Reverse Proxy Scenarios for Single Sign-On
|
|
|
- Edgar Ethan Morgan
- 10 years ago
- Views:
Transcription
1 Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4
2
3 Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4
4 Note Before using this information and the product it supports, read the information in Notices on page 129. This edition applies to ersion 3.4 of IBM Sterling Secure Proxy and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 2006, US Goernment Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
5 Contents Chapter 1. Configure a Single Sign-on Connection to an HTTP Serer Chapter 2. Configure the Basic Scenario to Enable a Connection to the myfilegateway Application Chapter 3. Configure Optional Features for SSO Using HTTP Chapter 4. Configure Adanced Features 9 Chapter 5. Basic Single Sign-On Scenario for myfilegateway Chapter 6. Configure Sterling Secure Proxy for Basic Single Sign-On Chapter 7. Create an SSO Configuration Chapter 8. Create an HTTP Policy to Support a Single-Sign On Connection. 17 Chapter 9. Create an HTTP Netmap to Support a Single Sign-On Connection to myfilegateway Chapter 10. Define the HTTP Reerse Proxy Adapter Used for the Single Sign-On Connection Chapter 11. Configure Sterling External Authentication Serer to Support Single Sign-On Chapter 12. Prepare Sterling File Gateway to Support Single Sign-On on UNIX or Linux Chapter 13. Modify Sterling File Gateway to Support Single Sign-On on UNIX or Linux Chapter 14. Prepare Sterling File Gateway to Support Single Sign-On on Microsoft Windows Chapter 15. Modify Sterling File Gateway to Support Single Sign-On on Microsoft Windows Chapter 16. Verify That Sterling File Gateway is Configured for Single Sign-On Chapter 17. Verify the Sterling Secure Proxy Connections Chapter 18. Configure Adanced Features for SSO Using HTTP Chapter 19. Customize the SSO Cookie Attributes Chapter 20. Allow a Third-Party Proider to Create Tokens Chapter 21. Configure Sterling External Authentication Serer to Enable a Third-Party Proider to Create Tokens. 47 Chapter 22. Customize Sterling Secure Proxy to Use a Login Portal of a Third-Party Application Chapter 23. Customize Token Definitions Created by Sterling External Authentication Serer Chapter 24. Configure Sterling B2B Integrator or Sterling File Gateway to Use Multiple Sterling External Authentication Serers Chapter 25. Configure Single Sign-On for Sterling File Gateway Chapter 26. Create an SSO Configuration for Sterling File Gateway. 59 Chapter 27. Create an HTTP Policy to Support SSO for Sterling File Gateway. 61 Chapter 28. Define the HTTP Netmap for Sterling File Gateway Copyright IBM Corp. 2006, 2012 iii
6 Chapter 29. Configure HTML Rewrite for SSO Chapter 30. Configure an HTTP Adapter for Sterling File Gateway Chapter 31. Create User Accounts in Sterling File Gateway Chapter 32. Verify That Sterling File Gateway is Configured for Single Sign-On Chapter 33. Configure Single Sign-On for Sterling B2B Integrator Dashboard. 73 Chapter 34. Create an SSO Configuration for Sterling B2B Integrator Dashboard Chapter 35. Create an HTTP Policy to Support SSO for Sterling B2B Integrator Dashboard Chapter 36. Define the HTTP Netmap for Sterling B2B Integrator Dashboard. 79 Chapter 37. Configure HTML Rewrite for Sterling B2B Integrator Dashboard. 81 Chapter 38. Configure an HTTP Adapter for Sterling B2B Integrator Dashboard. 83 Chapter 39. Create User Accounts in Sterling B2B Integrator Chapter 40. Verify the Sterling Secure Proxy Connections Chapter 41. Create an HTTP Policy to Support a Single-Sign On Connection. 89 Chapter 42. Add Single Sign-On Support for Basic Authentication Applications on Sterling B2B Integrator 91 Chapter 43. Create an SSO Configuration for a Basic Authentication Application Chapter 44. Define the HTTP Netmap for a Basic Authentication Application. 95 Chapter 45. Configure an HTTP Adapter for a Basic Authentication Application. 97 Chapter 46. Create Basic Authentication Application User Accounts in Sterling B2B Integrator.. 99 Chapter 47. Verify the Sterling Secure Proxy Connections Chapter 48. Customize the Logon Portal Chapter 49. Common User Tasks Managed by the Logon Portal Workflow When the User Initiates a Password Change Workflow When a User Password is Expired or Must Change Workflow When the User Proides Inalid Logon Credentials Workflow When a User Account is Locked Workflow When the User Cannot Change Password Chapter 50. Configuration Considerations for Logon Portal Chapter 51. Organization of Logon Portal Customization Scenarios Chapter 52. Customize the Login Page 111 Chapter 53. Customize the Welcome Page Chapter 54. Configure Sterling Secure Proxy to Skip the Welcome Page Chapter 55. Customize the Change Password Page for HTTP SSO Chapter 56. Customize the Logout Page Chapter 57. Customize Password Policy Page Chapter 58. Customize User Messages 123 Chapter 59. Configure the Forgot Your User ID or Password Page i Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
7 Chapter 60. Configure Sterling Secure Proxy to Use External Logon Portal Notices Contents
8 i Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
9 Chapter 1. Configure a Single Sign-on Connection to an HTTP Serer Sterling Secure Proxy can be used as a proxy with Sterling File Gateway and other HTTP applications and supports a single sign-on connection. Single sign-on (SSO) proides access control that allows a user to log in once to Sterling Secure Proxy, using the HTTP protocol, and then gain access to Sterling File Gateway without logging in again. Single sign-on (SSO) bypasses the normal user authentication process in Sterling File Gateway and instead trusts that Sterling Secure Proxy has authenticated the user. To support single sign-on, configure a Sterling Secure Proxy Login page and Sterling External Authentication Serer to generate SSO tokens. Configuring SSO allows a trading partner to log on and use the same login session to connect to Sterling Secure Proxy and Sterling File Gateway. By default, Sterling External Authentication Serer uses OpenSAML to create and manage SSO tokens. Howeer, you can customize your enironment to use a third-party application to generate tokens. This topic describes how to configure the HTTP protocol in Sterling Secure Proxy between the trading partner and Sterling Secure Proxy and between Sterling Secure Proxy and Sterling File Gateway to enable authentication through Sterling External Authentication Serer. It also describes how to configure Sterling External Authentication Serer to issue tokens to authenticate the connection between Sterling Secure Proxy and Sterling File Gateway, without the need to log in again for this connection. Flow of Data for Single Sign-On Configuration Between Sterling File Gateway and Sterling Secure Proxy After you set up the basic single sign-on configuration, trading partners can communicate in a secure enironment that proides authentication. The trading partner first connects to Sterling Secure Proxy which then connects to Sterling File Gateway on behalf of the trading partner. Following is an illustration of the flow of data: Copyright IBM Corp. 2006,
10 Following are the steps that occur during a single sign-on session between a trading partner, Sterling Secure Proxy, and Sterling File Gateway when Sterling External Authentication Serer is used to generate and manage tokens: 1. The trading partner requests a connection to Sterling File Gateway. 2. Sterling Secure Proxy receies the request, and the SSL handshake between Sterling Secure Proxy and the trading partner begins. If SSL authentication is configured, the proxy submits its certificate to the trading partner. If client authentication is configured, the trading partner then submits its certificate to Sterling Secure Proxy for authentication. You can optionally configure Sterling Secure Proxy to enforce client authentication and send the certificate to Sterling External Authentication Serer for alidation. 3. Sterling Secure Proxy presents a Login page to the trading partner, who proides his user ID and password. If the HTTP policy is configured to use basic authentication, Sterling Secure Proxy sends an unauthorized response and the browser displays the browser user ID/password prompt. 4. Sterling Secure Proxy sends either the user ID and password to Sterling External Authentication Serer, and then alidates this against information stored in LDAP. 5. If the credentials are alid, Sterling External Authentication Serer creates an OpenSAML 2 token and Sterling Secure Proxy returns the a cookie associated with the token to the trading partner. 6. The trading partner sends an HTTP request to Sterling Secure Proxy and includes the cookie. 7. Sterling Secure Proxy checks for the cookie and alidates the token using Sterling External Authentication Serer. 8. Sterling Secure Proxy then connects to Sterling File Gateway and performs an SSL handshake. It then sends the HTTP request with the cookie from the trading partner to Sterling File Gateway. 9. Sterling File Gateway then alidates the token against Sterling External Authentication Serer and begins normal operation. 2 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
11 Configuration Considerations Before you complete the single sign-on configuration, be aware of the following considerations: Only the HTTP, Sterling Connect:Direct, FTP, and SFTP protocols support single sign-on connections. When Sterling Secure Proxy is configured to use SSO and the Sterling External Authentication Serer user authentication profile is configured to return a mapped user ID, the mapped user ID, not the original user ID, and the SSO token are sent to the back-end system for user authentication. Each single sign-on user you create in Sterling File Gateway must be modified in the Sterling B2B Integrator User Accounts as an External user with the correct Authentication Host. Sterling Secure Proxy uses the specified Authentication Host to authenticate the user. The myfilegateway, FileGateway, and Sterling B2B Integrator dashboard users use application authentication in the HTTP policy. The Sterling B2B Integrator AS2 and WebDa users use basic authentication in the HTTP policy. Customize the Sterling Secure Proxy Login page-when you configure the basic scenario and select Application Authentication in the HTTP policy, you use the default Sterling Secure Proxy Login page. The default page proides basic information, including user name and password. To customize this page, to include additional information and your logo, complete the procedure, Customize the Login Page. If you are using a load balancer to run multiple Sterling Secure Proxy engines, aoid login credential errors by configuring the load balancer to use persistence or "sticky connections." Refer to your load balancer documentation for details about configuring persistence. Chapter 1. Configure a Single Sign-on Connection to an HTTP Serer 3
12 4 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
13 Chapter 2. Configure the Basic Scenario to Enable a Connection to the myfilegateway Application Procedure 1. Configure the basic scenario to allow you to quickly become operational using single sign-on to connect to myfilegateway, the trading partner interface in Sterling File Gateway. 2. After you complete this scenario, test the connection to ensure that you hae correctly configured it. 3. After you determine that it works, add SSL/TLS support. You then hae a basic configuration and can begin operation. Copyright IBM Corp. 2006,
14 6 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
15 Chapter 3. Configure Optional Features for SSO Using HTTP Sterling Secure Proxy proides the following optional features and you can configure them as required for your enironment. These features are aailable for SSO and non-sso configurations. Refer to Protocol configuration information for instructions on how to configure the following features: Modify the HTTP connection requirement between Sterling Secure Proxy and inbound nodes by defining a specific IP address, a wildcard peer pattern, or an IP/subnet pattern Secure the outbound HTTP connection between Sterling Secure Proxy and Sterling File Gateway using SSL or TLS Authenticate an inbound certificate using Sterling External Authentication Serer Define alternate nodes for failoer support Sterling External Authentication Serer proides the ability to configure multifactor authentication. In addition to configuring client authentication in Sterling Secure Proxy, Sterling External Authentication Serer can authenticate the IP address, certificate, password, and/or group access. Copyright IBM Corp. 2006,
16 8 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
17 Chapter 4. Configure Adanced Features Procedure Customize the OpenSAML 2 tokens-you use the default token generation definition when you configure the basic single sign-on definition. To customize the token definition, you can modify the named identity proider, the token signing key, or how long a token can be used before it expires. Refer to Customize the SSO Attributes. Configure Sterling B2B Integrator or Sterling File Gateway with additional pools-you use additional pools to support more than one Sterling External Authentication Serer. Refer to Configure Sterling B2B Integrator or Sterling File Gateway to use multiple Sterling External Authentication Serers. Use a third-party application to configure tokens-the basic scenario uses Sterling External Authentication Serer to configure and manage tokens. To use a third-party application to configure tokens, complete additional setup procedures. Refer to Allow a Third-Party Proider to Create Tokens. Configure a Single Sign-on connection to the Sterling File Gateway application-after you configure the basic SSO setup for myfilegateway, determine if internal company users require the ability to connect to the Sterling File Gateway application through Sterling Secure Proxy. Refer to Add Single Sign-On Support for Sterling File Gateway. Configure a Single Sign-on connection to other applications on Sterling B2B Integrator-This includes the Dashboard and Mailbox interfaces. Refer to Configure Single Sign-On for Dashboard. Configure a Single Sign-on connection to HTTP serices on Sterling B2B Integrator that use Basic Authentication-This includes applications such as WebDAV and AS2. Refer to Add Single Sign-On Support for Basic Authentication Applications on Sterling B2B Integrator. Customize the Logon Portal-You use the default Logon Portal when you configure an HTTP adapter with Sterling Secure Proxy. To customize the Logon Portal, you can modify the Logon Portal pages and user messages, or you can configure Sterling Secure Proxy to use an external logon portal. Refer to Customize the Logon Portal. Copyright IBM Corp. 2006,
