Since a proxy credential of an active user instance is stored on the slave node, the slave node can detect the replay attack easily. Another request of authentication with a proxy credential that is already saved on the slave node will be treated as a replay attack, because proxy credentials are designed as one-time-usage.