<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

We're blowing the whistle on Legacy PAM 🏀 Join us for an Access Madness Webinar on March 28

Search
Close icon
Search bar icon
Liz Zalman, Co-founder strongDM
Liz Zalman
Co-founder
logo

Many businesses use proxy servers to route and secure traffic between networks. There’s often confusion, however, on how this differs from a reverse proxy. In this article, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.

In this article, Liz covers:

  • What is a proxy server?
  • What is a reverse proxy?
  • Reverse proxy configuration
  • Use case: onboarding and off-boarding
  • Setting up a reverse proxy for access management
  • Building a reverse proxy by hand vs. buying software
  • Managing access with strongDM

Get the PDF Article