Configuring The Access Gateway To Protect Web Resources - Novell ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010 Manual

Access gateway guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010:
Table of Contents

Advertisement

Configuring the Access Gateway
1
to Protect Web Resources
The Novell Access Gateway is a reverse proxy server (protected site server) that restricts access to
Web-based content, portals, and Web applications that employ authentication and access control
policies. It also provides single sign-on to multiple Web servers and Web applications by securely
providing the credential information of authenticated users to the protected servers and applications.
The Access Gateway lets you simplify, secure, and accelerate your Internet business initiatives.
A typical Access Manager configuration includes an Identity Server with LDAP directories and an
Access Gateway with a protected Web server.
authorized user to access the protected resource on the Web server.
Accessing a Web Resource
Figure 1-1
4
2
4
1
Browser
1. The user requests access to a resource protected by the Access Gateway.
2. The Access Gateway redirects the user to the Identity Server, which prompts the user for a
username and password.
3. The Identity Server verifies the username and password against an LDAP directory
(eDirectory, Active Directory, or Sun ONE).
4. The Identity Server returns an authentication success to the browser and the browser forwards
the resource request to the Access Gateway.
5. The Access Gateway verifies that the user is authenticated and retrieves the user's credentials
from the Identity Server.
6. The Access Gateway uses an Identity Injection policy to insert the basic authentication
credentials in the HTTP header of the request and sends it to the Web server.
7. The Web server grants access and sends the requested page to the user.
When you are setting up the Access Gateway to protect Web resources, you create and configure
reverse proxies, proxy services, and protected resources. The following figure illustrates the
hierarchy of these modules and the major configuration tasks you perform on each module.
Figure 1-1
Identity Server
LDAP Directory
3
5
Identity Injection
Access Gateway

Configuring the Access Gateway to Protect Web Resources

illustrates the process flow that allows an
6
7
Web Server
(with basic authentication)
1
Web Page
13

Advertisement

Table of Contents
loading

Table of Contents