18 10 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
19 Chapter 5. Basic Single Sign-On Scenario for myfilegateway Complete the following tasks to define an HTTP configuration between a trading partner and Sterling Secure Proxy and between Sterling Secure Proxy and Sterling File Gateway to support a single sign-on connection for myfilegateway: Configure Sterling Secure Proxy to support basic single sign-on Use the default single sign-on configuration in Sterling External Authentication Serer to manages OpenSAML 2 tokens Prepare Sterling File Gateway to support the single sign-on option Validate connections between the trading partner, Sterling Secure Proxy, and Sterling File Gateway Copyright IBM Corp. 2006,
20 12 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
21 Chapter 6. Configure Sterling Secure Proxy for Basic Single Sign-On Complete the following procedures to configure Sterling Secure Proxy for basic single sign-on: Create an SSO configuration. Create an Sterling Secure Proxy policy to support a single sign-on connection to Sterling File Gateway. Define a netmap to identify inbound and outbound connections. Define an HTTP adapter. Copyright IBM Corp. 2006,
22 14 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
23 Chapter 7. Create an SSO Configuration About this task Before you create an SSO configuration, gather the following information. Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Default Landing Page SSO configuration file. Identify the Sterling File Gateway application to connect to. /myfilegateway To define an SSO configuration: Procedure 1. Click Adanced from the menu bar. 2. Click Actions > New SSO Configuration. 3. On the Basic tab, type a configuration name in the Name field. 4. Type the fully qualified host name that the trading partner will use to connect to myfilegateway in the Fully Qualified Host Name field. 5. Click on the Adanced tab. 6. Type /myfilegateway in the Default Landing Page field. 7. If this is for an unsecure connection (HTTP, rather than HTTPS), you must uncheck the SSO Cookie Secure Flag. 8. Click Sae. Copyright IBM Corp. 2006,
24 16 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
25 Chapter 8. Create an HTTP Policy to Support a Single-Sign On Connection About this task To create an HTTP policy to support a single sign-on connection to Sterling File Gateway Procedure 1. Select Application Authentication in the User Authentication Type field. The alues, Through External Authentication and SSO token from External Authentication, are selected by default. 2. If the trading partner uses a non-browser client, select Basic Authentication in the User Authentication Type field.. 3. Enable Through External Authentication and enable SSO token from External Authentication. 4. Type the definition you defined in Sterling External Authentication Serer in the External Authentication Profile field. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
26 18 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
27 Chapter 9. Create an HTTP Netmap to Support a Single Sign-On Connection to myfilegateway About this task To create an HTTP netmap to support a single sign-on connection to myfilegateway: Procedure 1. Configure the inbound node information for your external trading partners. Select the policy defined for SSO in the preceding section. 2. Configure the outbound node information for your Sterling File Gateway serer. Copyright IBM Corp. 2006,
28 20 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
29 Chapter 10. Define the HTTP Reerse Proxy Adapter Used for the Single Sign-On Connection About this task To create an HTTP adapter to support a single sign-on connection to myfilegateway: Procedure 1. Specify standardrouting for the Routing Type field. 2. Specify the netmap you created for the single sign-on connection to SFG for the Netmap field. 3. Specify the SSO configuration you created for the single sign-on connection to Sterling File Gateway for the SSO Configuration field. 4. Specify your Sterling External Authentication Serer in the External Authentication Serer field. Results For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
30 22 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
31 Chapter 11. Configure Sterling External Authentication Serer to Support Single Sign-On To allow an SSO connection between a trading partner and Sterling Secure Proxy to route traffic to Sterling File Gateway, you configure OpenSAML 2.0 tokens in Sterling External Authentication Serer. You can authenticate an inbound connection against information stored in an LDAP database by configuring Sterling External Authentication Serer to define how the connection is authenticated. The Sterling External Authentication Serer definition determines which options are enabled. Refer to the Sterling External Authentication Serer documentation library for instructions on configuring an Sterling External Authentication Serer definition. The Sterling External Authentication Serer generates and manages tokens. A default configuration called SEAS-SAML is enabled when you install Sterling External Authentication Serer. If you use the default configuration, Sterling External Authentication Serer is the identity proider, token signing keys are automatically generated, and the token expires after 15 minutes. Use the default configuration when you configure basic single sign-on. To customize Sterling External Authentication Serer for single sign-on, refer to Customize Token Definitions Created by Sterling External Authentication Serer. Copyright IBM Corp. 2006,
32 24 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
33 Chapter 12. Prepare Sterling File Gateway to Support Single Sign-On on UNIX or Linux About this task Before you enable single sign-on between a trading partner and Sterling File Gateway, when using Sterling Secure Proxy, you modify the Sterling File Gateway installation. The files required to enable SSO are installed with Sterling External Authentication Serer. To prepare Sterling File Gateway to support SSO on UNIX or Linux: Procedure 1. From the Sterling External Authentication Serer, copy the files and subdirectories from the EA_install_dir/lib/sterling/sfg-sso-plugin directory to a location that is accessible to the Sterling File Gateway serer, where EA_install_dir is the location of the Sterling External Authentication Serer installation. Note: If you use FTP to copy the files to the Sterling File Gateway serer, be sure to transfer the.jar files in binary mode (TYPE I). 2. On the Sterling File Gateway serer, moe to the SFG_install_dir/properties directory, where SFG_install_dir is the Sterling File Gateway installation directory. 3. Type the following commands to copy the SSO properties files to the Sterling File Gateway serer, where base_dir is the location where you copied the files in step 1: cp base_dir/sfg-sso-plugin/properties/security.properties_seas-sso_ext.in. cp base_dir/sfg-sso-plugin/properties/authentication_policy.properties_seas-auth_ext.in. cp base_dir/sfg-sso-plugin/properties/serers.properties_seas-sso_ext. cp base_dir/sfg-sso-plugin/properties/serers.properties_seas-auth_ext. 4. Stop Sterling File Gateway if it is running. 5. In the serer.properties_seas-sso_ext file, uncomment the following line and replace <SI_install> with the actual installation path for Sterling File Gateway: # seas-sso=<si_install>/properties/seas-sso/1.0/seas-sso.properties 6. In the serer.properties_seas-auth_ext file, uncomment the following line and replace <SI_install> with the actual installation path for Sterling File Gateway: # seas-auth=<si_install>/properties/seas-auth/1.0/seas-auth.properties 7. From the SFG_install_dir/bin directory, type the following commands:./install3rdparty.sh seas-sso 1.0 -j base_dir/sfg-sso-plugin/seas-sso.jar./install3rdparty.sh seas-sso 1.0 -p base_dir/sfg-sso-plugin/properties/seas-sso.properties./install3rdparty.sh seas-auth 1.0 -p base_dir/sfg-sso-plugin/properties/seas-auth.properties 8. From the SFG_install_dir/jar/seas-sso/1.0 directory, create a subdirectory named priate. 9. Moe to the /priate directory. 10. Type the following command to copy the jar files to the /priate directory on the Sterling File Gateway serer: cp base_dir/sfg-sso-plugin/priate/*.jar. Copyright IBM Corp. 2006,
34 26 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
35 Chapter 13. Modify Sterling File Gateway to Support Single Sign-On on UNIX or Linux About this task Before Sterling File Gateway supports single sign-on from an Sterling Secure Proxy enironment, you must modify properties. Do not make changes directly to the properties files. Instead, make changes to customer_oerrides.properties to preent custom settings from being oerwritten when you apply patches. The customer_oerrides.properties file is not changed during upgrades or patches. If the customer_oerrides.properties file is not present, you must create it. Refer to the Sterling B2B Integrator customer_oerrides.properties topic for more information. To modify Sterling File Gateway to enable single-sign on: Procedure 1. In the install_dir/properties directory, locate or create the customer_oerrides.properties file. 2. Open the file in a text editor and add the properties that you want to oerride. a. Add the following alues to configure single sign-on: security.sso_forward_url.myfilegateway.logout= /Signon/logout security.sso_forward_url.myfilegateway.timeout= /Signon/timeout security.sso_forward_url.myfilegateway. VALIDATION_FAILED=/Signon/alidationerror security.sso_forward_url.filegateway.logout= /Signon/logout security.sso_forward_url.filegateway.timeout= /Signon/timeout security.sso_forward_url.filegateway. VALIDATION_FAILED=/ Signon/alidationerror security.sso_forward_url.aft.logout=/signon/logout security.sso_forward_url.aft.timeout=/signon/timeout security.sso_forward_url.aft.validation_failed=/signon/ alidationerror b. Add the following alues to configure single sign-on for the Sterling B2B Integrator Dashboard: security.sso_forward_url.ws.logout=/signon/logout security.sso_forward_url.dashboard.logout=/signon/logout security.sso_forward_url.ws.timeout=/signon/timeout security.sso_forward_url.dashboard.timeout=/signon/ timeout security.sso_forward_url.ws.timeout=/signon/timeout security.sso_forward_url.dashboard.timeout=/signon/ timeout Note: To access dashboard using SSO, browser must request this URI: Copyright IBM Corp. 2006,
36 /dashoard/sso.jsp Default Landing Page should also be set to /dashoard/sso.jsp For Dashboard/B2BConsole: neo-struts-ui.url.ws.sso= neo-struts-ui.url.dash.sso= c. Add the following alues to access Mailbox (MBI) using single sign-on: security.sso_forward_url.mailbox.logout=/signon/logout security.sso_forward_url.mailbox.timeout=/signon/timeout security.sso_forward_url.mailbox.validation_failed=/ Signon/alidationerror d. Add the following alues to access AFT or MyAFT using single sign-on: security.sso_forward_url.aft.logout=/signon/logout security.sso_forward_url.aft.timeout=/signon/timeout security.sso_forward_url.aft.validation_failed=/signon/ alidationerror security.sso_forward_url.myaft.logout=/signon/logout security.sso_forward_url.myaft.timeout=/signon/timeout security.sso_forward_url.myaft.validation_failed=/signon/ alidationerror e. Add the following alues to access an unknown source using single sign-on: security.sso_forward_url.logout=/signon/logout security.sso_forward_url.timeout=/signon/timeout security.sso_forward_url.validation_failed=/signon/ alidationerror f. Add the following connection parameters to configure the Sterling File Gateway connection to Sterling External Authentication Serer: seas-sso.ea_host=ip address or host name of Sterling External Authentication Serer seas-sso.ea_port=listen port of Sterling External Authentication Serer Specify the appropriate secure or clear listen port from the Sterling External Authentication Serer configuration. seas-sso.ea_ps_name=perimeter serer used to connect to Sterling External Authentication Serer Specify local if you do not use a perimeter serer to connect to Sterling External Authentication Serer. seas-sso.ea_secure_connection=trueorfalse true sets connections to Sterling External Authentication Serer as secure and false sets the connection as clear. If this parameter is true, you must also define the EA_SYSTEM_CERT and EA_TRUSTED_CERT[1]. seas-sso.ea_system_cert=name of the system certificate in the system certificate store, if the connection is secure. Look up the system certificate names in Sterling B2B Integrator by naigating to Trading Partner > Digital Certificates > System. seas-sso.ea_trusted_cert[1]=name of the trusted certificate used for secure connections to Sterling External Authentication Serer. Look up the 28 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
37 trusted certificate names in Sterling B2B Integrator by naigating to Trading Partner > Digital Certificates > Trusted. If you use chained certificates and each certificate of the chain is checked in indiidually, you must define each of the certificates in the chain in Sterling External Authentication Serer. For each certificate, define a separate alue, using the seas-sso.ea_trusted_cert(#) parameter. For example, for the first certificate, configure the parameter, seas-sso.ea_trusted_cert[1]; for the second certificate, define seas-sso.ea_trusted_cert[2], until all certificates in the chain are defined in Sterling External Authentication Serer. The order you configure the certificates in Sterling External Authentication Serer does not hae to match the definitions in Sterling B2B Integrator. Note: Additional fields can be added if you wish to oerride the defaults shown below: ## SEAS-SSO Configuration ## HTTP cookie containing the SSO token seas-sso.sso_token_cookie=ssotoken ## Maximum time to wait for making EA connections and receiing responses seas-sso.sso_timeout=30 seas-sso.sso_timeout_units=seconds ## Whether to keep persistent connections to EA seas-sso.persistent_ea_connections=true ## Maximum number of EA connections seas-sso.max_ea_connections=1 3. Sae and close the file. 4. Stop and restart Sterling File Gateway to use the new alues. Chapter 13. Modify Sterling File Gateway to Support Single Sign-On on UNIX or Linux 29
