Just a question about SSL authentication for the proxy server. How
does it get a list of authorized users? How does it know what an
restricted site is? From the Access Control lists? Does it read it from top to
bottom like everything else? If it finds a restricted site in the ACL
does it then start back at the beginning to look for authorized users?
I've been trying to find out how it reads this list, but haven't been
able to find anything. Can somone point me to a TID or something that
explains all this?
Thank you very much.

David Browne

By the way, there was a response to the original post (about a week
ago), but it was an ad for an app called Webspy. Not sure if this is spam
or an accident. Anyway, just thought the sysops would like to know.

David Browne