fileUsername/Password Authentication

Username/Password Authentication requires clients to provide a valid username and password to access the proxy service.

How it works:

  • Clients must enter their credentials (username and password) when connecting.

  • The system verifies the credentials and grants access if they are correct.

  • This method is typically used when IP-based authentication (whitelisting) is not an option or when more secure access control is required.

This method adds an extra layer of security by ensuring only authorized users can access the proxy.

  • Select country

In the search box, enter a country name or code to quickly find the country you need.

  • Select protocol

The code example on the right will display content that aligns with the protocol.

  • Select Host Type

Choose how to connect to your proxy server: DNS hostname or IP address. Please note that this is the proxy server’s address, not the actual outbound IP that target websites will see. The outbound IP may vary depending on your session type and resource allocation. Although the proxy server’s address appears as a single IP, the service is powered by multiple backend servers through load balancing and auto-scaling, ensuring stable and reliable connections at all times.

  • Select Session Type

Rotating IP – Assigns a new IP for each request. Perfect for high-volume tasks, short-lived automation, or data collection without a persistent connection.

Sticky Session – Keeps the same IP for 1–180 minutes. Ideal for login sessions, multi-step forms, or continuous browsing. Actual duration may vary depending on resource availability.

  • Select Sub Account

You can select a sub-account from the dropdown menu. If you don’t have one yet, create it first. You can refer to the Sub Account Management Guidearrow-up-right to manage your sub-accounts. Once selected, the username and password fields below will be filled in automatically.

All set! Run the test command below to verify your setup and view detailed information about the proxy IP, including its location.

Copy the command below and run it in your command-line tool (such as CMD on Windows or Terminal on macOS/Linux).

You can now start using your proxy IP in any scenario that suits your needs.

If you have any questions or need assistance, feel free to contact us at support@kindproxy.com or reach out to us on Telegram at https://t.me/kindproxy_support1arrow-up-right. Our support team will get back to you promptly.

Last updated