38 30 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
39 Chapter 14. Prepare Sterling File Gateway to Support Single Sign-On on Microsoft Windows About this task Before you enable single sign-on between a trading partner and Sterling File Gateway, when using Sterling Secure Proxy, you modify the Sterling File Gateway installation. The files required to enable SSO are installed with Sterling External Authentication Serer. To prepare Sterling File Gateway to support SSO on Microsoft Windows: Procedure 1. From the Sterling External Authentication Serer, copy the files from the EA_install_dir\lib\sterling\sfg-sso-plugin directory to a location that is accessible by the Sterling File Gateway serer. Note: If you use FTP to copy the files to the Sterling File Gateway serer, be sure to transfer the.jar files in binary mode (TYPE I). 2. On the Sterling File Gateway serer, moe to the SFG_install_dir\properties directory. 3. Type the following commands to copy the SSO security.properties files to the Sterling File Gateway serer, where base_dir is the location where you copied the files in step 1: copy base_dir\sfg-sso-plugin\properties\security.properties_seas-sso_ext.in. copy base_dir\sfg-sso-plugin\properties\authentication_policy.properties_seas-auth_ext.in. copy base_dir\sfg-sso-plugin\properties\serers.properties_seas-sso_ext. copy base_dir\sfg-sso-plugin\properties\serers.properties_seas-auth_ext. 4. Stop Sterling File Gateway if it is running. 5. In the serer.properties_seas-sso_ext file, uncomment the following line and replace <SI_install> with the actual installation path for Sterling File Gateway: # seas-sso=<si_install>\properties\seas-sso\1.0\seas-sso.properties 6. In the serer.properties_seas-auth_ext file, uncomment the following line and replace <SI_install> with the actual installation path for Sterling File Gateway: # seas-auth=<si_install>\properties\seas-auth\1.0\seas-auth.properties 7. From the SFG_install_dir\bin directory, type the following commands: install3rdparty.cmd seas-sso 1.0 -j base_dir\sfg-sso-plugin\seas-sso.jar install3rdparty.cmd seas-sso 1.0 -p base_dir\sfg-sso-plugin\properties\seas-sso.properties install3rdparty.cmd seas-auth 1.0 -p base_dir\sfg-sso-plugin\properties\seas-auth.properties 8. From the SFG_install_dir\jar\seas-sso\1.0 directory, create a subdirectory named priate. 9. Go to the \priate directory. 10. Type the following command to copy the jar files to the Sterling File Gateway serer: copy base_dir\sfg-sso-plugin\priate\*.jar. Copyright IBM Corp. 2006,
40 32 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
41 Chapter 15. Modify Sterling File Gateway to Support Single Sign-On on Microsoft Windows About this task Before Sterling File Gateway is configured to support single sign-on from an Sterling Secure Proxy enironment, you must modify properties. Do not make changes directly to the properties files. Instead, make changes to a file called customer_oerrides.properties. This preents custom settings from being oerwritten when you apply patches. The customer_oerrides.properties file is not changed during upgrades or patches. If the customer_oerrides.properties file is not present, you must create it. Refer to the Sterling B2B Integrator customer_oerrides.properties topic for more information. To modify Sterling File Gateway to enable single sign-on: Procedure 1. In the install_dir\properties directory, locate or create the customer_oerrides.properties file. 2. Open the file in a text editor and add the properties that you want to oerride. a. Add the following alues to configure single sign-on: security.sso_forward_url.myfilegateway.logout=\signon\logout security.sso_forward_url.myfilegateway.timeout=\signon\timeout security.sso_forward_url.myfilegateway.validation_failed=\signon\alidationerror security.sso_forward_url.filegateway.logout=\signon\logout security.sso_forward_url.filegateway.timeout=\signon\timeout security.sso_forward_url.filegateway.validation_failed=\signon\alidationerror security.sso_forward_url.aft.logout=\signon\logout security.sso_forward_url.aft.timeout=\signon\timeout security.sso_forward_url.aft.validation_failed=\signon\alidationerror b. Add the following alues to configure single sign-on for the Sterling B2B Integrator Dashboard: security.sso_forward_url.ws.logout=\signon\logout security.sso_forward_url.dashboard.logout=\signon\logout security.sso_forward_url.ws.timeout=\signon\timeout security.sso_forward_url.dashboard.timeout=\signon\ timeout security.sso_forward_url.ws.timeout=\signon\timeout security.sso_forward_url.dashboard.timeout=\signon\ timeout Note: To access dashboard using SSO, browser must request this URI: /dashoard/sso.jsp Default Landing Page should also be set to /dashoard/sso.jsp For Dashboard/B2BConsole: neo-struts-ui.url.ws.sso= neo-struts-ui.url.dash.sso= c. Add the following alues to access Mailbox (MBI) using single sign-on: Copyright IBM Corp. 2006,
42 security.sso_forward_url.mailbox.logout=\signon\logout security.sso_forward_url.mailbox.timeout=\signon\timeout security.sso_forward_url.mailbox.validation_failed=\ Signon\alidationerror d. Add the following alues to access AFT or MyAFT using single sign-on: security.sso_forward_url.aft.logout=\signon\logout security.sso_forward_url.aft.timeout=\signon\timeout security.sso_forward_url.aft.validation_failed=\signon\ alidationerror security.sso_forward_url.myaft.logout=\signon\logout security.sso_forward_url.myaft.timeout=\signon\timeout security.sso_forward_url.myaft.validation_failed=\signon\ alidationerror e. Add the following alues to access an unknown source using single sign-on: security.sso_forward_url.logout=\signon\logout security.sso_forward_url.timeout=\signon\timeout security.sso_forward_url.validation_failed=\signon\ alidationerror f. Add the following connection parameters to configure the Sterling File Gateway connection to Sterling External Authentication Serer: seas-sso.ea_host=ip address or host name of Sterling External Authentication Serer seas-sso.ea_port=listen port of Sterling External Authentication Serer Specify the appropriate secure or clear listen port from the Sterling External Authentication Serer configuration. seas-sso.ea_ps_name=perimeter serer used to connect to Sterling External Authentication Serer Specify local if you do not use a perimeter serer to connect to Sterling External Authentication Serer. seas-sso.ea_secure_connection=true or false true sets connections to Sterling External Authentication Serer as secure and false sets the connection as clear. If this parameter is true, you must also define the EA_SYSTEM_CERT and EA_TRUSTED_CERT[1]. seas-sso.ea_system_cert=name of the system certificate in the system certificate store, if the connection is secure. Look up the system certificate names in Sterling B2B Integrator by naigating to Trading Partner > Digital Certificates > System. seas-sso.ea_trusted_cert[1]=name of the trusted certificate used for secure connections to Sterling External Authentication Serer. Look up the trusted certificate names in Sterling B2B Integrator by naigating to Trading Partner > Digital Certificates > Trusted. If you use chained certificates and each certificate of the chain is checked in indiidually, you must define each of the certificates in the chain in Sterling External Authentication Serer. For each certificate, define a separate alue, using the seas-sso.ea_trusted_cert(#) parameter. For example, for the first certificate, configure the parameter, seas-sso.ea_trusted_cert[1]; for the second certificate, define seas-sso.ea_trusted_cert[2], until all certificates in the chain are 34 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
43 defined in Sterling External Authentication Serer. The order you configure the certificates in Sterling External Authentication Serer does not hae to match the definitions in Sterling B2B Integrator. Note: Additional fields can be added if you wish to oerride the defaults shown below: ## SEAS-SSO Configuration ## HTTP cookie containing the SSO token seas-sso.sso_token_cookie=ssotoken ## Maximum time to wait for making EA connections and receiing responses seas-sso.sso_timeout=30 seas-sso.sso_timeout_units=seconds ## Whether to keep persistent connections to EA seas-sso.persistent_ea_connections=true ## Maximum number of EA connections seas-sso.max_ea_connections=1 3. Sae and close the file. 4. Stop and restart Sterling File Gateway to use the new alues. Chapter 15. Modify Sterling File Gateway to Support Single Sign-On on Microsoft Windows 35
44 36 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
45 Chapter 16. Verify That Sterling File Gateway is Configured for Single Sign-On About this task Before you configure additional functions, make sure that Sterling File Gateway is ready for use in a single sign-on enironment. To erify the configuration: Procedure 1. Start Sterling File Gateway. 2. View the authentication.log and security.log to make sure the Sterling File Gateway files are updated. If the update was successful, log files display the success messages. Authentication.log file displays the following messages: ALL GLOBAL_SCOPE SSOAuthenticationPolicy SI is configured to support single sign-on ALL GLOBAL_SCOPE SSOAuthenticationPolicy SSO Property : SSO_AUTHENTICATION_CLASS.1 = Class name : com.sterlingcommerce.seas.gis.sso.plugin.seasssoproider ALL GLOBAL_SCOPE SecurityManager SSO Authentication -Anew SSO Authentication Policy has been installed. ALL GLOBAL_SCOPE SecurityManager SSO Authentication:Enabled ALL GLOBAL_SCOPE SecurityManager SSO Authentication on Page:Enabled ALL GLOBAL_SCOPE SecurityManager Number of SSO Authentication Plug-In:1 ALL GLOBAL_SCOPE SecurityManager SSO configuration policy...ssoauthenticationpolicy iscomplete=true isenabled=true httpuseridheader=sm_user ALL GLOBAL_SCOPE SecurityManager initialization complete. Security.log displays the following message: ALL GLOBAL_SCOPE SEAS PLUGIN: Plug-in initialized Copyright IBM Corp. 2006,
46 38 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
47 Chapter 17. Verify the Sterling Secure Proxy Connections About this task To erify that the engine can receie and initiate communications sessions after configuring the basic single sign-on enironment: Procedure Establish a connection between an HTTP client and the HTTP reerse proxy adapter to ensure that the Sterling File Gateway Login page is displayed. Results If you can iew the Sterling File Gateway home page, you hae confirmed that the connections are working. You are ready to add SSL or TLS support to the inbound connection. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
48 40 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
49 Chapter 18. Configure Adanced Features for SSO Using HTTP After you configure the basic SSO setup, determine if your enironment requires an adanced feature. Following are the adanced features: Customize the OpenSAML 2 tokens You use the default token generation definition when you configure the basic single sign-on definition. To customize the token definition, you can modify the named identity proider, the token signing key, or how long a token can be used before it expires. Refer to Customize the SSO Cookie Attributes. Configure Sterling B2B Integrator or Sterling File Gateway with additional pools You use additional pools to support more than one Sterling External Authentication Serer. Refer to Configure Sterling Secure Proxy or Sterling File Gateway to use multiple Sterling External Authentication Serers. Use a third-party application to configure tokens The basic scenario uses Sterling External Authentication Serer to configure and manage tokens. To use a third-party application to configure tokens, complete additional setup procedures. Refer to Allow a Third-Party Proider to Create Tokens. Configure a Single Sign-on connection to the Sterling File Gateway Application After you configure the basic SSO setup for myfilegateway, determine if internal company users require the ability to connect to the Sterling File Gateway application through Sterling Secure Proxy. Refer to Add Single Sign-On Support for Sterling File Gateway. Configure a Single Sign-on connection to other applications on Sterling B2B Integrator This includes the Dashboard and Mailbox interfaces. Refer to Configure Single Sign-On for Sterling File Gateway Dashboard. Configure a Single Sign-on connection to HTTP serices on Sterling B2B Integrator that use Basic Authentication This includes applications such as WebDAV and AS2. Refer to Add Single Sign-On Support for Basic Authentication Applications on Sterling B2B Integrator. Customize the Logon Portal You use the default Logon Portal when you configure an HTTP adapter with Sterling Secure Proxy. To customize the Logon Portal, you can modify the Logon Portal pages and user messages, or you can configure Sterling Secure Proxy to use an external logon portal. Refer to Customize the Logon Portal. Copyright IBM Corp. 2006,
50 42 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
51 Chapter 19. Customize the SSO Cookie Attributes About this task To implement single sign-on, you use single sign-on attributes. When you configure the basic scenario, you use default attributes. You can customize these settings, including the name of the cookie containing the SSO token, HTTP header associated with a user ID, and the attributes associated with a token. Tokens can be generated with Sterling External Authentication Serer or with a third-party application. This procedure assumes you are using Sterling External Authentication Serer. Refer to Allow a Third-Party Proider to Create Tokens for instructions on configuring an external application to generate tokens. Before you customize this page, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Front End SSO Token Cookie Name (Inbound) Back End SSO User Header Name (Outbound) Back End SSO Token Cookie Name (Outbound) Name to assign to the single sign-on configuration. Name to assign the cookies associated with each token. This alue must match the definition in Sterling File Gateway. The HTTP header name containing the user name that is sent to Sterling File Gateway. Name to assign the cookies associated with each token. This alue must match the definition in Sterling File Gateway. Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. To customize the front-end definitions, edit the Front End SSO Token Cookie Name field. 5. To customize the back-end definitions, edit the following fields: Copyright IBM Corp. 2006,
