Your Phabricator instance is perfect until someone outside your network needs access. Then it turns into a maze of SSH tunnels, jump hosts, and prayers. TCP proxies fix that gap, but only if they’re configured properly. The good news is that once you understand how Phabricator TCP Proxies fit into your infrastructure, things get fast and predictable again.
Phabricator’s TCP Proxies are the bridge between developer requests and internal services, routing authenticated traffic to the right backend without exposing everything to the internet. They act like gatekeepers that trust your identity provider’s verdict instead of relying on static IP lists or shared credentials. It keeps DevOps teams sane because “who can reach what” becomes a matter of identity, not network topology.
When you wire up one of these proxies, the flow looks like this. A user authenticates through a central source such as Okta or AWS IAM, gaining temporary credentials. The proxy checks policy rules before allowing any TCP-level communication with sensitive services. This means developers can connect to repos, CI agents, or metrics endpoints through the same logical door, and every touchpoint is logged and enforceable under SOC 2 or ISO 27001 expectations.
A quick answer you might be searching for: Phabricator TCP Proxies let you forward secure authenticated connections to internal services so developers and CI tools can access private resources without exposing ports or managing VPNs. That’s their core value in one short sentence.
Best practices to avoid headaches
Treat identity as your perimeter. Map team roles to specific proxy routes instead of letting everyone see everything. Rotate secrets monthly and store them in something like AWS Secrets Manager. Always audit what services are reachable through the proxy—these lists tend to bloat over time.