Sun ONE logo      Previous      Contents      Index      Next     

Sun ONE Portal Server, Secure Remote Access 6.1 Administrator's Guide

Chapter 2
Administering the Gateway

This chapter describes gateway related concepts, and all the basic configurations required for the smooth running of the gateway. This chapter covers all the attributes in the gateway service.

This chapter covers the following topics:


Overview of the Gateway

The gateway provides the interface and security barrier between remote user sessions originating from the Internet, and your corporate intranet. The gateway presents content securely from internal web servers and application servers through a single interface to a remote user.


Creating a Gateway Profile

A gateway profile contains all the information related to gateway configuration, such as the port on which the gateway listens, SSL options, and proxy options.

When you install a gateway, if you choose the default values, a profile called "default" is created. A configuration file corresponding to the default profile exists at:

/etc/opt/SUNWps/platform.conf.default

where /etc/opt/SUNWps is the default location for all the platform.conf.* files.

See "Understanding the platform.conf File" for more information on the contents of the platform.conf file.

You can create multiple profiles, define attributes for each profile, and assign these profiles to different gateways as required. You can:

    To Create a Gateway Profile
  1. Log in to the Sun™ ONE Identity Server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays in the right pane.

  5. Click New.
  6. The Create New Gateway Profile page displays.

  7. Specify a name for the new profile in the "Enter the name of new Gateway Profile" field.
  8. Select the profile to use for creating the new profile, from the "Copy the existing configuration of" drop-down list.
  9. By default, any new profile that you create is based on the pre-packaged "default" profile. If you have created any custom profile, you can select that profile from the drop-down list. The new profile inherits all the attributes of the selected profile.

  10. Click Create.
  11. The new profile is created and you are returned to the Gateway page, in which the new profile is listed.

    See "Configuring the Gateway Attributes" to configure individual gateway attributes.

  12. Restart the gateway with this profile name if you want the changes to take effect. See "Restarting the Gateway" for more information.


Starting and Stopping the Gateway

By default, the gateway starts as user noaccess.

    To Start the Gateway

After installing the gateway and creating the required profile, run the following command to start the gateway:

InstallDir/SUNWps/bin/gateway -n default start

default is the default gateway profile that is created during installation. You can create your own profiles later, and restart the gateway with the new profile. See "Creating a Gateway Profile".

If you have multiple gateway instances, use:

InstallDir/SUNWps/bin/gateway start

This command starts all the gateway instances configured on that particular machine.


Note

Restarting the server (the machine on which you have configured instances of the gateway) restarts all configured instances of the gateway.

Ensure that there are no old or backed up profiles in the /etc/opt/SUNWps directory.


Run the following command to check if the gateway is running on the specified port:

netstat -a | grep port_number

The default gateway port is 443.

    To Stop the Gateway

InstallDir/SUNWps/bin/gateway -n new_ profile_name stop

If you have multiple gateway instances, use:

InstallDir/SUNWps/bin/gateway stop

This command stops all the gateway instances that are running on that particular machine.


Creating Multiple Instances of a Gateway

Use the script gwmultiinstance to create a new instance of the gateway. You can create a new instance in the following scenarios:

Creating a New Instance on a Portal Server Node

  1. Login as root and navigate to the following directory:
  2. InstallDir/SUNWps/bin

  3. Run the multi instance script:
  4. ./gwmultiinstance

Table 2-1 lists the questions that the script asks. S

Table 2-1  Checklist for Creating a New Gateway Instance on a Portal Server Node  

Parameter

Default Value

Description

New gateway uses portal server instance running on this node

y

The script detects an existing instance of the portal server and asks this question.

Specify y if you want the gateway to run with the portal server instance on the same node.

Choose n if you want to use a different instance of the portal server.

In this case, the "Creating a New Instance on a Separate Node" checklist applies.

Portal server instance is the default one created during installation

y

Specify which instance of the portal server you want the new gateway instance to work with.

If you choose y, the default portal server instance that is created during installation is used with the new gateway.

If you choose n, you will be asked to specify the name of the required portal server instance.

New portal server instance created

y

This question is asked only if you have chosen not to use the default portal server instance.

Specify whether the portal server instance that you want to use with your new gateway instance has already been created.

If you choose n, you are asked to create the instance first, and the script aborts.

Name of the new portal server instance

portal server instance name

This question is asked only if you have chosen not to use the default portal server instance.

Specify the name of the portal server instance that you want the new gateway instance to use.

Port on which the new portal server instance listens

 

This question is asked only if you have chosen not to use the default portal server instance.

Specify the port on which the new portal server instance listens.

Deployment URI

/portal

This question is asked only if you have chosen not to use the default portal server instance.

Specify the deployment URI of the new portal server instance.

Name of the new gateway instance

 

Specify the name of the new gateway instance that you want to create.

Protocol to be used by the gateway

https

Specify whether you want the gateway to operate in HTTP or HTTPS mode.

Port on which the new gateway instance listens

 

Specify the port on which the new gateway instance needs to listen. Ensure that this port has not been specified for any other gateway instance.

Create certificate database for new gateway instance

y

When the gateway is installed, a default certificate database is created as follows:

/etc/opt/SUNWps/cert/default

The default directory has the following database files:

cert7.db, key3.db, secmod.db

You can choose to use the same certificate database for various instances of the gateway or you can create and assign different certificate databases to different instances.

You can assign only one certificate to one instance of the gateway. If you want to assign different certificates to different organizations, you need to create multiple instances of the gateway.

Choose y to create a new certificate database for the new gateway instance.

Create self-signed certificate

y

This question is asked only if you have chosen to create a new certificate database.

Choose y to create a self-signed certificate. You are asked a series of questions in order to create this certificate.

If you choose n, you can create a self-signed certificate later. See Generating Self-signed Certificates in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.

Name of the organization

Name of the division

Name of the city or locality

Name of the state or province

Two-letter country code

Password for certificate database

 

These details are asked only if you have chosen y to create a self-signed certificate in the previous question.

Created a profile for the new gateway instance

y

You are asked if you have already created a profile for the new gateway instance.

See "To Create a Gateway Profile" for details on creating a new gateway profile.

Start the new gateway instance after installation

y

This question is asked only if you choose y for the previous question, that is, you have already created a profile for the new gateway instance.

If you have not created a profile, the script reminds you to create one before starting the gateway.

Start the new instance of the gateway with the new profile name.

InstallDir/SUNWps/bin/gateway -n test start

where test is the profile name of the new gateway instance

Creating a New Instance on a Separate Node

  1. Login as root and navigate to the following directory:
  2. InstallDir/SUNWps/bin

  3. Run the multi-instance script:
  4. ./gwmultiinstance

Table 2-2 lists the questions that the script asks.

Table 2-2  Checklist for Creating a New Gateway Instance on a Separate Node

Parameter

Default Value

Description

Host name of the Sun™ ONE Directory Server

hostname

This is the machine on which the directory server is installed.

Specify the machine on which directory server was installed for the portal server.

Sub-domain name for hostname

 

This is the sub-domain to which the directory server belongs.

Specify the sub-domain of the machine on which the directory server was installed for the portal server.

Domain name for hostname

 

This is the domain to which the directory server machine belongs.

Specify the domain of the machine on which the directory server was installed for the portal server.

Port used to access the directory server

389

This is the port which the portal server uses to access the directory server.

Specify the directory server port specified during the portal server installation.

Root suffix of the directory tree

o=isp

This is the default top level organization. Any new organization that you create is created under this organization.

Organization name

 

This is the name of the default organization that is created.

Hostname of portal server

portal server hostname

This is the hostname of the portal server.

Sub-domain for portal server hostname

 

This is the sub-domain to which the portal server machine belongs.

Domain name for portal server hostname

 

This is the domain to which the portal server machine belongs.

Port used to access portal server

80

This is the port used to access the portal server.

Protocol used to access portal server

http

Specify the protocol that is used to access the portal server.

Identity server deployment URI

/amserver

This is the identity server deployment URI. Do not change this value.

Portal server deployment URI

/portal

Specify the deployment URI of the new portal server instance.

Name of the new gateway instance

 

Specify the name of the new gateway instance that you want to create.

Protocol to be used by the gateway

http

Specify whether you want the gateway to operate in HTTP or HTTPS mode.

Port on which the new gateway instance listens

 

Specify the port on which the new gateway instance needs to listen. Ensure that this port has not been specified for any other gateway instance.

Create certificate database for new gateway instance

y

When the gateway is installed, a default certificate database is created as follows:

/etc/opt/SUNWps/cert/default

The default directory has the following database files:

cert7.db, key3.db, secmod.db

You can choose to use the same certificate database for various instances of the gateway or you can create and assign different certificate databases to different instances.

You can assign only one certificate to one instance of the gateway. If you want to assign different certificates to different organizations, you need to create multiple instances of the gateway.

Choose y to create a new certificate database for the new gateway instance.

If you choose n, the default certificate database is used.

Create self-signed certificate

y

This question is asked only if you have chosen to create a new certificate database.

Choose y to create a self-signed certificate. You are asked a series of questions in order to create this certificate.

If you choose n, you can create a self-signed certificate later. See “Generating Self Signed Certificates” in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.

Name of the organization

Name of the division

Name of the city or locality

Name of the state or province

Two-letter country code

Password for certificate database

 

These details are asked only if you have chosen y to create a self-signed certificate in the previous question.

Created a profile for the new gateway instance

y

You are asked if you have already created a profile for the new gateway instance.

See "To Create a Gateway Profile" for details on creating a new gateway profile.

Start the new gateway instance after installation

y

This question is asked only if you choose y for the previous question, that is, you have already created a profile for the new gateway instance.

If you have not created a profile, the script reminds you to create one before starting the gateway.

Start the new instance of the gateway with the new profile name.

InstallDir/SUNWps/bin/gateway -n test start

where test is the profile name of the new gateway instance


Configuring a Proxy to Contact the Portal Server

You can configure the gateway to obtain profile information through a proxy if a direct connection is not available between the gateway and the portal server.

  1. From the command-line, edit the following file:
  2. /etc/opt/bin/platform.conf.profilename

  3. Add the following entries:
  4. http.proxyHost=proxy hostname

    http.proxyPort=proxy port

    http.proxySet=true

  5. Restart the gateway to use the specified proxy for Profile Service requests made to the server.
  6. InstallDir/SUNWps/bin/gateway -n profilename start


Restarting the Gateway

Normally, you do not need to restart the gateway. You need to restart only if any of the following events have occured:

    To Restart the Gateway with a Different Profile

Restart the gateway using:

InstallDir/SUNWps/bin/gateway -n new profilename start

    To Configure the watchdog process to Restart the Gateway if it Goes Down
  1. In a terminal window, connect as root on the gateway machine.
  2. Start the watchdog process using:
  3. InstallDir/SUNWps/bin/gateway watchdog on

    To Configure the Gateway Watchdog

You can configure the time interval at which the watchdog monitors the status of the gateway. This time interval is set to 60 seconds by default. To change this, edit the following line in the crontab:

0-59 * * * * InstallDir/bin/checkgw /var/opt/SUNWps/.gw. 5 > /dev/null 2>&1

See the man pages for crontab to configure the crontab entries.


Configuring the Gateway Attributes

This section lists the attributes that you need to configure for the gateway to function as required.


Note

Click Documentation at the top right corner of the identity server admin console, and click SRAP Help for a quick reference on all the Secure Remote Access attributes.


Running in HTTP and HTTPS Modes

The gateway runs in HTTPS mode after installation if you have chosen to run the gateway in the HTTPS mode during installation. In the HTTPS mode, the gateway accepts SSL connections from browsers and rejects non-SSL connections.

However, you can also configure the gateway to run in HTTP mode. The benefits of doing this are performance related, since there is an overhead involved in managing SSL sessions and encrypting and decrypting the SSL traffic. Eliminating these steps speeds gateway performance.

    To Configure the Gateway to Run in HTTP or HTTPS Mode
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab from the admin console.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Do the following:
    • Select the Enable HTTP Connections, Enable HTTPS Connections or both checkboxes as required.
    • Specify the required HTTPS port in the HTTPS Port field.
    • Specify the required HTTP port in the HTTP Port field.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. From a terminal window, restart the gateway using:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling the Rewriter Proxy

The Rewriter Proxy needs to be installed only on a portal server node.

