It is convenient to allow access to a private network, such as a corporate
intranet, or outward facing extranet application, from an external
network, such as the Internet. Unfortunately, if an internal
authentication system is used to control access from the external
network, it may be attacked, such as by a malicious party intentionally
attempting multiple invalid authentications to ultimately result in an
attacked account being locked out. To circumvent this, an authentication
front-end, proxy, wrapper, etc. may be employed which checks for lockout
conditions prior to attempting to authenticate security credentials with
the internal authentication system.