A security consultant and security advisor, Ive encountered many preconceived notions, outdated approaches, and what I simply call security myths In this series of posts, well like to cover some of the most common myths I find in the discipline of authentication and authorization. The use of a reverse proxy is not as crazy as you may think, its a security myth-buster. Reverse proxies fetch web applications from behind the firewall and present them securely to users being left safely outside our perimeter.”]
Source: https://www.csoonline.com/article/3227924/busting-myths-behind-authentication-and-authorization.html

