Sorry, what are you talking about?
Firstly, this thread relates to the inability for iOS to handle and save authenticated HTTPS Proxy credentials for communication without constantly asking users for input. What this issue is NOT about, is the inability to set up a PAC file (presumably for unauthenticated proxy access) and browse to websites. Safari works just fine for most things (using HTTP), why on earth would you recommend a $2.00 app (per iPad) for this?
Secondly, I resent the implicatation that we don't know what you are doing. The last couple of people responding to this thread are either Network Managers or System Administrators. We kow what we are doing, we can craft a proxy PAC file, heck... I am sure we've even crafted auto-discovery WPAD files which get published through DHCP. A lot of people have this issue, in a lot of different envronments, ad I think we've described the issue and required fix ore than enough times.
Sorry, but a $2.00 browser replacement is NOT the answer here. Apple needs to fix this ASAP. What would completely solve the issue for me is one of the following options:
1) Apple updates the UI for Settings > Network > WLAN > #SSID# > HTTP Proxy, and include a new HTTPS proxy setting like they do with OSX. Simple, but means entering the same information twice in most environments, which won't be great.
2) Apple updates the same interface with an option to use HTTPS Proxy with the same credentials as those entered in HTTP Proxy. Having both options (this and the previous option) wouldn't be a bad thing, because I am sure some sites have two different servers and/or ports to configure for proxy.
3) Better still, allow us to have a "Keychain" and associated app/setting on iOS devices. With this, we can just set "Authentication" to "On" and choose options for HTTP/HTTPS/etc. Apple don't even need to provide a place for a username and password in this UI, because the first use of the proxy will prompt you for the credentials, which you will then enter using a "Save in Keychain" option (like on OSX). For most people/environments, we could just set the HTTP Proxy setting to "Auto" and set our Proxy.PAC file path (or use auto-discovery), and away we go. Makes deploying the settings via MDM a breeze as well.
Any of the above will work perfectly and are similar UI elements to those that Apple already has for their desktop OS. I prefer option (3) as it is one less place that a user needs to enter credentials during a setup, but it will require a fair bit of work on Apples part. All our OSX systems use this setup - one PAC file as "Auto Configuration proxy Script" in both HTTP and HTTPS options, and with credentials pre-filed in the Keychain via our first-logon process (custom scripts). On iOS it would rock - and if it could also manage saving passwords for Apps, websites, etc., just like OSX, it would be great for all users.
So, again, this issue is NOT a "you configured it wrong" issue. Or something that you can "pay someoe who's cluey" to fix. Or one where "there's an App for that". Apple made a pretty silly ommission here, and they need to fix it.