Before you can use a proxy, you need to prove that you are authorized to access it. This is called authentication. Different providers offer different methods, and choosing the right one depends on your setup and workflow. This guide explains each method and when to use it.

Username and Password Authentication

This is the most common method. Your provider gives you a username and password that you include with every proxy connection. The proxy server verifies your credentials before forwarding your request.

The proxy format typically looks like this: ip:port:username:password

Advantages: Works from any device or IP address. You can share credentials across multiple servers, laptops, and team members. Easy to rotate between different proxy endpoints.

Disadvantages: Credentials are included in every request, which means they could potentially be exposed if your traffic is intercepted on an unencrypted connection. Always use HTTPS or SOCKS5 to protect your credentials in transit.

Best for: Cloud servers, shared environments, teams, and any situation where you connect from multiple or changing IP addresses.

IP Whitelist Authentication

With IP whitelisting, you register your device's public IP address with your proxy provider. Any connection from that IP is automatically authenticated without credentials. Connections from non-whitelisted IPs are rejected.

Advantages: No credentials to manage or protect. Simpler configuration since you only need the proxy IP and port. Slightly faster connections since there is no credential verification step.

Disadvantages: Only works from your whitelisted IP. If your home or office IP changes (common with most ISPs), you need to update the whitelist. Not practical for mobile devices or situations where your IP is dynamic.

Best for: Dedicated servers with static IPs, office setups with fixed internet connections, and personal use from a home with a stable IP address.

Which Should You Choose?

For most users, username and password authentication is the better choice. It is more flexible, works from anywhere, and does not break when your IP changes. IP whitelisting is convenient when you have a stable connection and want the simplest possible setup.

Carbon Proxies ISP plans use username and password authentication by default, with each subscription receiving dedicated credentials. This ensures your proxies work from any device or server without additional configuration.

Simple Authentication, Powerful Proxies

All Carbon Proxies plans include username/password authentication that works from any device, anywhere.

Get Started