FME Flow: 2024.2

Proxy

Select System Configuration > Network & Email.

  • Estimated Time Required: 15-20 minutes
  • Skill Level: Intermediate
  • Prerequisites:
    • Proxy server address is known.

A proxy server is a computer on your LAN that allows you to connect to external servers without compromising the security of your internal network. If you are consuming FME Flow Web Services and your organization uses a proxy server on your network, you can configure FME Flow to connect through the proxy.

What is not supported on a proxy in FME Flow?

  • Certain Database Connections, including connections to MongoDB databases, will fail. Safe Software has not fully tested proxy support for all database formats; you may need to test your database connections to determine support.
  • If Authentication Method Digest or NTLM is specified in the configuration settings below, these connections will fail:
  • Automations or Notification Service protocols (including triggers, external actions, publishers, and subscribers) that do not communicate through HTTP. These protocols include watching directories, email (SMTP and IMAP), FTP, JMS, SFTP, UDP, and WebSocket.
  • (Windows) Any applicable Exceptions configured in your Proxy server LAN Settings (under Internet Properties) or in a PAC file.
  • (Linux) Any applicable exceptions configured in network tools or the /etc/environment file.

Can I map URLs through a custom proxy?

Custom proxy maps must be configured manually. For more information, see To Configure Custom Proxy Maps (Manual) (below).

To Configure FME Flow with a Proxy Server

Click Proxy. Complete the following fields, and click Save.

Note  If Version Control is enabled, you must restart FME Flow to apply any changes to proxy settings.
  • Proxy Enabled: Click to enable a proxy connection.
  • Host: The proxy server hostname.
  • Port: The port through which communication with the proxy server takes place.
  • No Proxy For: (optional) A list of hostnames and IP addresses that will be accessed through a direct connection, bypassing the proxy. To avoid entering multiple hosts in the same domain, hosts can be prefixed and appended with the wildcard character *.
  • To delimit the list, use commas, semicolons, or press the tab or enter keys. Do not copy-paste a list of entries. To delineate properly in the display, each entry must be added separately.

    Example:

    Note  Specifying localhost does not include, by default, 127.0.0.1 or ::1. To bypass the proxy when the local host is referenced, you must explicitly specify any other expected forms for referencing local traffic.
  • Authentication Required: Click if authentication is required to access the proxy server.
    • Username: The account username for running the proxy server.
    • Password: The password for the proxy server account.
    • Authentication Method: The authentication method used by the proxy server, either Basic, Digest, or NTLM.

To Configure Custom Proxy Maps (Manual)

You can specify custom proxy maps instead of using the system proxy. A custom proxy map allows you to map access to specific URLs through an alternative proxy on your system. Use a custom proxy map if you need to bypass your network's default rules or system proxy settings in order to access these URLs.

When configuring custom proxy maps, keep in mind the following: