Exit Print View

Oracle Secure Global Desktop Gateway Administration Guide for Version 4.6

Document Information

Preface

1.  Installing the SGD Gateway

2.  Configuring the SGD Gateway

A.  SGD Gateway Architecture Overview

SGD Gateway Architecture

Components of the SGD Gateway

About Routing Tokens

Keystores Used By the SGD Gateway

Routing Proxy Configuration File

Apache Web Server Configuration Files

Configuring Reverse Proxying and Load Balancing

Apache Modules Used by the SGD Gateway

B.  Command-Line Reference

C.  Advanced Configuration

D.  Troubleshooting the SGD Gateway

Components of the SGD Gateway

The SGD Gateway consists of the following components:

About Routing Tokens

The SGD Gateway uses a routing token to manage an AIP connection. A routing token is a signed, encrypted message which identifies the origin and destination SGD server for a route. The routing token includes a time stamp, which is used to limit the token lifetime.

Outgoing routing tokens are:

Incoming routing tokens are:

Keystores Used By the SGD Gateway

The SGD Gateway uses private keys and certificates to digitally sign and verify routing tokens, to secure connections to the SGD servers in the array, to secure client connections to the SGD Gateway, and to authorize access to the reflection service.

The certificates and private keys used by the SGD Gateway are stored in keystores in the /opt/SUNWsgdg/proxy/etc directory.

This directory contains the following keystores:

The keystores are created automatically when you run the gateway setup command after installing the SGD Gateway.


Note - All keystores use the same password, which is defined in the /opt/SUNWsgdg/etc/password file. The password is a random password created automatically when the keystores are first created. The password file is only readable by superuser (root).


Routing Proxy Configuration File

The routing proxy configuration file is /opt/SUNWsgdg/etc/gateway.xml. This is an XML file that configures routes, depending on the data protocol type. The file also configures the keystore locations and passwords required for routing and SSL protocols.

The routing proxy configuration file is created automatically when you install the SGD Gateway and is updated when you use the gateway config commands to change the configuration of the SGD Gateway.


Caution

Caution - Do not edit the gateway.xml file manually. Incorrect configuration in this file might cause the SGD Gateway to stop working.


The default routing proxy configuration file uses the password in the /opt/SUNWsgdg/etc/password file to access the keystores used by the SGD Gateway. If you do not want to store this password on disk, make a note of the entry in the password file. Delete the password file, and delete the password entries for all <keystore> elements in the gateway.xml file. You are then prompted for the keystore password when you next start the SGD Gateway.

To change the password for a keystore used by the SGD Gateway, use the -storepasswd option of the keytool command. For example, to change the password for the keystore.client keystore run the following command:

# /opt/SUNWsgdg/java/default/bin/keytool -storepasswd \
-keystore /opt/SUNWsgdg/proxy/etc/keystore.client 

Note - The /opt/SUNWsgdg/etc directory also contains other .xml and .template files. These files are used internally by the gateway config command to update the gateway.xml file. Do not edit these files manually.


Apache Web Server Configuration Files

Configuration files for the Apache web server configured for use with the SGD Gateway are in the /opt/SUNWsgdg/httpd/apache-version/conf directory.

The configuration files in this directory are used to configure reverse proxy operation and load balancing for the Apache web server.

Configuring Reverse Proxying and Load Balancing

Files for configuring reverse proxy operation and load balancing are in the extra/gateway subdirectory. These files are enabled by the following Include directive in the main httpd.conf file:

# SGD Reverse Proxy/Load Balance settings
Include conf/extra/gateway/httpd-gateway.conf

The httpd-gateway.conf file configures reverse proxying and load balancing for the Apache web server. The members of the load balancing group are defined using an Include directive in the httpd-gateway.conf file, as follows:

<Proxy Balancer://mysgdservers/>
Include conf/extra/gateway/servers/*.conf
</Proxy>

The extra/gateway/servers directory contains configuration files for each of the SGD web servers in the load balancing group. The configuration files are named server-name.conf, where server-name is the server name used in the gateway server add command. See gateway server add for more details about this command.

The SGD Gateway uses sticky session HTTP load balancing. This means that the Apache reverse proxy sets a cookie in the client browser, to ensure that the browser always returns to the SGD web server that was selected by load balancing. The cookie expires at the end of the user session.

Sticky session cookies are enabled by the Header add Set-Cookie directive in the httpd-gateway.conf file, as follows:

Header add Set-Cookie "BALANCEID=balanceworker.%{BALANCER_WORKER_ROUTE}e; path=/" env=BALANCER_ROUTE_CHANGED

where BALANCEID is the name of the cookie, and BALANCER_WORKER_ROUTE and BALANCER_ROUTE_CHANGED are environment variables exported by the Apache mod_proxy_balancer module. See the Apache mod_proxy_balancer documentation for more information about these environment variables.

Apache Modules Used by the SGD Gateway

The Apache web server supplied with the SGD Gateway uses the standard Apache modules for reverse proxying and load balancing. The modules are installed as Dynamic Shared Object (DSO) modules.

The modules are enabled by LoadModule directives in the httpd.conf Apache configuration file, at /opt/SUNWsgdg/httpd/apache-version/conf/httpd.conf.