Using the Rewriter Proxy enables secure HTTP traffic between the gateway and intranet computers. There are two advantages to using the Rewriter Proxy:

If you do not specify a Rewriter Proxy, the gateway component makes a direct connection to intranet computers when a user tries to access one of those intranet computers.


Note

The Rewriter Proxy needs to be installed on the portal server node.

Ensure that the Rewriter Proxy and the gateway use the same gateway profile.


Rewriter Proxy does not run automatically after installation. You need to enable Rewriter Proxy as described below.

    To Enable Rewriter Proxy
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Rewriter Proxy checkbox to enable the Rewriter Proxy.
  8. Specify the desired port for the Rewriter Proxy in the Rewriter Proxy Port edit box.
  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. Run InstallDir/SUNWps/bin/certadmin on the server to create a certificate for the Rewriter Proxy.
  11. You need to run this step only if you have not chosen to create a certificate while installing the Rewriter Proxy.

  12. Log in as root on the portal server machine and start the Rewriter Proxy by typing:
  13. InstallDir/SUNWps/bin/rwproxyd -n gateway profile name start

  14. For the changes to take effect, restart the gateway by typing:
  15. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Disabling Netlet

Netlet enables users to securely run common TCP/IP services over insecure networks such as the Internet. You can run TCP/IP applications (such as Telnet and SMTP), HTTP applications, and any fixed port applications.

If Netlet is enabled, the gateway needs to determine whether the incoming traffic is Netlet traffic or portal server traffic. Disabling Netlet reduces this overhead since the gateway assumes that all incoming traffic is either HTTP or HTTPS traffic. Disable Netlet only if you are sure you do not want to use any application with the portal server.

    To Disable Netlet
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Netlet checkbox. This checkbox is selected by default. Removing the selection disables Netlet.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling Netlet Proxy

Netlet Proxy enhances the security of Netlet traffic between the gateway and the intranet by extending the secure tunnel from the client, through the gateway to the Netlet Proxy that resides in the intranet. If the Netlet Proxy is enabled, the Netlet packets are decrypted by the Netlet Proxy and then sent to the destination server. This reduces the number of ports required to be opened in the firewall.

See "Configuring the Netlet Proxy" in Chapter 3, "Configuring Netlet" for details on the Netlet Proxy.

Managing Proxies

You can configure the gateway to contact HTTP resources using web proxies. Different proxies may be used for different domains and subdomains. These entries tell the gateway which web proxy to use to contact specific subdomains in specific domains. The proxy configuration specified in the gateway works as follows:

Figure 2-1 shows how the proxy information is resolved based on the proxy configuration in the gateway service.

Figure 2-1  Proxy Management

This figure illustrates the logic followed for resolving the proxy information. See the description following the figure for details.

In Figure 2-1, if Use Proxy is enabled, and the requested URL is listed in the Do Not Use Webproxy URLs list, the gateway connects to the destination host directly.

If Use Proxy is enabled, and the requested URL is not listed in the Do Not Use Webproxy URLs list, the gateway connects to the destination host through the specified proxy. The proxy, if specified, is looked up from the Proxies for Domains and Subdomains list.

If Use Proxy is disabled, and the requested URL is listed in the Use Webproxy URLs list, the gateway connects to the destination host using the proxy information in the Proxies for Domains and Subdomains list.

If Use Proxy is disabled, and the requested URL is not listed in the Use Webproxy URLs list, the gateway connects to the destination host directly.

If none of the above conditions are met, and a direct connection is not possible, the gateway displays an error saying that connection is not possible.


Note

If you are accessing the URL through the Bookmark channel of the portal server desktop, and none of the above conditions are met, the gateway sends a redirect to the browser. The browser accesses the URL using its own proxy settings.


Syntax

domainname [web_proxy1:port1]|subdomain1 [web_proxy2:port2]|......

Example

sesta.com wp1:8080|red wp2:8080|yellow|* wp3:8080

* is a wild card that matches everything

where,

sesta.com is the domain name and wp1 is the proxy to contact on port 8080.

red is a subdomain and wp2 is the proxy to contact on port 8080.

yellow is a subdomain. Since no proxy is specified, the proxy specified for the domain is used, that is, wp1 on port 8080.

