I have a proxy that can be consumed by external systems as well as
internal proxies utilizing proxy chaining (LocalTargetConnection).I want
to identify all the requests originating through proxy chaining, so I
can bypass the authentication mechanism ...