52 Back End SSO User Header Name Back End SSO Token Cookie Name Note: The alues defined in the back-end fields must match these settings on the Sterling File Gateway and Sterling B2B Integrator system: ## HTTP header containing the SSO user security.sso_user_header=sm_user ## SEAS-SSO Configuration ## HTTP cookie containing the SSO token seas-sso.sso_token_cooki Refer to the Sterling File Gateway documentation for instructions. 6. Click Sae. 44 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
53 Chapter 20. Allow a Third-Party Proider to Create Tokens You used the default OpenSAML token generation definition when you configured the basic single sign-on definition. The default configuration uses Sterling External Authentication Serer to manage tokens. To use a third-party application for token generation, you must modify the SSO Token setup in Sterling External Authentication Serer. The following diagram illustrates the flow using a third-party application for token generation. Copyright IBM Corp. 2006,
54 46 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
55 Chapter 21. Configure Sterling External Authentication Serer to Enable a Third-Party Proider to Create Tokens About this task You can configure Sterling External Authentication Serer to alidate a token generated by a third-party login application using a custom class. You must first erify that a custom class exists that Sterling External Authentication Serer can use to erify tokens generated by the third-party application. Refer to the Sterling External Authentication Serer documentation library for more information. Before you configure Sterling External Authentication Serer to enable a third-party application to create tokens, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Token Manager Class Name Token Expiration Period The application that creates the tokens. Name of the Jaa class that implements the token manager interface. How long a token is alid. Default is 15 minutes. Custom To configure Sterling External Authentication Serer and enable a third-party application to generate tokens: Procedure 1. Log on to Sterling External Authentication Serer. 2. Select Manage > System Settings. 3. From the System Settings dialog, click the SSO Token tab. 4. To configure a token manager other than Sterling External Authentication Serer, select Custom from the Token Manager field. 5. Type the class name in the Class name field. 6. To change how long a token can be used before it expires, type a new alue in the Token Expiration Period field. 7. Click OK. Copyright IBM Corp. 2006,
56 48 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
57 Chapter 22. Customize Sterling Secure Proxy to Use a Login Portal of a Third-Party Application About this task You can configure Sterling Secure Proxy to redirect connections to a third-party login portal for authentication and SSO token generation. Before doing this, you should erify that a custom class exists that Sterling External Authentication Serer can use to erify tokens generated by the third-party application. Before you configure Sterling Secure Proxy to enable the login page of a third-party application, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name External Portal External Application Login URL Name to assign to the single sign-on file. External login portal URL where the user is authenticated and a token is generated. To configure the SSO Configuration in Sterling Secure Proxy: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. Click the Logon Portal tab. 5. Select the External portal option. 6. To identify the URL of the application being used to generate tokens, type the URL in the External Application Login URL field. Copyright IBM Corp. 2006,
58 50 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
59 Chapter 23. Customize Token Definitions Created by Sterling External Authentication Serer About this task You used the default token definition when you configured the basic single sign-on definition. To customize the token definition, complete the following procedure. You can modify the named identity proider, the token signing key, or how long a token can be used before it expires. Refer to the Sterling External Authentication Serer documentation library for more information. Before you customize token definitions, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Named Identity Proider Prefix appended to generated tokens to identify the proider. Note: If you change the proider name, any outstanding tokens are inalid. Token Signing Key Token Expiration Period Alias of the key certificate to sign the token. How long a token is alid. Default is 15 minutes. To customize the token configuration in Sterling External Authentication Serer: Procedure 1. Log on to Sterling External Authentication Serer. 2. Select Manage > System Settings. 3. From the System Settings dialog, click the SSO Token tab. 4. Customize one or more of the following definitions: Named Identity Proider Token Signing Key Token Expiration Period 5. Click OK. Copyright IBM Corp. 2006,
60 52 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
61 Chapter 24. Configure Sterling B2B Integrator or Sterling File Gateway to Use Multiple Sterling External Authentication Serers About this task If you are implementing single sign-on for HTTP with Basic Authentication, or for protocols other than HTTP, and you need to support additional Sterling External Authentication Serers, add the following parameters for each additional Sterling External Authentication Serer pool configuration to the customer_oerrides.properties file located in the install_dir\properties directory. Note: The Sterling File Gateway and myfilegateway applications always use the default SSO_POOL Sterling External Authentication Serer connection to alidate SSO tokens, regardless of which Authentication Host is selected for the user. Additional Sterling External Authentication Serer connection pools may only be used for HTTP Basic Auth applications, FTP, SFTP, and Sterling Connect:Direct. authentication_policy.authentication_n.classname= com.sterlingcommerce.seas.gis.sso.plugin.seasauthentication authentication_policy.authentication_n.display_name = name to be used on the Sterling B2B Integrator/Sterling File Gateway user administration UI. Use something different than the default Sterling External Authentication Serer Serer Authentication, which is used by the default SSO_POOL. This is the Authentication Host name that is selected when you configure external User Accounts to use this pool. authentication_policy.authentication_n.enabled=true seas-auth.authentication_n.profile = userauth seas-auth.authentication_n.ea_pool=unique name for your pool other than the default SSO_POOL, which shares the Sterling External Authentication Serer connection pool with the Sterling File Gateway SSO configuration Note: Change the "n" in the aboe example to a number greater than 1 to aoid oerwriting the default SSO_POOL, which is shared with the FileGateway and myfilegateway SSO configuration. Also, make sure you aoid using a number already in use for LDAP authentication. Define a unique number for each entry. To use another connection pool instead of the default SSO_POOL, configure the Sterling External Authentication Serer connection of the pool with the following parameters, where pool is the pool name defined in the preceding section: seas-auth.pool.ea_host=ip address or host name of Sterling External Authentication Serer seas-auth.pool.ea_port=listen port of Sterling External Authentication Serer seas-auth.pool.ea_ps_name=perimeter serer used to connect to Sterling External Authentication Serer seas-auth.pool.ea_secure_connection=enables a secure Sterling External Authentication Serer true sets connections to Sterling External Authentication Serer as secure and false sets the connection as clear. If this parameter is true, you must also define the Sterling External Authentication Serer_SYSTEM_CERT and Sterling External Authentication Serer_TRUSTED_CERT[1]. Copyright IBM Corp. 2006,
62 seas-auth.pool.ea_system_cert=name of the system certificate in the system certificate store, if the connection is secure seas-auth.pool.ea_trusted_cert[1]=name of the trusted certificate used by Sterling External Authentication Serer for secure connections seas-auth.pool.timeout=maximum time to wait for making Sterling External Authentication Serer connections and receiing responses seas-auth.pool.timeout_units=unit of time to use, minutes or seconds, for seas-auth.pool.timeout parameter seas-auth.pool.persistent_ea_connections=whether to keep persistent connections to Sterling External Authentication Serer true sets connections to Sterling External Authentication Serer as persistent and false sets the connections as not persistent. seas-auth.pool.max_ea_connections=maximum number of Sterling External Authentication Serer connections Note: Additional fields can be added if you wish to oerride the defaults shown below: ## SEAS-SSO Configuration ## HTTP cookie containing the SSO token seas-sso.sso_token_cookie=ssotoken ## Maximum time to wait for making Sterling External Authentication Serer connections and receiing responses seas-sso.sso_timeout=30 seas-sso.sso_timeout_units=seconds ## Whether to keep persistent connections to Sterling External Authentication Serer seas-sso.persistent_ea_connections=true ## Maximum number of Sterling External Authentication Serer connections seas-sso.max_ea_connections=1 All of the primary Sterling External Authentication Serer connection properties on the SSO plug-in can be prefixed by "ALT_" and suffixed by ".<n>" to specify alternate Sterling External Authentication Serers. These are the connection properties for the primary Sterling External Authentication Serer: EA_HOST=IP address or host name of Sterling External Authentication Serer (required) EA_PORT=port of Sterling External Authentication Serer (default = 61365) EA_PS_NAME=name of perimeter serer to connect to Sterling External Authentication Serer (default = local) EA_SECURE_CONNECTION=whether connection to Sterling External Authentication Serer is secure: true/false (default = false) EA_CIPHER_SUITE[1]=cipher suite #1, if secure connection (defaulted if not specified) EA_CIPHER_SUITE[2]=cipher suite #2, if secure connection (defaulted if not specified) :: EA_CIPHER_SUITE[n]=cipher suite #n, if secure connection (defaulted if not specified) EA_SYSTEM_CERT=name of system certificate for secure connection to Sterling External Authentication Serer (default = OpsKey) 54 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
63 EA_TRUSTED_CERT[1]=name of trusted certificate used by Sterling External Authentication Serer for secure connections (required if secure connection; either the public certificate of the Sterling External Authentication Serer, or the CA root that issued Sterling External Authentication Serer's certificate) EA_TRUSTED_CERT[2]=name of trusted certificate used by Sterling External Authentication Serer for secure connections (optional; intermediate certificate in Sterling External Authentication Serer's certificate chain) :: EA_TRUSTED_CERT[n]=name of trusted certificate used by Sterling External Authentication Serer for secure connections (optional; intermediate certificate in Sterling External Authentication Serer's certificate chain) The suffix ".<n>" indicates the alternate order, starting with 1. There is no limit to the number of alternates. For example, if you hae two alternate Sterling External Authentication Serers, configure the following properties: # Alternate Sterling External Authentication Serer #1 ALT_EA_HOST.1 = <address of alternate Sterling External Authentication Serer #1> ALT_EA_PORT.1 = <port of alternate Sterling External Authentication Serer #1> ALT_EA_PS_NAME.1 = <perimeter serer for alternate Sterling External Authentication Serer #1> ALT_EA_SECURE_CONNECTION.1 = true ALT_EA_CIPHER_SUITE[1].1 = TLS_RSA_WITH_AES_128_CBC_SHA ALT_EA_CIPHER_SUITE[2].1 = TLS_RSA_WITH_AES_256_CBC_SHA ALT_EA_CIPHER_SUITE[3].1 = TLS_RSA_WITH_3DES_EDE_CBC_SHA ALT_EA_SYSTEM_CERT.1 = <system certificate for alternate Sterling External Authentication Serer #1> ALT_EA_TRUSTED_CERT.1 = <trusted certificate for alternate Sterling External Authentication Serer #1> # Alternate Sterling External Authentication Serer #2 ALT_EA_HOST.2 = <address of alternate Sterling External Authentication Serer #2> ALT_EA_PORT.2 = <port of alternate Sterling External Authentication Serer #2> ALT_EA_PS_NAME.2 = <perimeter serer for alternate Sterling External Authentication Serer #2> ALT_EA_SECURE_CONNECTION.2 = true ALT_EA_CIPHER_SUITE[1].2 = TLS_RSA_WITH_AES_128_CBC_SHA ALT_EA_CIPHER_SUITE[2].2 = TLS_RSA_WITH_AES_256_CBC_SHA ALT_EA_CIPHER_SUITE[3].2 = TLS_RSA_WITH_3DES_EDE_CBC_SHA ALT_EA_SYSTEM_CERT.2 = <system certificate for alternate Sterling External Authentication Serer #2> ALT_EA_TRUSTED_CERT.2 = <trusted certificate for alternate Sterling External Authentication Serer #2> If you are using customer.oerrides.properties, prefix the properties with "seas-sso." or with "seas-auth.<pool_name>.", depending on whether you are configuring the Sterling External Authentication Serer SSO plug-in or authenticator. Chapter 24. Configure Sterling B2B Integrator or Sterling File Gateway to Use Multiple Sterling External Authentication Serers 55
64 56 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
65 Chapter 25. Configure Single Sign-On for Sterling File Gateway After you configure single sign-on for myfilegateway, determine if internal company users require access to Sterling File Gateway through Sterling Secure Proxy. Complete the following procedures to configure Sterling Secure Proxy for basic single sign-on for Sterling File Gateway: Create an SSO Configuration for Sterling File Gateway Create an HTTP Policy to Support SSO for Sterling File Gateway Define the HTTP Netmap for Sterling File Gateway Configure HTML Rewrite Configure an HTTP Adapter for Sterling File Gateway Create User Accounts in Sterling File Gateway Verify the Sterling Secure Proxy Connections Copyright IBM Corp. 2006,
66 58 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