* indicates that for all other subdomains wp3 needs to be used on port 8080.


Note

Port 8080 is used by default if you do not specify a port.


Processing of the Proxy Information

When a client tries to access a particular URL, the host name in the URL is matched with the entries in the Proxies for Domains and Subdomains list. The entry that matches the longest suffix of the requested host name is considered. For example, consider that the requested host name is host1.sesta.com

Consider the following entries in the Proxies for Domains and Subdomains list:

com p1| host1 p2 | host2 | * p3

sesta.com p4 | host5 p5 | * p6

florizon.com | host6

abc.sesta.com p8 | host7 p7 | host8 p8 | * p9

host6.florizon.com p10

host9.sesta.com p11

siroe.com | host12 p12 | host13 p13 | host14 | * p14

siroe.com | host15 p15 | host16 | * p16

* p17

The gateway internally maps these entries into a table as shown in Table 2-3.

Table 2-3  Mapping of entries in the Proxies for Domains and Subdomains List

Number

Entry in Proxies for Domains and Subdomains List

Proxy

Description

1

com

p1

As specified in the list.

2

host1.com

p2

As specified in the list.

3

host2.com

p1

Since there is no proxy specified against host2, the proxy for the domain is used.

4

*.com

p3

As specified in the list.

5

sesta.com

p4

As specified in the list.

6

host5.sesta.com

p5

As specified in the list.

7

*.sesta.com

p6

As specified in the list.

8

florizon.com

Direct

See the description for entry 14 for details.

9

host6.florizon.com

See the description for entry 14 for details.

10

abc.sesta.com

p8

As specified in the list.

11

host7.abc.sesta.com

p7

As specified in the list.

12

host8.abc.sesta.com

p8

As specified in the list.

13

*.abc.sesta.com

p9

As specified in the list. For all hosts other than host7 and host8 under the abc.sesta.com domain, p9 is used as the proxy.

14

host6.florizon.com

p10

This entry is the same as entry 9. Entry 9 indicates a direct connection, whereas this entry indicates that proxy p10 should be used. In a case where there are two entries such as this, the entry with the proxy information is considered as the valid entry. The other entry is ignored.

15

host9.sesta.com

p11

As specified in the list.

16

siroe.com

Direct

Since there is no proxy specified against siroe.com, a direct connection is attempted.

17

host12.siroe.com

p12

As specified in the list.

18

host13.siroe.com

p13

As specified in the list.

19

host14.siroe.com

Direct

Since no proxy is specified for host14, of for siroe.com, a direct connection is attempted.

20

*.siroe.com

p14

See the description for entry 23.

21

host15.siroe.com

p15

As specified in the list.

22

host16.siroe.com

Direct

Since no proxy is specified for host16, of for siroe.com, a direct connection is attempted.

23

*.siroe.com

p16

This is similar to entry 20. But the proxies specified are different. In such a case, the exact behavior of the gateway is not known. Either of the two proxies may be used.

24

*

p17

If no other entry matches the requested URL, p17 is used as the proxy.


Note

Instead of separating the proxy entries in the Proxies for Domains and Subdomains list with the | symbol, it may be simpler to have individual entries in the list. For example, instead of an entry such as:

sesta.com p1 | red p2 | * p3

you can specify it as:

sesta.com p1

red.sesta.com p2

*.sesta.com p3

This makes it easier to trap repeated entries or any other ambiguities.


Rewriting Based on the Proxies for Domains and Subdomains List

The entries in the Proxies for Domains and Subdomains list are also used by Rewriter. Rewriter rewrites all URLs whose domains match the domains listed in the Proxies for Domains and Subdomains list.


Caution

The * entry in the Proxies for Domains and Subdomains list is not considered for rewriting. For example, in the sample provided in Table 2-3, entry 24 is not considered.


See Chapter 5, "Configuring Rewriter" for more details on Rewriter and its functionality.

Default Domain and Subdomain

When the destination host in the URL is not a fully qualified host name, the default domain and subdomain are used to arrive at the fully qualified name.

