Learn how you can exempt proxy traffic from authentication using a source,
destination, or both.
Using a
web proxy allows you to use the
information from the proxy devices in your network through a unified interface.
However, resources such as printers or other IoT devices can't respond to
authentication requests from the proxy or support a certificate or PAC file.
You can exempt these devices from the authentication request from the proxy
using an
address object for the source, a
custom URL category exception list as the
destination, or both. Configuring an authentication exemption for the explicit proxy
ensures that traffic from these key resources isn't interrupted and allows traffic
from these trusted devices to pass through the proxy in compliance with your network
architecture.
You can create up to 20 web proxy
exemptions in your authentication policy.
If you do not need to
authenticate your explicit proxy traffic, you can Exclude All Explicit Proxy Traffic From Authentication.