Fair enough.

While I'm always interested in learning more about how FusionAuth fits into system architectures, we don't document many proxy configurations, as they tend to be pretty scenario specific. There are also a lot of different proxies out there, often with good documentation!

But sure, anything you figure out we'd love to have you add to the fusionauth-contrib project as a PR to share with the community.

Thanks!