Skip to main content

Authentication

SafeSquid identifies users through multiple authentication methods to enable identity-based access control and audit trails. Methods can be used individually or in combination to suit enterprise requirements.

Multi-factor authentication

SafeSquid itself does not provide MFA prompts. To enforce MFA, integrate with directory services (Active Directory with MFA-enabled accounts) or use PAM with MFA modules (e.g., Google Authenticator PAM). SafeSquid enforces the authentication decision but delegates credential validation to the backend system.

Choose your authentication method

MethodUse WhenUser ExperienceInfrastructure Required
BASIC AuthenticationNo directory service availableBrowser login promptNone
Network SignatureIP-based policy needed (devices, legacy apps)Transparent (no login)Static IP addressing or DHCP reservations
Directory ServicesCentralized identity requiredBrowser prompt or SSOActive Directory or OpenLDAP
PAM AuthenticationOS credentials should apply to proxyBrowser login promptPAM-capable OS
Bypass AuthenticationSome apps cannot authenticateTransparent for bypassed appsNone

Authentication methods

BASIC Authentication

BASIC authentication (RFC 7617) with credentials stored locally in SafeSquid. Browser-prompt authentication with no directory infrastructure required; credentials managed locally. Use when you need identity-based policies without Active Directory or LDAP.

Network Signature

Maps source IPs or subnets to user-groups for group-based access restriction and reporting. No user login required; policy applies by IP. Use when user identity is unavailable (device-only, legacy apps) but you need group-based rules.

Directory Services

Integrates with Active Directory or OpenLDAP to leverage existing user accounts and group memberships. Supports simple authentication (browser prompt with directory credentials) and SSO (Kerberos with AD for transparent authentication). Use when you need centralized identity management and don't want to duplicate user accounts in SafeSquid.

PAM Authentication

Validates proxy users via the system PAM stack so OS and proxy share credentials. Use when you want a single credential set for both OS login and proxy access in PAM-based environments (Linux, Unix).

Bypass Authentication

Allows specific destinations or request types to skip authentication while other traffic remains authenticated. Use for automatic updates or apps that cannot send proxy credentials.

Combining authentication methods

SafeSquid evaluates authentication rules in the order they appear in the policy. The first matching rule applies (no fall-through). Common combinations:

  • Directory + Bypass: AD/LDAP for users, bypass for OS updates and app sync
  • Network Signature + Directory: IP-based groups for IoT/devices, AD for user workstations
  • PAM + Bypass: OS credentials for interactive users, bypass for service accounts
tip

Apply authentication rules from most specific to most general. Place narrow bypass rules before broader authentication requirements.

Verification

After configuring authentication:

  1. Test login flow: Browse through the proxy from a client; confirm authentication prompt appears (or SSO succeeds)
  2. Check identity logs: Verify /var/log/safesquid/identity.log shows authenticated usernames for proxied requests
  3. Test bypass (if configured): Confirm bypassed destinations work without prompts

Next steps

  1. Choose an authentication method above and configure it
  2. Combine with Access Restriction for identity-based policies
  3. Enable SSL Inspection to decrypt HTTPS traffic — without it, SafeSquid can only authenticate based on CONNECT requests, not actual HTTPS content