Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Identity Management, Authentication, and Access Control with Squid

Squid is a widely used caching proxy that contains a robust set of authentication and access controls. In this course, you'll learn the setup, configuration, and validation of Squid in an enterprise environment.

Intermediate
21m
(4)

Created by Zachary Bennett

Last Updated Jul 31, 2025

Course Thumbnail
  • Course

Identity Management, Authentication, and Access Control with Squid

Squid is a widely used caching proxy that contains a robust set of authentication and access controls. In this course, you'll learn the setup, configuration, and validation of Squid in an enterprise environment.

Intermediate
21m
(4)

Created by Zachary Bennett

Last Updated Jul 31, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

With the attack surface size of any given enterprise network, it is of the utmost importance that you take every step necessary when it comes to securing your web servers and proxies. One of the ways that you can protect your network is by managing user access and authentication properly. In this course, Identity Management, Authentication, and Access Control with Squid, you’ll cover how to utilize Squid to secure a live enterprise environment. First, you’ll demonstrate the ability to set up Squid as an HTTP proxy cache. Next, you’ll apply Squid configuration including access control list elements. Finally, you’ll simulate how to use access control lists and authentication mechanisms in order to use Squid securely. When you’re finished with this course, you’ll have the skills and knowledge needed to identify, protect, detect, or respond to threats in your network systems.

Identity Management, Authentication, and Access Control with Squid
Intermediate
21m
(4)
Table of contents

About the author
Zachary Bennett - Pluralsight course - Identity Management, Authentication, and Access Control with Squid
Zachary Bennett
46 courses 4.4 author rating 260 ratings

Zach is currently a Senior Software Engineer at VMware where he uses tools such as Python, Docker, Node, and Angular along with various Machine Learning and Data Science techniques/principles. Prior to his current role, Zach worked on submarine software and has a passion for GIS programming along with open-source software.

Get started with Pluralsight