Integrations
/
Proxy
Integrations
/
Proxy
Integrations
/
Proxy

Integrations

Proxy

Written by

Miriam Horst

Published

Feb 4, 2026

Integrations

Proxy

Written by

Miriam Horst

Published

Feb 4, 2026

Integrations

Proxy

Written by

Miriam Horst

Published

Feb 4, 2026

The 1Protection.AI Proxy Integration provides AI-native DLP for all web traffic by acting as a multi-tenant MITM inspection layer within the 1Protection.AI platform. It prevents the exposure of confidential information by intelligently monitoring HTTP/HTTPS requests and responses. It is fully managed and already deployed, requiring only simple client-side configuration. All requests and responses can be analyzed, blocked or redacted in real time, ensuring consistent protection without the need for app-specific integrations.


Flexible Interception Modes

By default, all web traffic is monitored to detect sensitive data, including file uploads, images and PDFs, according to the configured policies. However, the integration's Settings page allows you to specify additional details for the monitored domains. For example, you can provide a comma-separated list of hosts to bypass, or enable Allowlist Mode to focus only on selected hosts. This gives organizations full control over monitoring.


How to configure

The proxy is already running in the 1Protection.AI environment. Users configure their local client, browser, operating system, or application to send traffic through the proxy.

Client Setup

  • Step 1: Install and Trust the CA certificate
    For HTTPS inspection, the proxy uses a CA certificate. You can find the certificate and details on how to add it depending on your operating system in the Proxy Integration Setup Guide. 

  • Step 2: Configure the proxy via PAC
    Set the proxy auto-config (PAC) URL to ensure the connection to the proxy itself is protected by TLS. A detailed description of how to set the PAC URL can be found in the Proxy integration setup guide.


Get Support

Need help with setup or policy configuration? Our team is ready to assist to ensure smooth deployment and continuous protection of your Asana workspaces. Contact us for personalized guidance.