HOB WSP Web-Server-Gate Secure Access for Mobile Users and Business Partners to Enterprise Web Servers



Similar documents
HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network

Secure Business Connectivity HOB RD VPN. Centrally Stored Data and Applications, Anytime and Anywhere. Edition 05 14

Secure Business Connectivity HOB RD VPN 1.4. Central Data and Applications on Demand. Flexible, Secure, Cost-Effective.

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

HOB WebSecureProxy as an SSL Terminal for Clients

Clientless SSL VPN End User Set-up

VPN Web Portal Usage Guide

HOBCOM and HOBLink J-Term

Apache Server Implementation Guide

Filtering remote users with Websense remote filtering software v7.6

If you have questions or find errors in the guide, please, contact us under the following address:

Exploiting the Web with Tivoli Storage Manager

BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios

HOB Remote Desktop Selector

MIGRATION GUIDE. Authentication Server

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Raptor Firewall Products

SSL SSL VPN

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Mobile Admin Architecture

RSA AUTHENTICATION AGENT SUPPORTED PLATFORMS

MQ Authenticate User Security Exit Overview

Clientless SSL VPN Users

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin

Copyright

ArcSDE Oracle Database Requirements

Instructions for Using Secure . (SMail) via Outlook Web Access. with an RSA Token

REMOTE ACCESS USER GUIDE

Lotus Domino Security

OVERVIEW. DIGIPASS Authentication for Office 365

Identikey Server Product Guide

Oracle Access Manager

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

IDENTIKEY Server Product Guide

Please return this document to when complete.

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda SSL VPN Administrator s Guide

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

Citrix Access on SonicWALL SSL VPN

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Configuration Guide BES12. Version 12.2

DMZ Gateways: Secret Weapons for Data Security

Cisco Secure Access Control Server 4.2 for Windows

IDENTIKEY Appliance Administrator Guide

How to Configure Active Directory based User Authentication

Access Your Cisco Smart Storage Remotely Via WebDAV

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix Access Gateway

CUSTOMER Android for Work Quick Start Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

Two-Factor Authentication

Network Configuration Settings

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

A Guide to New Features in Propalms OneGate 4.0

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

RSA SecurID Ready Implementation Guide

Ignify ecommerce. Item Requirements Notes

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Hosted Microsoft Exchange Client Setup & Guide Book

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

RSA Authentication Manager 7.0 Planning Guide

WatchGuard Certified Training Partner (WCTP) Program

DIGIPASS Authentication for GajShield GS Series

Installing the IPSecuritas IPSec Client

SAP Single Sign-On 2.0 Overview Presentation

Alliance Key Manager A Solution Brief for Technical Implementers

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

The Bomgar Appliance in the Network

Interwise Connect. Working with Reverse Proxy Version 7.x

SonicWALL SSL VPN 3.5 User s Guide

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

WatchGuard Certified Training Partner (WCTP) Program

Xerox DocuShare Security Features. Security White Paper

Hosted Microsoft Exchange Client Setup & Guide Book

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

THE OPEN UNIVERSITY OF TANZANIA

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License

FAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:

SOSFTP Managed File Transfer

SonicWALL SSL VPN 5.0 User s Guide

LET S GET PREPARED FOR YOUR ONLINE CLASSES! FIRST LETS SEE WHAT TO EXPECT & SECOND, WE LL RUN A TEST LOGIN

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Creating a User Profile for Outlook 2013

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Advanced Administration

BlackBerry Enterprise Server for IBM Lotus Domino Version: 4.1 Service Pack: 7. Installation Guide

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

v6.1 Websense Enterprise Reporting Administrator s Guide

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

EURECOM VPN SSL for students User s guide

Transcription:

HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hobsoft.com HOB WSP Web-Server-Gate Secure Access for Mobile Users and Business Partners to Enterprise Web Servers March 2010