Assume that the entry in the Default Domain Subdomain field of the admin console is:

red.sesta.com


Note

You need to have the corresponding entry in the Proxies for Domains and Subdomains list.


In the example above, sesta.com is the default domain and the default subdomain is red.

If the requested URL is host1, this is resolved to host1.red.sesta.com using the default domain and subdomain. The Proxies for Domains and Subdomains list is then looked up for host1.red.sesta.com.

    To Enable the Usage of Web Proxies
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Use Proxy checkbox to enable the usage of web proxies.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying URLS for Webproxies

You can specify that the gateway needs to contact certain URLs only through the webproxies listed in the Proxies for Domains and Subdomains list, even if the Use Proxy option is disabled. You need to specify these URLs in the Use Webproxy URLs field. See "Managing Proxies" for details on how this value affects the usage of proxies.

    To Specify the URLs for Webproxies
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required URL in the Use Webproxy URLs edit box in the format http://host name.subdomain.com. Click Add.
  8. The URL is added to the Use Webproxy URLs list.

  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying URLs for which Proxies Should not be Used

The gateway tries to connect directly to the URLs listed in the Do Not Use Webproxy URLs list. A webproxy is not used to connect to these URLs.

    To Specify the URLs for which Proxies Should not be Used
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required URL in the Do Not Use Webproxy URLs edit box and click Add.
  8. The URL is added to the Do Not Use Webproxy URLs list.

  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Default Domain and Subdomain

The default domain and subdomain are useful when URLs contain only the host names without the domain and subdomain. In this case, the gateway assumes that the host names are in the default domain and subdomain, and proceeds accordingly.

For example, if the host name in the URL is host1, and the default domain and subdomain are specified as red.sesta.com, the host name is resolved as host1.red.sesta.com.

    To Specify the Default Domain and Subdomain
  1. Log in to the identity server admin console as administrator.
  2. Click the Service Configuration tab.
  3. Click the right arrow next to Gateway under SRAP Configuration.
  4. The Gateway Profile page displays.

  5. Click Edit... for the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Default Domain Subdomain field and type the required default value in the format subdomain.domain name.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Specify Proxies for Domains and Subdomains

See "Processing of the Proxy Information" for details on how the proxy information is applied to various hosts.

  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the right arrow next to Gateway under SRAP Configuration.
  4. The Gateway Profile page displays.

  5. Click Edit. for the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required information in the Proxies for Domains and Subdomains edit box and click Add. The entry is added to the Proxies for Domains and Subdomains list box.
  8. The format for entering the proxy information is as follows:

    domainname proxy1:port1|subdomain1 proxy2:port2|subdomain2 proxy3:port3|* proxy4:port4

    * indicates that the proxy defined after the * needs to be used for all domains and subdomains other than those specifically mentioned.

    If you do not specify the port for the proxy, port 8080 is used by default.

  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying Proxy Authentication Information

You need to specify the user name and password required for the gateway to authenticate to the specified proxy server, if the proxy server requires authentication to access some or all the sites.

    To Specify the Proxy Authentication Information
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Proxy Password List field.
  8. Type the information for each proxy server in the format proxyserver|username|password and click Add.
  9. The proxyserver corresponds to the proxy server defined in the Proxies for Domains and Subdomains list.

  10. Repeat step 6 for all the proxies that require authentication.
  11. Click Save at the top or bottom of the page to record the changes.
  12. For the changes to take effect, restart the gateway by typing:
  13. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Configuring Cookies

Many web sites use cookies to track and manage user sessions. When the gateway routes requests to web sites that set cookies in the HTTP header, the gateway either discards or passes-through those cookies in the following manner:

This setting does not apply to the cookies used by the portal server to track portal server user sessions. It is controlled by the Forwarding Cookie Configuration.

This setting applies to all web sites that the user is permitted to access (that is, you cannot choose to discard cookies from some sites and retain cookies from others).

    To Enable Cookie Management
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Cookie Management checkbox to enable cookie management.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling HTTP Basic Authentication

HTTP basic authentication can be set in the gateway service.

