. Commit your changes and verify your configuration.
    1. View your policy rules (Policies Authentication) and confirm that a checkmark displays in the Bypass Web Proxy Authentication column for the rules where you enabled the exemption.
    2. Depending on your authentication method, use the CLI commands to view the exemptions for proxy traffic.
      • If you're using the SAML authentication method, you can use the show counter global name ctd_eproxy_skip_auth_url_match command to verify the configuration. This command displays the number of SAML authentication exemptions for proxy traffic.
      • If you're using the Kerberos authentication service type, you can use the show counter global name flow_swg_ep_kerberos_skip_auth command to verify the configuration. This command displays the number of Kerberos authentication exemptions for proxy traffic.