Just a question about SSL authentication for the proxy server. How
does it get a list of authorized users? How does it know what an
restricted site is? From the Access Control lists? Does it read it from top to
bottom like everything else? If it finds a restricted site in the ACL
does it then start back at the beginning to look for authorized users?
I've been trying to find out how it reads this list, but haven't been
able to find anything. Can somone point me to a TID or something that
explains all this?
Thank you very much.

David Browne