Setting Up A Protected Resource - Novell ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010 Manual

Access gateway guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010:
Table of Contents

Advertisement

To configure a protected resource:
1 In the Administration Console, click Devices > Access Gateways > Edit > [Name of Reverse
Proxy] > [Name of Domain-Based Proxy Service or Primary Proxy Service] > Protected
Resources.
The Resource View of the Protected Resource List is used to create new protected resources or
manage existing protected resources. The Policy View is used to see which policies are being
used by multiple protected resources. For more information about the Policy View, see
Section 1.3.7, "Assigning a Policy to Multiple Protected Resources," on page
2 Select one of the following actions:
New: To create a new protected resource, click this option and specify a display name for the
resource. For configuration information, see
on page
25.
Delete: To delete a protected resource, select a protected resource, then click Delete.
Enable: To enable a resource so that the Access Gateway protects it, select a protected
resource, then click Enable.
Disable: To disable protection for a resource, select a protected resource, then click Disable.
After a resource is disabled, its path no longer has special protection. For example, you can set
up a resource that allows access to all pages (for example /*) and another resource with special
protection for a subpath. If you disable the subpath, make sure the security requirements of the
/* resource are sufficient for the subpath.
Also, when a protected resource is disabled, the resource no longer shows up in the Path List
for a path-based multi-homing proxy.
3 Select the name of a protected resource to perform the following tasks:
Section 1.3.2, "Configuring an Authentication Procedure for Non-Redirected Login," on
page 29
Section 1.3.3, "Assigning an Authorization Policy to a Protected Resource," on page 31
Section 1.3.4, "Assigning an Identity Injection Policy to a Protected Resource," on
page 32
Section 1.3.5, "Assigning a Form Fill Policy to a Protected Resource," on page 33
Section 1.3.6, "Assigning a Timeout Per Protected Resource," on page 35

1.3.1 Setting Up a Protected Resource

1 Click Access Gateways > Edit > [Name of Reverse Proxy] > [Name of Proxy Service] >
Protected Resources.
2 Either click the name of an existing resource or click New, then specify a display name for the
resource.
Section 1.3.1, "Setting Up a Protected Resource,"
Configuring the Access Gateway to Protect Web Resources
37.
25

Advertisement

Table of Contents
loading

Table of Contents