5 To enable SSL connections between the proxy service and its Web servers, select Connect
Using SSL. For configuration information for this option, Web Server Trusted Root, and SSL
Mutual Certificate, see
Servers," on page
68.
6 In the Connect Port field, specify the port that the Access Gateway should use to communicate
with the Web servers. The following table lists some default port values for common types of
Web servers.
Server Type
Web server with HTML content
SSL VPN
WebSphere*
JBoss*
7 To control how idle and unresponsive Web server connections are handled and to optimize
these processes for your network, select TCP Connect Options. For more information, see
Section 1.7.2, "Configuring TCP Connect Options for Web Servers," on page
8 To add a Web server, click New in the Web Server List and specify the IP address or the fully
qualified DNS name of the Web server.
The Web servers added to this list must contain identical Web content. Configuring your
system with multiple servers with the same content adds fault tolerance and increases the speed
for processing requests. For more information about this process, see
Group of Web Servers," on page
9 To delete a Web server, select the Web server, then click Delete.
This deletes the Web server from the list so that the Access Gateway no longer sends requests
to the deleted Web server. At least one Web server must remain in the list. You must delete the
proxy service to remove the last server in the list.
10 To save your changes to browser cache, click OK.
11 To apply your changes, click the Access Gateways link, then click Update > OK.
1.4 Configuring Protected Resources
A protected resource configuration specifies the directory (or directories) on the Web server that you
want to protect. The protected resource configuration specifies the authorization procedures and the
policies that should be used to enforce protection. The authentication procedures and the policies
(Authorization, Identity Injection, and Form Fill) enable the single sign-on environment for the user.
The type of protections a resource requires depends upon the resource, the Web server, and the
conditions you define for the resource.
You can select from the following types of protection:
Authentication Procedures: Specifies the type of credentials the user must use to log in (such as
name and password or secure name and password). You can select None for the contract, which
allows the resource to be a public resource, with no login required.
In addition to selecting the contract, you can also configure how the authentication procedure
handles subsequent authentication requests from an application.
Section 2.4, "Configuring SSL between the Proxy Service and the Web
Non-Secure Port
80
8080
9080
8080
154.
Configuring the Access Gateway to Protect Web Resources
Secure Port
443
8443
9443
8443
60.
Section 6.1, "Setting Up a
19
Need help?
Do you have a question about the ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE and is the answer not in the manual?