67 Chapter 26. Create an SSO Configuration for Sterling File Gateway About this task To configure SSO for internal users: Procedure 1. Make a copy of the myfilegateway SSO configuration. 2. Rename the copy to identify the configuration as a Sterling File Gateway definition. 3. Change the field called Default Landing Page to connect to /filegateway. Refer to Create an SSO Configuration for more information. Results Note: You can also use the included Welcome Page, which includes links to Sterling File Gateway and myfilegateway and can be customized to include other applications. Copyright IBM Corp. 2006,
68 60 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
69 Chapter 27. Create an HTTP Policy to Support SSO for Sterling File Gateway About this task To create an HTTP policy to support a single sign-on connection to Sterling File Gateway: Procedure 1. Select Application Authentication in the User Authentication Type field. The alues, Through External Authentication and SSO token from External Authentication, are selected by default. 2. Type the definition you defined in Sterling External Authentication Serer in the External Authentication Profile field. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
70 62 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
71 Chapter 28. Define the HTTP Netmap for Sterling File Gateway Procedure 1. Make a copy of the myfilegateway HTTP netmap. 2. Rename the copy to identify the configuration as a Sterling File Gateway definition. 3. Configure the inbound node definitions for the nodes that need to connect to Sterling File Gateway. Configure the outbound node definition to support the connection to Sterling File Gateway. 4. Change the alues as needed. Refer to Create an HTTP Netmap to Support a Single Sign-On Connection to myfilegateway for more information. Copyright IBM Corp. 2006,
72 64 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
73 Chapter 29. Configure HTML Rewrite for SSO About this task HTML rewriting allows you to replace the URL links returned by an HTTP serer to the Sterling Secure Proxy serer by configuring how the URL links from the serer will be mapped to the URL links in Sterling Secure Proxy. If the HTTP serer has web pages with links to other web pages, you must map the URL connections in order for the links to work. You must configure HTML rewrite in order for the Sterling File Gateway application to function correctly. Certain pages on the dashboard use jaascript to create URL dynamically using a back-end host name literal. To change this host name to the proxy host name, you add another entry to the HTML rewrite. Use the third entry in the table below as an example. Note: HTML rewrite may not work for arbitrary jaascripts that dynamically create URL at the client side. To configure this enironment, use the following table to help you identify the rewrite alues to define in the netmap definition: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Serer URL http(s)://<fully qualified DNS name for the SFG_host>:<port> http(s)://<sfg_ipaddress>:<port> http(s)://<fully qualified DNS name for the SFG_host> <fully qualified DNS name for the SI_host> Proxy URL http(s)://<fully qualified DNS name for the proxy_host>:<adapter1_port> http(s)://<proxy_ipaddress>:<port> http(s)://<fully qualified DNS name for the proxy_host> <fully qualified DNS name for the proxy host> To configure HTML rewrite: Procedure 1. Click Configuration from the menu bar. 2. Expand the netmap definition you created. 3. On the HTTP Netmap Nodes panel, click the HTML Rewrite tab. 4. Click New. 5. Enable the Support HTML Rewrite field. 6. Type the URL path for the outbound serer in the Serer URL field. 7. Type the URL path for the proxy in the Proxy URL field. 8. Click Sae. 9. Repeat steps 4 through 8 for all HTML Rewrite options you want to configure. 10. To reorder the HTML rewrite definitions: Copyright IBM Corp. 2006,
74 a. Click the radio button beside the URL routing definition to reorder. b. Click Moe Up or Moe Down until the item is in the correct order. 11. Click Sae. 12. Test the configuration to ensure that single sign-on and HTML rewrite to the Sterling File Gateway serer is configured correctly. 66 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
75 Chapter 30. Configure an HTTP Adapter for Sterling File Gateway Procedure 1. Make a copy of the myfilegateway HTTP adapter. 2. Rename the copy to identify the configuration as a Sterling File Gateway configuration. 3. Enable Support HTML Rewrite. 4. Specify the SSO configuration and HTTP netmap configurations you created for Sterling File Gateway. Refer to Define the HTTP Reerse Proxy Adapter Used for the Single Sign-On Connection for more information. Copyright IBM Corp. 2006,
76 68 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
77 Chapter 31. Create User Accounts in Sterling File Gateway About this task User accounts work with permissions to proide security for your organization. These features make it possible to regulate which users hae access to each module in Sterling File Gateway and what functions each user can perform. To create a user account: Procedure 1. From Sterling File Gateway, select Tools > B2B Console. 2. From within Sterling File Gateway, select Accounts > User Accounts > Create a new Account. 3. Complete the steps in the wizard. Supply the following information about the user: Authentication type (external) User ID Password (For the default user policy, the password must be six characters or more and contain at least two of the following characters: (number, capital #, $, %, ^, &, *) Confirm Password Policy (Default User Policy) SSH Authorized User Key Session Timeout (in minutes) Accessibility (Dashboard UI) Dashboard Theme (Default) 4. Select one or more of the following groups to assign the user to, based on their job responsibilities: Sterling File Gateway Integration Architects Sterling File Gateway Operators Sterling File Gateway Route Proisioners Sterling File Gateway System Administrators Note: Do not assign the myfilegateway user to the trading partner group. Otherwise, the user will not be able to login to the Sterling File Gateway application. Note: For full Sterling File Gateway functionality, each of these groups must hae at least one user. By default, the following users are created during installation: fg_sysadmin, fg_architect, fg_proisioner, and fg_operator. One user can belong to multiple groups. Note: To create the equialent of fg_sysadmin, assign all the Sterling File Gateway groups listed aboe and the Sterling B2B Integrator Admin group to the user. 5. Supply the following information for the user: Gien Name Surname Copyright IBM Corp. 2006,
78 Pager Preferred Language (English, Japanese) Manager ID Identity 6. Reiew and confirm the user to create the new user account. 70 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
79 Chapter 32. Verify That Sterling File Gateway is Configured for Single Sign-On About this task Before you configure additional functions, make sure that Sterling File Gateway is ready for use in a single sign-on enironment. To erify the configuration: Procedure 1. Start Sterling File Gateway. 2. View the authentication.log and security.log to make sure the Sterling File Gateway files are updated. If the update was successful, log files display the success messages. Authentication.log file displays the following messages: ALL GLOBAL_SCOPE SSOAuthenticationPolicy SI is configured to support single sign-on ALL GLOBAL_SCOPE SSOAuthenticationPolicy SSO Property : SSO_AUTHENTICATION_CLASS.1 = Class name : com.sterlingcommerce.seas.gis.sso.plugin.seasssoproider ALL GLOBAL_SCOPE SecurityManager SSO Authentication -Anew SSO Authentication Policy has been installed. ALL GLOBAL_SCOPE SecurityManager SSO Authentication:Enabled ALL GLOBAL_SCOPE SecurityManager SSO Authentication on Page:Enabled ALL GLOBAL_SCOPE SecurityManager Number of SSO Authentication Plug-In:1 ALL GLOBAL_SCOPE SecurityManager SSO configuration policy...ssoauthenticationpolicy iscomplete=true isenabled=true httpuseridheader=sm_user ALL GLOBAL_SCOPE SecurityManager initialization complete. Security.log displays the following message: ALL GLOBAL_SCOPE SEAS PLUGIN: Plug-in initialized Copyright IBM Corp. 2006,
80 72 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
81 Chapter 33. Configure Single Sign-On for Sterling B2B Integrator Dashboard After you configure single sign-on for myfilegateway, determine if internal company users require access to Sterling B2B Integrator dashboard through Sterling Secure Proxy. Complete the following procedures to configure Sterling Secure Proxy for basic single sign-on for dashboard: Create an SSO Configuration for Sterling B2B Integrator Dashboard Create an HTTP Policy to Support SSO for Sterling B2B Integrator Dashboard Define the HTTP Netmap for Sterling B2B Integrator Dashboard Configure HTML Rewrite for Sterling B2B Integrator Dashboard Configure an HTTP Adapter for Sterling B2B Integrator Dashboard Create User Accounts in Sterling B2B Integrator Verify the Sterling Secure Proxy Connections Copyright IBM Corp. 2006,
82 74 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
83 Chapter 34. Create an SSO Configuration for Sterling B2B Integrator Dashboard About this task To configure SSO for dashboard users: Procedure 1. Make a copy of the myfilegateway SSO configuration. 2. Rename the copy to identify the configuration as a Sterling B2B Integrator dashboard definition. 3. Change the field called Default Landing Page to connect to /dashboard/sso.jsp. Refer to Create an SSO Configuration for more information. Results Note: You can also select the Welcome Page as the Default Landing Page when you configure the SSO configuration. Copyright IBM Corp. 2006,
84 76 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
85 Chapter 35. Create an HTTP Policy to Support SSO for Sterling B2B Integrator Dashboard About this task To create an HTTP policy to support a single sign-on connection to Sterling B2B Integrator Dashboard: Procedure 1. Select Application Authentication in the User Authentication Type field. The alues, Through External Authentication and SSO token from External Authentication, are selected by default. 2. Type the definition you defined in Sterling External Authentication Serer in the External Authentication Profile field. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
86 78 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
87 Chapter 36. Define the HTTP Netmap for Sterling B2B Integrator Dashboard Procedure 1. Make a copy of the myfilegateway HTTP netmap. 2. Rename the copy to identify the configuration as a Sterling B2B Integrator dashboard definition. 3. Configure the inbound node definitions for the nodes that need to connect to dashboard. Configure the outbound node definition to support the connection to dashboard. 4. Change the alues as needed. Refer to Create an HTTP Netmap to Support a Single Sign-On Connection to myfilegateway for more information. Copyright IBM Corp. 2006,
88 80 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
89 Chapter 37. Configure HTML Rewrite for Sterling B2B Integrator Dashboard About this task HTML rewriting allows you to replace the URL links that refer to the Sterling B2B Integrator serer in the HTML pages returned by the HTTP serer with the links pointing to Sterling Secure Proxy. When the user clicks on these links, the HTTP requests come back to Sterling Secure Proxy. You must configure HTML rewrite in order for the dashboard application to function correctly. Certain pages on the dashboard use jaascript to create URL dynamically using a back-end host name literal. To change this host name to the proxy host name, you add another entry to the HTML rewrite. Use the fourth entry in the table below as an example. Note: HTML rewrite may not work for arbitrary jaascripts that dynamically create URL at the client side. To configure this enironment, use the following table to help you identify the rewrite alues to define in the netmap definition: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Serer URL http(s)://<fully qualified DNS name for the SI_host>:<port> http(s)://<si_ipaddress>:<port> http(s)://<fully qualified DNS name for the SI_host>: http(s)://<fully qualified DNS name for the SI_host> <fully qualified DNS name for the SI_host> Proxy URL http(s)://<fully qualified DNS name for the proxy_host>:<adapter1_port> http(s)://<fully qualified DNS name for the proxy_host>:<adapter1_port> http(s)://<fully qualified DNS name for the proxy_host>: http(s)://<fully qualified DNS name for the proxy_host> <fully qualified DNS name for the proxy host> Note: Ensure that the Destination Address field in the outbound node has the fully qualified DNS name of the Sterling B2B Integrator host. If not, the URLs in the HTML pages that reference the Sterling B2B Integrator host will not match the host URL entered for the HTML rewrite. To configure HTML rewrite: Procedure 1. Click Configuration from the menu bar. 2. Expand the netmap definition you created. 3. On the HTTP Netmap Nodes panel, click the HTML Rewrite tab. Copyright IBM Corp. 2006,
90 4. Click New. 5. Enable the Support HTML Rewrite field. 6. Type the URL path for the outbound serer in the Serer URL field. 7. Type the URL path for the proxy in the Proxy URL field. 8. Click Sae. 9. Repeat steps 4 through 8 for all HTML Rewrite options you want to configure. 10. To reorder the HTML rewrite definitions: a. Click the radio button beside the URL routing definition to reorder. b. Click Moe Up or Moe Down until the item is in the correct order. 11. Click Sae. 82 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
91 Chapter 38. Configure an HTTP Adapter for Sterling B2B Integrator Dashboard Procedure 1. Make a copy of the myfilegateway HTTP adapter. 2. Rename the copy to identify the configuration as a Sterling B2B Integrator dashboard configuration. 3. Enable Support HTML Rewrite. 4. Specify the SSO configuration and HTTP netmap configurations you created for dashboard. Refer to Define the HTTP Reerse Proxy Adapter Used for the Single Sign-On Connection for more information. Copyright IBM Corp. 2006,
92 84 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
