Conclusions and Limitations
The last step we need to do is to direct browsers to use our plain proxy. This can be done as described in the following article.
Plain conventional proxy although very helpful in local network scenarios pose serious challenges and limitations in the cloud deployments. The following list illustrates some of those.
- Although the proxy is deployed in the cloud, connections from a browser to cloud proxy is done in clear text. It means that it is potentially possible for an attacker to intercept the proxy credentians and HTTP traffic. HTTPS traffic remains more or less protected from such attacks.
To mitigate these limitations and deploy a truly secure cloud proxy for the roaming clients we would need to use the secure proxy deployment as shown in the following tutorial.