Proxies
- Residential Proxies
- Static Residential Proxies
- Datacenter Proxies
- Mobile Proxies
- Authentication Methods
Integrations
- Operating System
- Browser
- Code
- Proxy Managers
Authentication Methods
Learn how to use GoProxy’s Proxies with authentication.
We support two authentication methods when using our proxy:
The static proxies’ username and password are automatically generated and assigned to you upon purchase.
To integrate our proxy into your workflow, you can use the Endpoint Generator to automatically generate code examples based on the selected protocol. Alternatively, you can simply copy your proxy username and password.
Upon signing up for your account, you will be assigned a main user with an automatically generated username and password. You can use your rotating proxies with the main user’s credentials or create a sub-user account to use proxies with a custom username and password.
Click the Create Sub-user button to set your new user’s username, password, and traffic limit, along with a remark if necessary.
Click the Edit button to edit your user’s password, traffic limit and remark.
To integrate our proxy into your workflow, you can use the Endpoint Generator to automatically generate code examples based on the selected protocol, location, and session settings. Alternatively, you can simply copy your proxy username and password.
Click the +Add IP button to add a new whitelisted IP, along with a remark if necessary.
Click the Edit button to edit the whitelisted IP’s remark.
With whitelist settings, you can automatically generate code examples in the Endpoint Generator based on the selected protocol, location, and session settings.