93 Chapter 39. Create User Accounts in Sterling B2B Integrator About this task User accounts work with permissions to proide security for your organization. These features make it possible to regulate which users hae access to each module in Sterling B2B Integrator and what functions each user can perform. To create a user account: Procedure 1. Select Accounts > User Accounts > Create a new Account. 2. Complete the steps in the wizard. Supply the following information about the user: Authentication type (external) User ID Authentication Host Select a host that corresponds to the seas_auth.authentication-n configuration maintained in the customer_oerrides.properties file described in the preious section. Password (For the default user policy, the password must be six characters or more and contain at least two of the following characters. (number, capital #, $, %, ^, &, *) Confirm Password Policy (Default User Policy) SSH Authorized User Key Session Timeout (in minutes) Accessibility (Dashboard UI) This adds the user to the Dashboard Users group. Dashboard Theme (Default) 3. Select one or more groups to assign the user to, based on their job responsibilities. 4. Supply the following information for the user: Gien Name Surname Pager Preferred Language (English, Japanese) Manager ID Identity 5. Reiew and confirm the user to create the new user account. Copyright IBM Corp. 2006,
94 86 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
95 Chapter 40. Verify the Sterling Secure Proxy Connections About this task To erify that the engine can receie and initiate communications sessions after configuring the basic single sign-on enironment: Procedure 1. Establish a connection between an HTTP client and the HTTP reerse proxy adapter to ensure that the Sterling Secure Proxy Login page is displayed. 2. If you can iew the dashboard home page, you hae confirmed that the connections are working. If the Default Landing Page in your SSO configuration is the Welcome page, you will see a Welcome page with links to back-end applications, such as myfilegateway and the dashboard. Click on the dashboard link to see the dashboard home page and confirm that the connections are working. You can change the Default Landing Page to /dashboard/sso.jsp to skip the Welcome page and go right to the dashboard. Results You are ready to add SSL or TLS support to the inbound connection. For more information, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
96 88 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
97 Chapter 41. Create an HTTP Policy to Support a Single-Sign On Connection About this task To create an HTTP policy to support a single sign-on connection to a basic authentication application: Procedure 1. Select Basic Authentication in the User Authentication Type field. Enable Through External Authentication and enable SSO token from External Authentication. 2. Type the definition you defined in Sterling External Authentication Serer in the External Authentication Profile field. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
98 90 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
99 Chapter 42. Add Single Sign-On Support for Basic Authentication Applications on Sterling B2B Integrator After you configure single sign-on for myfilegateway, determine if users require access to Sterling B2B Integrator applications that use basic authentication, such as AS2 or WebDAV. Complete the following procedures to configure Sterling Secure Proxy for basic single sign-on for basic authentication applications on Sterling B2B Integrator. Create an SSO Configuration for a Basic Authentication Application Create an HTTP Policy to Support a Single-Sign On Connection Define the HTTP Netmap for a Basic Authentication Application Configure an HTTP Adapter for a Basic Authentication Application Create Basic Authentication Application User Accounts in Sterling B2B Integrator Verify the Sterling Secure Proxy Connections Copyright IBM Corp. 2006,
100 92 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
101 Chapter 43. Create an SSO Configuration for a Basic Authentication Application Procedure 1. To configure SSO for basic authentication application users, make a copy of the myfilegateway SSO configuration. 2. Rename the copy to identify the configuration as a definition for the application, such as AS2. 3. Change the field called Default Landing Page to connect to the application, such as /as2. Refer to Create an SSO Configuration for more information. Copyright IBM Corp. 2006,
102 94 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
103 Chapter 44. Define the HTTP Netmap for a Basic Authentication Application Procedure 1. Make a copy of the myfilegateway HTTP netmap. 2. Rename the copy to identify the configuration as a definition for the application, such as AS2. Configure the inbound node definitions for the nodes that need to connect to the application. 3. Configure the outbound node definition to support the connection to the application. 4. Change the alues as needed. Refer to Create an HTTP Netmap to Support a Single Sign-On Connection to myfilegateway for more information. Usually, applications that use basic authentication, such as AS2 and WebDAV, do not require HTML rewrite. Copyright IBM Corp. 2006,
104 96 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
105 Chapter 45. Configure an HTTP Adapter for a Basic Authentication Application Procedure 1. Make a copy of the myfilegateway HTTP adapter. 2. Rename the copy to identify the configuration as a basic authentication application configuration, such as AS2 or WebDAV. 3. Specify the SSO configuration and HTTP netmap configurations you created for the application. Refer to Define the HTTP Reerse Proxy Adapter Used for the Single Sign-On Connection for more information. Copyright IBM Corp. 2006,
106 98 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
107 Chapter 46. Create Basic Authentication Application User Accounts in Sterling B2B Integrator User accounts work with permissions to proide security for your organization. These features make it possible to regulate which users hae access to each module in Sterling B2B Integrator and what functions each user can perform. For more information, refer to Create User Accounts in Sterling B2B Integrator. Copyright IBM Corp. 2006,
108 100 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
109 Chapter 47. Verify the Sterling Secure Proxy Connections About this task To erify that the engine can receie and initiate communications sessions after configuring the basic single sign-on enironment: Procedure 1. Establish a connection between an HTTP client and the HTTP reerse proxy adapter to ensure that the browser user ID/password prompt is displayed. 2. For applications that use basic authentication, the Default Landing Page is the back-end application URL. If the Default Landing Page in your SSO configuration is the Welcome page, you will see a Welcome page with links to back-end applications, such as myfilegateway, AS2, and WebDAV. Click on the application link to see the application home page and confirm that the connections are working. You can change the Default Landing Page to the URI of the application, such as /as2, to skip the Welcome page and go right to the application. Results You are ready to add SSL or TLS support to the inbound connection. For more information about configuring the HTTP policy, refer to HTTP Reerse Proxy Configuration. Copyright IBM Corp. 2006,
110 102 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
111 Chapter 48. Customize the Logon Portal Sterling Secure Proxy proides a self-serice Logon Portal that allows Sterling File Gateway users to manage and change their passwords. The Logon Portal is separately licensed and includes erification of the new password, password expiration notification, display of password policy, and welcome and logon screens. You can also configure Sterling Secure Proxy to use an external logon portal. To support the Logon Portal, configure the HTTP protocol in Sterling Secure Proxy for SSO. This topic describes how to configure the Sterling Secure Proxy Logon Portal for the HTTP protocol. Before you complete the Logon Portal configuration, be aware of the following considerations: Sterling Secure Proxy SSO must be properly configured before you can use the change password functionality of the Logon Portal. Configure Actie Directory or LDAP to allow the trading partner to change his password. Comments are included in the default Logon Portal.html pages to simplify editing. Remoe all of these comments after you edit the pages to minimize security risks. Copyright IBM Corp. 2006,
112 104 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
113 Chapter 49. Common User Tasks Managed by the Logon Portal You can configure the Logon Portal to skip the Welcome page. You cannot configure the sequence of any other Logon Portal pages presented to the user. The following Logon Portal workflows are described below: Workflow When the User Initiates a Password Change Workflow When a User Password is Expired or Must Change Workflow When the User Proides Inalid Logon Credentials Workflow When a User Account is Locked Workflow When the User Cannot Change Password Workflow When the User Initiates a Password Change In this scenario, the trading partner decides to change his password. When a user connects to Sterling File Gateway, Sterling Secure Proxy presents a Login page. The user proides user credentials. If the credentials are alid, a Welcome page is displayed. The user can change his password or continue to the HTTP application. If the user selects Change Password, he can iew the password policy or change his password. To change a password, the user must follow the restrictions defined in the password policy. Howeer, the user will not be locked out of Sterling Secure Proxy if he does not define a alid new password. Note: The setting to allow the trading partner to change his password is in the Sterling External Authentication Serer group profile. This profile is specified in the HTTP policy configuration. Workflow When a User Password is Expired or Must Change In this scenario, the trading partner s password has expired or must be changed. When a user connects to Sterling File Gateway, Sterling Secure Proxy presents a Login page. The user proides user credentials. If the credentials are alid, a Change Password page is displayed and a user message is presented indicating that the password is expired or must be changed. The user can change his password or iew the password policy. If the user successfully changes his password, a Welcome page is displayed. If the user fails to successfully change his password, a Change Password page is displayed with an error message. Note: The setting to allow the trading partner to change his password is in the Sterling External Authentication Serer group profile. This profile is specified in the HTTP policy configuration. Workflow When the User Proides Inalid Logon Credentials In this scenario, the trading partner enters an inalid user ID or password. Copyright IBM Corp. 2006,
114 When a user connects to Sterling File Gateway, Sterling Secure Proxy presents a Login page. The user proides inalid user credentials. A Login page is displayed with a customizable error message. Workflow When a User Account is Locked In this scenario, the trading partner enters a alid user ID and password, but the account is locked. When a user connects to Sterling File Gateway, Sterling Secure Proxy presents a Login page. The user proides user credentials for a locked account. A Login page is displayed with a customizable error message. Workflow When the User Cannot Change Password In this scenario, the trading partner enters a alid user ID and password, but the user is not allowed to change the password. When a user connects to Sterling File Gateway, Sterling Secure Proxy presents a Login page. The user proides user credentials for an account that is not allowed to change the password. A Login page is displayed with a customizable error message. Note: The setting to allow the trading partner to change his password is in the Sterling External Authentication Serer group profile. This profile is specified in the HTTP policy configuration. 106 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
115 Chapter 50. Configuration Considerations for Logon Portal Sterling Secure Proxy SSO must be properly configured before you can use the change password functionality of the Logon Portal. Configure Actie Directory or LDAP to allow the trading partner to change his password. Comments are included in the default Logon Portal.html pages to simplify editing. Remoe all of these comments after you edit the pages to minimize security risks. Copyright IBM Corp. 2006,
116 108 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
117 Chapter 51. Organization of Logon Portal Customization Scenarios When you first configure Sterling Secure Proxy for HTTP, you use the default Login page, Welcome page, Change Password Page, Logout page, and Password Policy Page. This document proides instructions on how to customize an Sterling Secure Proxy Logon Portal. Customize the Login Page Customize the Welcome Page Configure Sterling Secure Proxy to Skip the Welcome Page Customize the Change Password Page Customize the Logout Page Customize Password Policy Page Customize User Messages Configure the Forgot Your User ID or Password Page Configure Sterling Secure Proxy to Use External Logon Portal Copyright IBM Corp. 2006,
118 110 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
119 Chapter 52. Customize the Login Page About this task The default Login page is a simple page with no logo information and prompts the user to proide a user ID and password. The default page also contains a link if the user forgets his user ID or password. You can customize the Login page to define how you want the page to look and what information to include on the page. You customize this page by modifying the labels or replacing the entire page. Before you modify the Login page, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Name to assign to the Sterling Secure Proxy configuration Sterling Secure Proxy Internal Portal Login Page Custom page to display for the Sterling Secure Proxy single sign-on login. Login Directory Name Custom directory in the engine installation directory where the HTML files that support single sign-on are stored. Login Page Charset Character encoding used to create the Sterling Secure Proxy Login page. This alue is sent to the browser as part of the content-type header with the Login page. Login Page Media Type Media type alue sent to the browser in the content-type header with the Login page. Default is text/html. To customize the Sterling Secure Proxy Login page: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. On the Logon Portal tab, select SSP Internal Portal. 5. Change one or more of the following fields to customize the Login page: Copyright IBM Corp. 2006,
