A proxy authentication is when you are authorized to login (authenticate) in a software on behalf of an other.
This is known as:
Impersonation is a feature which permit to establish a session on behalf of a user without employing the user's credentials (password, …)
In Kubernetes, 1), they used the following HTTP request headers to perfor an impersonation request:
If the user has the right to impersonate the Impersonate-User or the Impersonate-Group, it will be authenticated with them.
Example: impersonating a user with groups and extra fields
Impersonate-User: [email protected]
Impersonate-Group: developers
Impersonate-Group: admins
Impersonate-Extra-dn: cn=jane,ou=engineers,dc=example,dc=com
Impersonate-Extra-acme.com%2Fproject: some-project
Impersonate-Extra-scopes: view
Impersonate-Extra-scopes: development
Impersonate-Uid: 06f6ce97-e2c5-4ab8-7ba5-7654dd08d52b