User manual NOVELL ACCESS MANAGER 3.1 SP3 GATEWAY GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual NOVELL ACCESS MANAGER. We hope that this NOVELL ACCESS MANAGER user guide will be useful to you.


NOVELL ACCESS MANAGER 3.1 SP3 GATEWAY GUIDE: Download the complete user guide (5351 Ko)

Manual abstract: user guide NOVELL ACCESS MANAGER3.1 SP3 GATEWAY GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] novdocx (en) 16 April 2010 AUTHORIZED DOCUMENTATION Access Gateway Guide Novell® 3. 1 SP3 February 02, 2011 Access Manager www. novell. com Novell Access Manager 3. 1 SP3 Access Gateway Guide novdocx (en) 16 April 2010 Legal Notices Novell, Inc. , makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. , reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. , makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. , reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. [. . . ] This verification is done even when other proxy services are set to Do not verify. If the Web server certificate is part of a chain of certificates, you need to enable the SSLProxyVerifyDepth option and specify how many certificates are in the chain. For more information about this option, see Section 1. 2. 3, "Configuring Advanced Options for a Domain-Based Proxy Service, " on page 21. The auto import screen appears. If the Access Gateway is a member of a cluster, the cluster members are listed. The Web server certificate is imported into the trust stores of each cluster member. 3c Ensure that the IP address of the Web server and the port match your Web server configuration. If these values are wrong, you have entered them incorrectly on the Web server page. The server certificate, the Root CA certificate, and any certificate authority (CA) certificates from a chain are listed. A parent is missing if the chain does not include a certificate where the Subject and the Issuer have the same CN. 3e Specify an alias, then click OK. 126 Novell Access Manager 3. 1 SP3 Access Gateway Guide novdocx (en) 16 April 2010 All the displayed certificates are added to the trust store. 4 (Optional) Set up mutual authentication so that the Web server can verify the proxy service certificate: 4a Click the Select Certificate icon, 4b Select the certificate you created for the reverse proxy, then click OK. You need to import the trusted root certificate of the CA that signed the proxy service's certificate to the Web servers assigned to this proxy service. 5 In the Connect Port field, specify the port that your Web server uses for SSL communication. The following table lists some common servers and their default ports. Server Type Non-Secure Port Secure Port Web server with HTML content SSL VPN WebSphere JBoss 80 8080 9080 8080 443 8443 9443 8443 6 To save your changes to browser cache, click OK. 7 To apply your changes, click the Access Gateways link, then click Update > OK. 3. 5 Enabling Secure Cookies The Access Gateway and the Embedded Service Provider of the Access Gateway both use session cookies in their communication with the browser. The following sections explain how to protect these cookies from being intercepted by hackers. Section 3. 5. 1, "Securing the Embedded Service Provider Session Cookie, " on page 127 Section 3. 5. 2, "Securing the Proxy Session Cookie, " on page 129 For more information about making cookies secure, see the following documents: Secure attribute for cookies in RFC 2965 (http://www. faqs. org/rfcs/rfc2965. html) HTTP-only cookies (http://msdn. microsoft. com/en-us/library/ms533046. aspx) 3. 5. 1 Securing the Embedded Service Provider Session Cookie An attacker can spoof a non-secure browser into sending a JSESSION cookie that contains a valid user session. This might happen because the Access Gateway communicates with its Embedded Service Provider on port 8080, which is a non-secure connection. Because the Embedded Service Provider does not know whether the Access Gateway is using SSL to communicate with the browsers, the Embedded Service Provider does not mark the JSESSION cookie as secure when it creates the cookie. The Access Gateway receives the Set-Cookie header from the Embedded Service Provider and passes it back to the browser, which means that there is a non-secure, clear-text cookie in the browser. If an attacker spoofs the domain of the Access Gateway, the browser sends the nonsecure JSESSION cookie over a non-secure channel where the cookie might be sniffed. Configuring the Access Gateway for SSL and Other Security Features 127 novdocx (en) 16 April 2010 To stop this from happening, you must first configure Access Gateway to use SSL. See Section 3. 3, "Configuring SSL Communication with the Browsers and the Identity Server, " on page 122. [. . . ] If the protected resource has been assigned a contract, the Access Gateway continues with the task in decision point 8. For a user to gain access to a resource protected by a contract, the user must have authenticated with that contract, or if the contract is configured for it, the user can authenticate with another contract as long as the contract is of a equal or higher level. If the user is authenticated with the required contract, the Access Gateway is finished with its authentication checks and continues with policy evaluation. If the user is not authenticated with the required contract, the Access Gateway continues with the task in decision point 9. 278 Novell Access Manager 3. 1 SP3 Access Gateway Guide novdocx (en) 16 April 2010 Before the user is prompted for credentials, the Access Gateway needs to know whether the protected resource has been enabled for non-redirected login (NRL). [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE NOVELL ACCESS MANAGER




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual NOVELL ACCESS MANAGER will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.