Proxy servers route Internet traffic for various reasons. You might use a proxy server to hide your Internet Protocol address while browsing, as the IP address of a proxy server will substitute for your own. Other times, however, local area networks use proxy servers to control traffic in and out of a network. In these cases, authentication is typically required. This authentication can come by way of simple passwords or more comprehensive authentication suites such as NT LAN Manager or Kerberos. Writer Bio

Proxy Authentication Types - 69