The Difference Between Kerberos and NTLM for Proxy Authentication