Authentication methods

Requests to the BackConnect Gateway can be authenticated using username and password authentication or through an authenticated IP.

Username and password

In its most simple form, a request with username/password authentication looks like this:

curl -x http://account-accountName-pipeline-pipelineName:[email protected]:7000 https://ipinfo.io

Replace accountName, pipelineName, and pipelinePassword with your account details before performing a request.

Authenticated IPs

Instead of sending username and password credentials with every request, trusted IPs can be authenticated by adding them to your account's allow list, and any request coming from those authenticated IPs does not need to include a username or password.

It's important to be cautious with which IPs you authenticate. If a shared IP (such as an AWS shared IP) is added, it's possible your account will be used by other parties through the shared IP.

Authenticated IPs overview

Your account has a single, centralized list of authenticated IP addresses. When sending a request from an authenticated IP, since there is no longer a username portion through which additional parameters (such as geotargeting or session control) can be controlled, all parameters are defined in and inherited from the request's target pipeline, which is set using a custom port. For example:

curl -x http://ip.nimbleway.com:9400 https://ipinfo.io

In the above example, the request is written without a username or password, but targets port 9400 instead of 7000. Assuming the request is sent from an authenticated IP, port 9400 would be used to identify which pipeline the request should run through, and the request would inherit geotargeting and session control parameters from the target pipeline's configuration.

Each pipeline can allow or disallow authenticated IPs to connect to it. You can create a new pipeline, or modify an existing pipeline, in order to enable authenticated IP connection, define the port range that is used to target that particular pipeline, and manage your authenticated IPs.

Managing Pipelines

Pipelines can be managed in one of two ways: