Authentication Services

You can control access to Excelerator proxy services by creating authentication profiles and assigning one or two of them to each service.

The following sections will help you to match Excelerator's authentication features to your security infrastructure and requirements, and to create authentication profiles for your proxy services.