首页 价格 教程中心 图形识别new

免费送1G流量

CN
Common authentication methods of private agent

Private agents can only be used by one person at a time. Crawler is the most common application scenario for private agents. It can remain anonymous and avoid being tracked by websites. In the process of data mining, private agents prevent IP addresses from being prohibited, making the task easier.

私有代理常见认证方式.png

Before purchasing a private agent, you should find a private agent provider that provides an authentication system as part of its private agent service. There are two common ways of private proxy authentication:


1. User name and password authentication


This method is very common and is often used by Internet users. This is also easy because you only need to provide your login details, that is, your user name and password.


2. White list IP authentication


When you purchase an agent from a private agent provider, you are assigned an IP address. This IP can be used for authentication. This is a simple way to grant you authorized access to the agent. Compared with the user name and password method, it has its own advantages and disadvantages. You must whitelist your IP address with your private proxy provider, which means you can only access the proxy from the whitelist IP.