fileIP Whitelist Authentication

IP Whitelist Authentication allows clients with IP addresses listed in the whitelist to access the proxy service directly without needing a username or password.

How it works:

  • The system maintains a list of trusted IP addresses.

  • When a client connects, the system checks if the IP is on the whitelist.

  • If the IP is whitelisted, access is granted automatically.

  • If not, the client will be denied access or prompted for other authentication methods.

This method simplifies access for trusted clients while enhancing security.

You can refer to the IP Whitelist Management Guidearrow-up-right to manage your ip whitelist.

  • Select country

In the search box, enter a country name or code to quickly find the country you need.

  • Select protocol

The code example on the right will display content that aligns with the protocol.

  • Select Host Type

Choose how to connect to your proxy server: DNS hostname or IP address. Please note that this is the proxy server’s address, not the actual outbound IP that target websites will see. The outbound IP may vary depending on your session type and resource allocation. Although the proxy server’s address appears as a single IP, the service is powered by multiple backend servers through load balancing and auto-scaling, ensuring stable and reliable connections at all times.

The port will auto-fill based on your country selection.

  • Select Session Type

Rotating IP – Assigns a new IP for each request. Perfect for high-volume tasks, short-lived automation, or data collection without a persistent connection.

Sticky Session – Keeps the same IP for 1–180 minutes. Ideal for login sessions, multi-step forms, or continuous browsing. Actual duration may vary depending on resource availability.

Note: In the IP whitelist authentication method, the sticky session feature will only take effect after this configuration process. If you need to change the country or session duration, you must update the settings here again.

Then Click "Generate" to see the results.

In the Proxy List section, you can customize how many proxies to generate and select the output format that works best for your use case.

Proxy Output Formats:

Proxy lines may appear in different formats depending on the tool or integration method you use. Each format includes the same core information — username, password, hostname (or IP), and port — just arranged differently. Choose the one that matches your client’s or software’s required format.

Proxy list limit: 1000.

All set! Run the test command below to verify your setup and view detailed information about the proxy IP, including its location.

Copy the command below and run it in your command-line tool (such as CMD on Windows or Terminal on macOS/Linux).

You can now start using your proxy IP in any scenario that suits your needs.

If you have any questions or need assistance, feel free to contact us at support@kindproxy.com or reach out to us on Telegram at https://t.me/kindproxy_support1arrow-up-right. Our support team will get back to you promptly.

Last updated