HOB WSP Web-Server-Gate With the HOB WSP Web-Server-Gate (WSG), HOB provides secure remote access over the Internet to enterprise Webpages behind the firewall. This gives employees the opportunity to remotely access Web-based enterprise services. For example, salespeople can remotely query customer data in the central office, work with their SAP system over a Web browser or retrieve new information from the Intranet. E-mail queries via the Outlook Web Access front end of the MS Exchange Server are also possible. The Web-based software design from HOB makes this possible from all Internet-capable computers, without the need of any local installation. Security The WSG supports a variety of authentication methods for different security requirements: User name / Password Token-based authentication (One Time Password) Strong authentication via a small hardware token, e.g., RSA SecurID, Vasco DIGIPASS Certificate-based authentication Strong authentication via a client-side certificate, preferably stored on a SmartCard The HOB WSP Web-Server-Gate supports any authentication server that uses RADIUS. The WSG is best placed behind the first firewall, in the DMZ. External access to internal enterprise Web- or application-servers can be carried out only over the WSG. Therefore, these servers are protected from anonymous access. The connection between users and the WSG is also usually secured via HTTPS; hereby HTTPS need not be available on the target system. Of course, HTTPS-capable target systems can also be accessed. An included target filter can be used to limit access to particular internal or external Websites, or to specifically enable them. This is done using either the domain name or the target IP address. In addition to accessing internal enterprise Websites, employees can, for example, access authorized external Websites, e.g., a bank for accounting purposes. 2

HOB WSP Web-Server-Gate Method of Operation Distinguishing itself from other proxy solutions on the market, HOB s WSG is easy to configure. The WSG performs a complete analysis of the HTML and JavaScript source codes. To initiate access to an enterprise-internal Website, the user connects to the WSG s publicly available target address (e.g.: https://www.mycompany.tld). After successfully logging in, the user can either access bookmarked target addresses in the browser window, or enter an address in the URL input field. Input interface in Web browser 3

After making your selection, the desired Website opens in the browser window. The browser s address bar displays the URL as follows: https://www.my-company.tld/http://www.target-address.tld (tld = Top level domain) The segment of the address appended to my-company.tld/ is the actual target address. As you can see from the URL, the data exchange between the user and WSG is encrypted with HTTPS. Further functionalities of the Website require that the WSG alter the links contained therein. The following URL must be prefixed to every link: https://www.my-company.tld/http://www. target-address.tld/ For example: <a href="http://www. target-address.tld/link.html">link</a> or <a href="link.html">link</a> (relative link within the target page) becomes: <a href="https://www.my-company.tld/http://www. targetaddress.tld/link.html">link</a> In the simplest case (when HTML links are being used), this does not create much of a problem. Here, only the assignment of href need be found and altered. Finding links is more difficult when JavaScript is being used. In such cases, links may be dynamically generated in the Web browser. The example below shows the JavaScript code of a popular Internet news service. The HTML link is generated in the browser after the JavaScript code is interpreted: document.write('<a href="/page/2_05.html?mod='+random+'" class="text">test</a>') The variable Random is filled during the JavaScript runtime in the user s browser. If the value of this variable depends on clientspecific factors (e.g., screen resolution, OS, etc.), then the HOB WSP Web-Server-Gate cannot ascertain the value. This represents a limit to the link finding capability. 4

The HOB WSP Web-Server-Gate provides users with easy and secure access to enterprise-internal Web pages and browserbased services. On the user s end, no installation of additional software is required. A plus for administrators, HOB WSP Web- Server-Gate requires very little administrative work and provides great freedom in the selection of the operating system, as it is available for numerous platforms: Microsoft Windows (x86, EM64T, Itanium) Linux (x86, EM64T, Itanium) Sun Solaris (Sparc, EM64T) HP-UX (PA-Risc, Itanium) IBM AIX The easy configurability of the HOB WSP Web-Server-Gate results from its ability to interpret standard HTML- and JavaScript-code in Web pages. Further information on HOB RD VPN and/or HOB WebSecureProxy can be found on the HOB Website (www.hobsoft.com). HOB GmbH & Co. KG March 2010 5