Re: Squid user authentication resources..

From: Henrik Nordstrom <hno@dont-contact.us>
Date: Mon, 05 Apr 1999 05:16:03 +0200

Matthew King wrote:

> It all sounds rather daunting :) Is there anyway for authentication to
> be done without any input from the user? Because i want
> computers, not people authenticated.. It is just so i can track
> usage..

Well, if you want computers authenticated then you should already have
this. Squid by default logs the IP address of every request, and that is
as close you can get as to a authenticated computer. It alone tells very
little about who is acutally using that station at that time thought,
but you should be able to find this information in the computer systems
logon logs if needed.

--
Henrik Nordstrom
Spare time Squid hacker
Received on Sun Apr 04 1999 - 21:44:41 MDT

This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:45:42 MST