Managing Reverse Proxies And Authentication - Novell ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010 Manual

Access gateway guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010:
Table of Contents

Advertisement

Figure 1-2
Module Hierarchy
Reverse Proxy
Proxy Service
Protected Resource
This hierarchy allows you to have precise control over what is required to access a particular
resource, and also allows you to provide a single sign-on solution for all the resources protected by
the Access Gateway. The authentication contract, authentication procedure, Authorization policy,
Identity Injection policy, and Form Fill policy are configured at the resource level so that you can
enable exactly what the resource requires. This allows you to decide where access decisions are
made:
You can configure the Access Gateway to control access to the resource.
You can configure the Web server for access control and configure the Access Gateway to
supply the required information.
You can use the first method for some resources and the second method for other resources or
use both methods on the same resource.
This section describes the following tasks:
Section 1.1, "Managing Reverse Proxies and Authentication," on page 14
Section 1.2, "Configuring the Web Servers of a Proxy Service," on page 22
Section 1.3, "Configuring Protected Resources," on page 24
Section 1.4, "Configuring Protected Resources for Specific Applications," on page 38
Section 1.5, "Configuring HTML Rewriting," on page 49
Section 1.6, "Configuring Connection and Session Limits," on page 69
1.1 Managing Reverse Proxies and
Authentication
A reverse proxy acts as the front end to your Web servers on your Internet or intranet and off-loads
frequent requests, thereby freeing up bandwidth. The proxy also increases security because the IP
addresses of your Web servers are hidden from the Internet.
To create a reverse proxy, you must create at least one proxy service with a protected resource. You
must supply a name for each of these components. Reverse proxy names and proxy service names
must be unique to the Access Gateway because they are configured for global services such as IP
14
Novell Access Manager 3.1 SP2 Access Gateway Guide
Access Gateway Modules and Their Configuration Options
Configuration Options
Listening Address & Port
SSL Requirements
Web Servers
Caching
HTML Rewriting
Logging
URLs
Authentication Contracts and Procedures
Authorization
Identity Injection
Form Fill

Advertisement

Table of Contents
loading

Table of Contents