• Setting up proxy services
  • Implementing user authentication