120 Login Page Login Directory Name Login Page Charset Login Page Media Type 6. Click Sae. 7. If you want to change the text or graphics on the Login page, open the \install_dir\signon directory and modify the login.html file as required. Note: If you modify the login.html file, do not modify the following lines: ar ssomsgtext="#{ssomsgtext}"; ar ssomsgtitle="#{ssomsgtitle}"; ar ssomsgtype="#{ssomsgtype}"; ar ssomsgonly="#{ssomsgonly}"; 8. If you modify the login.html file, create a copy of the \install_dir\signon directory. Making a copy of the directory preents the custom attributes from being oerwritten if you upgrade the software or apply a patch. 112 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
121 Chapter 53. Customize the Welcome Page About this task The default Welcome page is a simple page with no logo information that proides links to the Logout page and the Change Password page. The default page does not include links to back-end applications. You can customize the Welcome page to define how you want the page to look and what information to include on the page. You customize this page by modifying the labels or replacing the entire page. Before you modify the Welcome page, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Name to assign to the Sterling Secure Proxy configuration Sterling Secure Proxy Internal Portal Welcome Page Custom page to display for the Sterling Secure Proxy single sign-on welcome. Login Directory Name Custom directory in the engine installation directory where the HTML files that support single sign-on are stored. Login Page Charset Character encoding used to create the Sterling Secure Proxy Login page. This alue is sent to the browser as part of the content-type header with the Login page. Login Page Media Type Media type alue sent to the browser in the content-type header with the Login page. Default is text/html. To customize the Sterling Secure Proxy Welcome page: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. On the Logon Portal tab, select SSP Internal Portal. 5. Change one or more of the following fields to customize the Login page: Copyright IBM Corp. 2006,
122 Welcome Page Login Directory Name Login Page Charset Login Page Media Type 6. Click Sae. 7. If you want to change the text or graphics on the Welcome page, open the \install_dir\signon directory and modify the welcome.html file as required. Add the URLs for back-end applications in the welcome.html as required. Note: If you modify the welcome.html file, do not modify the following lines: ar ssomsgtext="#{ssomsgtext}"; ar ssomsgtitle="#{ssomsgtitle}"; ar ssomsgtype="#{ssomsgtype}"; ar ssomsgonly="#{ssomsgonly}"; 8. If you modify the welcome.html file, create a copy of the \install_dir\signon directory. Making a copy of the directory preents the custom attributes from being oerwritten if you upgrade the software or apply a patch. 114 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
123 Chapter 54. Configure Sterling Secure Proxy to Skip the Welcome Page About this task You can configure Sterling Secure Proxy so that a user is directed to the back-end application instead of the Welcome page after logging in. You can configure this behaior by modifying the SSO configuration. To configure Sterling Secure Proxy to skip the Welcome page: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. On the Adanced tab, type the URL for the back-end application in the Default Application URL field. You can use the relatie URL, such as /myfilegateway, or full URL. 5. Click Sae. Copyright IBM Corp. 2006,
124 116 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
125 Chapter 55. Customize the Change Password Page for HTTP SSO About this task The default Change Password page is a simple page with no logo information that prompts the user to proide his user ID, existing password, and new password. The default page proides a link to the Password Policy page. You can customize the Change Password page to define how you want the page to look and what information to include on the page. You customize this page by modifying the labels or replacing the entire page. Before you modify the Change Password page, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Name to assign to the Sterling Secure Proxy configuration Sterling Secure Proxy Internal Portal Change Password Page Login Directory Name Custom page to display for the Sterling Secure Proxy single sign-on Change Password page. Custom directory in the engine installation directory where the HTML files that support single sign-on are stored. Login Page Charset Character encoding used to create the Sterling Secure Proxy Login page. This alue is sent to the browser as part of the content-type header with the Login page. Login Page Media Type Media type alue sent to the browser in the content-type header with the Login page. Default is text/html. To customize the Sterling Secure Proxy Change Password page: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. Copyright IBM Corp. 2006,
126 4. On the Logon Portal tab, select SSP Internal Portal. 5. Change one or more of the following fields to customize the Change Password page: Change Password Page Login Directory Name Login Page Charset Login Page Media Type 6. Click Sae. 7. If you want to change the text or graphics on the Change Password page, open the \install_dir\signon directory and modify the change password.html file as required. Note: If you modify the change password.html file, do not modify the following lines: ar ssomsgtext="#{ssomsgtext}"; ar ssomsgtitle="#{ssomsgtitle}"; ar ssomsgtype="#{ssomsgtype}"; ar ssomsgonly="#{ssomsgonly}"; 8. If you modify the change password.html file, create a copy of the \install_dir\signon directory. Making a copy of the directory preents the custom attributes from being oerwritten if you upgrade the software or apply a patch. 118 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
127 Chapter 56. Customize the Logout Page About this task The default Logout page is a simple page with no logo information. You can configure Sterling Secure Proxy to use the Login page in place of the Logout page. You can customize the Logout page to define how you want the page to look and what information to include on the page. You customize this page by modifying the labels or replacing the entire page. Before you modify the Logout page, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name Name to assign to the Sterling Secure Proxy configuration Sterling Secure Proxy Internal Portal Logout Page Custom page to display for the Sterling Secure Proxy single sign-on Logout page. If you want to use the Login page as the Logout page, specify the Login page here. Login Directory Name Custom directory in the engine installation directory where the HTML files that support single sign-on are stored. Login Page Charset Character encoding used to create the Sterling Secure Proxy Login page. This alue is sent to the browser as part of the content-type header with the Login page. Login Page Media Type Media type alue sent to the browser in the content-type header with the Login page. Default is text/html. To customize the Sterling Secure Proxy Logout page: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions>New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. On the Logon Portal tab, select SSP Internal Portal. Copyright IBM Corp. 2006,
128 5. Change one or more of the following fields to customize the Logout page: Logout Password Page Login Directory Name Login Page Charset Login Page Media Type 6. Click Sae. 7. If you want to change the text or graphics on the Logout page, open the \install_dir\signon directory and modify the logout.html file as required. Note: If you modify the logout.html file, do not modify the following lines: ar ssomsgtext="#{ssomsgtext}"; ar ssomsgtitle="#{ssomsgtitle}"; ar ssomsgtype="#{ssomsgtype}"; ar ssomsgonly="#{ssomsgonly}"; 8. If you modify the logout.html file, create a copy of the \install_dir\signon directory. Making a copy of the directory preents the custom attributes from being oerwritten if you upgrade the software or apply a patch. 120 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
129 Chapter 57. Customize Password Policy Page The Password Policy page is a simple page with no logo information that displays the password policy. Sterling Secure Proxy obtains the password policy dynamically from Actie Directory or IBM Tioli using Sterling External Authentication Serer. If you update the password policy, the Password Policy page displays the new password policy. Copyright IBM Corp. 2006,
130 122 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
131 Chapter 58. Customize User Messages About this task You can customize user messages that display on the Logon Portal pages. You customize these messages by modifying the messagebundle.properties file, located in the Signon/resources directory. By default, messages are associated with specific eents. For example, if a logon attempt fails because the user password has expired, the logon page displays a message alerting the user that the password has expired. For security reasons, you might use the same general error message for all logon failures. To customize user messages: Procedure 1. From the SSP_install_dir\Signon\resources directory, open the messagebundle.properties file in a text editor. 2. Modify the message text for all user messages you want to customize. 3. Sae the messagebundle.properties file. 4. Restart Sterling Secure Proxy. Copyright IBM Corp. 2006,
132 124 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
133 Chapter 59. Configure the Forgot Your User ID or Password Page About this task You can configure the Forgot Your User ID or Password page to display a customized user message. You customize this user message by editing the Login page.html file. Procedure 1. To customize the Forgot Your User ID or Password page, open the \install_dir\signon directory and modify the login.html file as required. Note: If you modify the login.html file, do not modify the following lines: ar ssomsgtext= #{ssomsgtext} ; ar ssomsgtitle= #{ssomsgtitle} ; ar ssomsgtype= #{ssomsgtype} ; ar ssomsgonly= #{ssomsgonly} ; 2. If you modify the logout.html file, create a copy of the \install_dir\signon directory. Making a copy of the directory preents the custom attributes from being oerwritten if you upgrade the software or apply a patch. Copyright IBM Corp. 2006,
134 126 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
135 Chapter 60. Configure Sterling Secure Proxy to Use External Logon Portal About this task You can configure Sterling Secure Proxy to use an external logon portal. Before you configure an external logon portal, gather the following information: Proide a alue for each Sterling Secure Proxy feature listed. Fields listed in the worksheet are required. Accept default alues for fields not listed. Note the Configuration Manager field where you will specify the alue. Configuration Manager Field Feature Value Name External Portal External Application Login URL Name to assign to the Sterling Secure Proxy configuration URL of external login portal. To configure Sterling Secure Proxy to use the external logon portal: Procedure 1. Click Adanced from the menu bar. 2. To create a new SSO configuration: a. Click Actions > New SSO Configuration. b. Type an SSO configuration name in the Name field. 3. To edit an existing SSO configuration: a. From the naigation menu, click SSO Configurations. b. Click the configuration to modify. 4. On the Logon Portal tab, select External Portal. 5. Type the URL of the external login portal in the External Application Login URL field. 6. Click Sae. Copyright IBM Corp. 2006,
136 128 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
137 Notices This information was deeloped for products and serices offered in the U.S.A. IBM may not offer the products, serices, or features discussed in this document in other countries. Consult your local IBM representatie for information on the products and serices currently aailable in your area. Any reference to an IBM product, program, or serice is not intended to state or imply that only that IBM product, program, or serice may be used. Any functionally equialent product, program, or serice that does not infringe any IBM intellectual property right may be used instead. Howeer, it is the user's responsibility to ealuate and erify the operation of any non-ibm product, program, or serice. IBM may hae patents or pending patent applications coering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drie Armonk, NY U.S.A. For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan Ltd , Shimotsuruma, Yamato-shi Kanagawa Japan The following paragraph does not apply to the United Kingdom or any other country where such proisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be Copyright IBM Corp. 2006,
138 incorporated in new editions of the publication. IBM may make improements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are proided for conenience only and do not in any manner sere as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it beliees appropriate without incurring any obligation to you. Licensees of this program who wish to hae information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation J46A/G4 555 Bailey Aenue San Jose, CA U.S.A. Such information may be aailable, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material aailable for it are proided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equialent agreement between us. Any performance data contained herein was determined in a controlled enironment. Therefore, the results obtained in other operating enironments may ary significantly. Some measurements may hae been made on deelopment-leel systems and there is no guarantee that these measurements will be the same on generally aailable systems. Furthermore, some measurements may hae been estimated through extrapolation. Actual results may ary. Users of this document should erify the applicable data for their specific enironment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly aailable sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objecties only. All IBM prices shown are IBM's suggested retail prices, are current and are subject to change without notice. Dealer prices may ary. 130 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
