The technologies used in the program allow for the decryption (decryption) of HTTPS traffic over TLS and SSL protocols. These functions are implemented by a separate module – the HTTP/HTTPS proxy server – IAdmin Proxy.

IAdmin Proxy is a classic proxy server, and client browsers must be reconfigured to work with it.

Using the HTTPS protocol, the proxy server acts as a layer between the client and the server. It automatically generates certificates for websites and establishes an encrypted connection with the client. Thus, data received through IAdmin Proxy becomes public (decrypted). Next, an encrypted connection is established to the web server, and data is exchanged with it on behalf of the client.

To sign SSL/TLS certificates for each site, it uses its own Root Certification Authority certificate, which you can create yourself. Add this certificate to users’ computers in the Trusted section Using root certification authorities will completely avoid warnings in internet browsers about invalid certificates. At the same time, IAdmin Proxy will not establish connections to websites that have an invalid certificate.

Using IAdmin Proxy, you can see and restrict individual user requests to any encrypted site: you can restrict access to specific VKontakte groups, see what users are searching for on Google, and so on.

IAdmin Proxy uses the latest Microsoft server technologies, so a single server can handle a huge number of requests and serve hundreds of clients. Overall performance will be determined by the number of processors. and the amount of RAM on the server. IAdmin Proxy does not use disk caching or disk operations at all—all data is processed only in RAM, which undoubtedly eliminates traffic slowdowns.