Techniques are provided for proxy authentication. A proxy includes a first
port, a second port, and a secure port; each port processing a different
service. Requests received on the first and second ports which require
authentication are redirected to the secure port. The secure port
processes an authentication router service. The authentication router
service forwards requests for authentication to selective authentication
services. The authentication services authenticate the requests over the
secure port.