Web sites may be protected with HTTP Basic Authentication, requiring visitors to enter a username and password before viewing the site (the HTTP response code is 401 and WWW-authenticate: BASIC). The portal server can save the username and password so that users need not re-enter their credentials when they revisit BASIC-protected web sites. These credentials are stored in the user profile on the directory server.

This setting does not determine whether or not a user may visit BASIC-protected sites, but only whether the credentials the user enters will be saved in the user's profile.

This setting applies to all web sites that the user is permitted to access (that is, HTTP basic authentication caching cannot be enabled for some sites and disabled for others).


Note

Browsing to URLs served by Microsoft's Internet Information Server (IIS) protected by Windows NT challenge/response (HTTP response code 401, WWW-Authenticate: NTLM) instead of BASIC authentication is not supported.


You can also enable single sign-on using the Access List service in the admin console. See "Managing Single Sign-On" in Chapter 1, "Introduction to Sun ONE Portal Server, Secure Remote Access" for more information on enabling single sign-on.

    To Enable HTTP Basic Authentication
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable HTTP Basic Authentication checkbox to enable HTTP basic authentication.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Configuring Persistent HTTP Connections

You can enable HTTP persistent connections at the gateway to prevent sockets being opened for every object (such as images and style sheets) in the web pages.

    To Enable Persistent HTTP Connections
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Persistent HTTP Connections checkbox.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Specify the Maximum Number of Requests per Persistent Connection
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required number of requests in the Maximum Number of Requests per Persistent Connection field.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Specify the Timeout for the Persistent Socket
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required timeout in seconds in the Timeout after which Persistent Socket gets Closed field.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Specify Timeout to Account for Turnaround Time

This is the round trip time for the network traffic between the client (browser) and the gateway.

  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required grace timeout in seconds in the Grace Timeout to Account for Turnaround Time field.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Forwarding Cookie Configuration

Portal server utilizes a cookie to track user sessions. This cookie is forwarded to the server when the gateway makes HTTP requests to the server (for example, when the desktop servlet is called to generate the user's desktop page). Applications on the server use the cookie to validate and identify the user.

The portal server's cookie is not forwarded to HTTP requests made to machines other than the server, unless URLs on those machines are specified in the Forward Cookie URL Lists. Adding URLs to this list therefore enables servlets and CGIs to receive the portal server's cookie and use the APIs to identify the user.

URLs are matched using an implicit trailing wildcard. For example, the default entry in the list:

http://server:8080

causes the cookie to be forwarded to all URLs starting with http://server:8080.

Adding:

http://newmachine.eng.siroe.com/subdir

causes the cookie to be forwarded to all URLs starting with that exact string.

For this example, the cookie is not forwarded to any URLs starting with "http://newmachine.eng/subdir", since this string does not start with the exact string in the forward list. To have cookies forwarded to URLs starting with this variation of the machine's name, an additional entry has to be added to the forward list.

Similarly, the cookie is not forwarded to URLs starting with "https://newmachine.eng.siroe.com/subdir" unless an appropriate entry is added to the list.

    To Add a Forward Cookie URL
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Type the required URL in the Forward Cookie URLs edit box.
  8. Click Add to add this entry to the Forward Cookie URLs list.
  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying URLs that Bypass Authentication

You can specify that some URLs do not need any authentication. These are normally directories and folders that contain images.

    To Specify Non-authenticated URL Paths
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Non-authenticated URLs field and type the required folder path in the format folder/subfolder.
  8. Click Add to add this entry to the Non-authenticated URLs list.
  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Maximum Connection Queue Length

You can specify the maximum concurrent connections that the gateway needs to accept. Any connection attempts beyond this number are not accepted by the gateway.

    To Specify the Maximum Connection Queue Length
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Maximum Connection Queue Length field and specify the required number of connections.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Gateway Timeout

You can specify the time interval in milliseconds after which the gateway times out its connection with the browser.

    To Specify the Gateway Timeout
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Gateway Timeout (milliseconds) field and specify the interval required in milliseconds.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Maximum Number of Threads

You can specify the maximum number of threads that can be pre-created in the gateway thread pool.

    To Specify the Maximum Number of Threads
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Maximum Thread Pool Size field and specify the required number of threads.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Cached Socket Timeout

You can specify the time interval in milliseconds after which the gateway times out its connection with the portal server.