139 This information is for planning purposes only. The information herein is subject to change before the products described become aailable. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of indiiduals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on arious operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of deeloping, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples hae not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, sericeability, or function of these programs. The sample programs are proided "AS IS", without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs. Each copy or any portion of these sample programs or any deriatie work, must include a copyright notice as follows: IBM Portions of this code are deried from IBM Corp. Sample Programs. Copyright IBM Corp If you are iewing this information softcopy, the photographs and color illustrations may not appear. Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and serice names might be trademarks of IBM or other companies. A current list of IBM trademarks is aailable on the Web at Copyright and trademark information at Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Goernment Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Toralds in the United States, other countries, or both. Notices 131
140 Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Goernment Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Jaa and all Jaa-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium and the Ultrium Logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. Connect Control Center, Connect:Direct, Connect:Enterprise, Gentran, Gentran :Basic, Gentran:Control, Gentran:Director, Gentran:Plus, Gentran:Realtime, Gentran:Serer, Gentran:Viewpoint, Sterling Commerce, Sterling Information Broker, and Sterling Integrator are trademarks or registered trademarks of Sterling Commerce, Inc., an IBM Company. Other company, product, and serice names may be trademarks or serice marks of others. 132 Sterling Secure Proxy: Reerse Proxy Scenarios for Single Sign-On
141
142 Printed in USA
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
ERserver. Single signon. iseries. Version 5 Release 3
ERserer iseries Single signon Version 5 Release 3 ERserer iseries Single signon Version 5 Release 3 Note Before using this information and the product it supports, be sure to read the information in Notices,
Tivoli Integrated Portal Administration and configuration guide. Version 1.0 Tivoli Integrated Portal 2.2
Tioli Integrated Portal Administration and configuration guide Version 1.0 Tioli Integrated Portal 2.2 Tioli Integrated Portal Administration and configuration guide Version 1.0 Tioli Integrated Portal
IBM Universal Behavior Exchange Toolkit Release 16.1.2 April 8, 2016. User's Guide IBM
IBM Uniersal Behaior Exchange Toolkit Release 16.1.2 April 8, 2016 User's Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 39. This document
IBM Unica Marketing Platform Version 8 Release 5 June 1, 2012. Administrator's Guide
IBM Unica Marketing Platform Version 8 Release 5 June 1, 2012 Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 449. This edition
ERserver. iseries. Service tools
ERserer iseries Serice tools ERserer iseries Serice tools Copyright International Business Machines Corporation 2002. All rights resered. US Goernment Users Restricted Rights Use, duplication or disclosure
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference
IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference IBM Tioli Monitoring Version 6.3 Fix Pack 2 Windows OS Agent Reference Note Before using this information and the product it supports,
AS/400e. Networking PPP connections
AS/400e Networking PPP connections AS/400e Networking PPP connections Copyright International Business Machines Corporation 1998, 2000. All rights resered. US Goernment Users Restricted Rights Use, duplication
Version 9 Release 1.2 September 23, 2015. IBM Campaign Installation Guide IBM
Version 9 Release 1.2 September 23, 2015 IBM Campaign Installation Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 115. This edition applies
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Business Intelligence Guide
Sterling Call Center and Sterling Store Business Intelligence Guide Release 9.1.0.10 Sterling Call Center and Sterling Store Business Intelligence Guide Release 9.1.0.10 Note Before using this information
IBM Tivoli Netcool Performance Manager Wireline Component January 2012 Document Revision R2E1. Pack Upgrade Guide
IBM Tioli Netcool Performance Manager Wireline Component January 2012 Document Reision R2E1 Pack Upgrade Guide Note Before using this information and the product it supports, read the information in Notices
IBM Sterling Gentran Server for Windows. Quick Start Guide. Version 5.3.1
IBM Sterling Gentran Serer for Windows Quick Start Guide Version 5.3.1 IBM Sterling Gentran Serer for Windows Quick Start Guide Version 5.3.1 This edition applies to the 5.3.1 ersion of IBM Sterling Gentran:Serer
Oracle Cloud E54561-04
Oracle Cloud Known Issues for Trial and Paid Subscriptions Release 15.3 E54561-04 August 2015 Documentation for Oracle Cloud administrators that lists the known issues related to subscription of Oracle
IBM Sterling Connect:Direct Secure Plus for UNIX. Implementation Guide. Version 4.1
IBM Sterling Connect:Direct Secure Plus for UNIX Implementation Guide Version 4.1 IBM Sterling Connect:Direct Secure Plus for UNIX Implementation Guide Version 4.1 Note Before using this information and
ERserver. iseries. Digital certificate management
ERserer iseries Digital certificate management ERserer iseries Digital certificate management ii iseries: Digital certificate management Contents Part 1. Digital certificate management.....................
ERserver. iseries. Networking Security IP filtering and network address translation (NAT)
ERserer iseries Networking Security IP filtering and network address translation (NAT) ERserer iseries Networking Security IP filtering and network address translation (NAT) Copyright International Business
IBM Unica Leads Version 8 Release 5 December 2, 2011. Installation Guide
IBM Unica Leads Version 8 Release 5 December 2, 2011 Installation Guide Note Before using this information and the product it supports, read the information in Notices on page 61. This edition applies
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
Lightweight Directory Access Protocol. BladeCenter Management Module and IBM Remote Supervisor Adapters
Lightweight Directory Access Protocol User s Guide for IBM ERserer BladeCenter Management Module and IBM Remote Superisor Adapters Lightweight Directory Access Protocol User s Guide for IBM ERserer BladeCenter
Installation and Configuration Guide
IBM Tioli Storage Productiity Center Version 5.2 Installation and Configuration Guide SC27-4058-01 IBM Tioli Storage Productiity Center Version 5.2 Installation and Configuration Guide SC27-4058-01 Note:
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
AS/400e. Digital Certificate Management
AS/400e Digital Certificate Management AS/400e Digital Certificate Management ii AS/400e: Digital Certificate Management Contents Part 1. Digital Certificate Management............ 1 Chapter 1. Print
Password Synchronization for Active Directory Plug-in Installation and Configuration Guide
Tioli Identity Manager Version 5.1 Password Synchronization for Actie Directory Plug-in Installation and Configuration Guide SC23-9622-00 Tioli Identity Manager Version 5.1 Password Synchronization for
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
IBM Unica Campaign Version 8 Release 6 May 25, 2012. Data Migration Guide
IBM Unica Campaign Version 8 Release 6 May 25, 2012 Data Migration Guide Note Before using this information and the product it supports, read the information in Notices on page 49. This edition applies
IBM InfoSphere Master Data Management Standard and Advanced Editions Version 11 Release 3. Installation Guide GI13-2658-01
IBM InfoSphere Master Data Management Standard and Adanced Editions Version 11 Release 3 Installation Guide GI13-2658-01 IBM InfoSphere Master Data Management Standard and Adanced Editions Version 11
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. [email protected]
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. [email protected] Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Tivoli Identity Manager Server
Tioli Identity Manager Serer Version 5.1 Installation and Configuration Guide SC27-2410-01 Tioli Identity Manager Serer Version 5.1 Installation and Configuration Guide SC27-2410-01 Note: Before using
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Sterling Call Center. Implementation Guide. Release 9.2
Sterling Call Center Implementation Guide Release 9.2 Sterling Call Center Implementation Guide Release 9.2 Note Before using this information and the product it supports, read the information in Notices
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version 2.4.0. User Guide GC27-3909-11
IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version 2.4.0 User Guide GC27-3909-11 Note Before using this document and the product it supports, read the information
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Lotus. Notes Version 8.5.2. Lotus Notes Traveler
Lotus Notes Version 8.5.2 Lotus Notes Traeler Lotus Notes Version 8.5.2 Lotus Notes Traeler Note Before using this information and the product it supports, read the information in the Notices section.
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
iseries Virtual private networking
iseries Virtual priate networking iseries Virtual priate networking Copyright International Business Machines Corporation 1998, 2001. All rights resered. US Goernment Users Restricted Rights Use, duplication
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Load Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
Lotus Sametime. FIPS Support for IBM Lotus Sametime 8.0. Version 8.0 SC23-8760-00
Lotus Sametime Version 8.0 FIPS Support for IBM Lotus Sametime 8.0 SC23-8760-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.
Sametime Version 9 Integration Guide Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.1 Edition Notice Note: Before using this information and the product it
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
IBM Tealeaf CX Version 9 Release 0.2 June 18, 2015. Tealeaf Databases Guide
IBM Tealeaf CX Version 9 Release 0.2 June 18, 2015 Tealeaf Databases Guide Note Before using this information and the product it supports, read the information in Notices on page 111. This edition applies
Tivoli Security Compliance Manager
Tioli Security Compliance Manager Version 5.1 Tioli Risk Manager Adapter Guide Tioli Security Compliance Manager Version 5.1 Tioli Risk Manager Adapter Guide Note Before using this information and the
IBM Unica Marketing Operations and Campaign Version 8 Release 6 May 25, 2012. Integration Guide
IBM Unica Marketing Operations and Campaign Version 8 Release 6 May 25, 2012 Integration Guide Note Before using this information and the product it supports, read the information in Notices on page 51.
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any
Deploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
8.7. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents
NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.7 Contents Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA Table of Contents Table of Contents Introducing the F5 Deployment Guide for SAP NetWeaver and Enterprise SOA Prerequisites and configuration
IBM EMM Reports Version 9 Release 1.1 November 26, 2014. Installation and Configuration Guide
IBM EMM Reports Version 9 Release 1.1 Noember 26, 2014 Installation and Configuration Guide Note Before using this information and the product it supports, read the information in Notices on page 161.
ERserver. iseries. Backup, Recovery and Media Services (BRMS)
ERserer iseries Backup, Recoery and Media Serices (BRMS) ERserer iseries Backup, Recoery and Media Serices (BRMS) Copyright International Business Machines Corporation 1998, 2002. All rights resered.
Remote Supervisor Adapter II. Installation Instructions for Linux Users
Remote Superisor Adapter II Installation Instructions for Linux Users Remote Superisor Adapter II Installation Instructions for Linux Users Third Edition (October 2003) Copyright International Business
DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
SmartCloud Notes. Administering SmartCloud Notes: Service-only Environment March 2015
SmartCloud Notes Administering SmartCloud Notes: Serice-only Enironment March 2015 SmartCloud Notes Administering SmartCloud Notes: Serice-only Enironment March 2015 Note Before using this information
How To Set Up An Ops Console On A Pc Or Mac Or Macbook
ERserer iseries iseries Access for Windows Operations Console ERserer iseries iseries Access for Windows Operations Console Copyright International Business Machines Corporation 2002, 2003. All rights
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
Deploying the BIG-IP System v10 with Oracle Application Server 10g R2
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
How to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
IBM SmartCloud Monitoring - Application Insight. User Interface Help SC27-5618-01
IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 IBM SmartCloud Monitoring - Application Insight User Interface Help SC27-5618-01 ii IBM SmartCloud Monitoring - Application
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Integrating WebSphere Portal V8.0 with Business Process Manager V8.0
2012 Integrating WebSphere Portal V8.0 with Business Process Manager V8.0 WebSphere Portal & BPM Services [Page 2 of 51] CONTENTS CONTENTS... 2 1. DOCUMENT INFORMATION... 4 1.1 1.2 2. INTRODUCTION... 5
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Deploying the BIG-IP LTM System and Microsoft Outlook Web Access
Deployment Guide Deploying the BIG-IP LTM System with Microsoft Outlook Web Access Deploying the BIG-IP LTM System and Microsoft Outlook Web Access Welcome to the BIG-IP LTM system - Microsoft Outlook
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
Working Folder Linkage Setup Guide
For models listed below, see the respective "Working Foloder Linkage Setup Guide". wfs-mfp-installguide-09_en.pdf - ApeosPort-IV C5570/C4470/C3371/C3370/C2270 - ApeosPort-IV C7780/C6680/C5580 - ApeosPort-IV
KeyControl Installation on Amazon Web Services
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
PowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