    To Specify the Cached Socket Timeout
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Cached Socket Timeout field and specify the interval required in milliseconds.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Configuring Personal Digital Certificate (PDC) Authentication

PDCs are issued by a Certification Authority (CA) and signed with the CA's private key. The CA validates the identity of a requesting body before issuing a certificate. Thus the presence of a PDC is a very powerful authentication mechanism.

PDCs contain the owner's public key, the owner's name, an expiration date, the name of the Certification Authority that issued the Digital Certificate, a serial number, and maybe some other information.

Users can use PDCs and encoded devices such as Smart Cards and Java Cards for authentication in the portal server. The encoded devices carry an electronic equivalent of a PDC stored on the card. If a user logs in using one of these mechanisms, no login screen displays and no authentication screen displays.

The PDC authentication process involves several steps:

  1. From a browser, the user types a connection request, say https://my.sesta.com.
  2. The response to this request depends on whether the gateway to my.sesta.com has been configured to accept certificates.


    Note

    When a gateway is configured to accept certificates, it will accept only logins with certificates, not any other kind of login.


    The gateway checks that the certificate has been issued by a known Certificate Authority, has not expired, and has not been tampered with. If the certificate is valid, the gateway lets the user proceed to the next step in the authentication process.

  3. The gateway passes the certificate to the PDC authentication module in the server.
    To Configure PDCs and Encoded Devices

The following steps are involved in configuring PDCs and encoded devices:

  1. Add the following line in the InstallDir/SUNWam/lib/AMConfig.properties file on the portal server machine:
  2. com.iplanet.authentication.modules.cert.gwAuthEnable=yes

  3. Import the Required Certificates into the certificate database of the gateway that you want PDC-enabled
  1. Do the following subtasks:
    To Add the Gateway to the Certificate-Enabled Gateway Hosts list
  1. Log in to the identity server admin console as administrator.
  2. Select the required organization.
  3. Select the Service Configuration tab.
  4. All the services are displayed in the left pane.

  5. Click the arrow next to Gateway under SRAP Configuration.
  6. The Gateway Profiles page is displayed in the right pane.

  7. Click Edit... for the profile where you want to enable certificate based authentication.
  8. Add the gateway name to the Certificate-enabled Gateway Hosts.
  9. Add the gateway in the format host1.sesta.com.

  10. Click Add.
    To Register Required Services
  1. Log in to the identity server admin console as administrator.
  2. Select the Identity Management tab.
  3. Click Services from the View drop-down menu.
  4. The Core service, if already registered, displays in the navigation pane. If it is not already registered, it can be done concurrently with the Certificate service.

  5. Click Register in the navigation pane.
  6. A list of available services displays in the data pane.

  7. Select the checkbox for Certificate.
  8. The Certificate service displays in the navigation pane confirming that the service has been registered.

  9. Click Register.
    To Modify the Required Attributes
  1. Select the Identity Management tab.
  2. Choose Services from the View drop-down menu.
  3. Click the arrow next to Core under Authentication in the left pane.
  4. The Core page displays.

  5. Click on the arrow next to Certificate.
  6. The message “A template does not currently exist for this service. Do you want to create one now?”

  7. Click Create.
  8. The Certificate page is displayed in the data pane.

  9. Modify the attributes as necessary.
  10. Click Save at the top of the page to record the changes.

  11. Click the arrow next to Core.
  12. Choose Dynamically Created from the User Profile drop-down menu.
  13. Click Save.
  14. Restart the identity server:
  15. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Add Trusted Remote Hosts
  1. Log in to the identity server admin console as administrator.
  2. Select the required organization.
  3. Click the arrow next to Certificate.
  4. Click Create... to create a template.
  5. Click Save.
  6. Scroll to the list box named Trusted Remote Host.
  7. Highlight none and click Remove.
  8. Type any in the text box and click Add.
    To Enable Users to Login Without a Profile (Dynamic Creation of Profile at Login)
  1. Log in to the identity server admin console as administrator.
  2. Choose the required organization.
  3. Select Services from the View drop-down menu.
  4. The services are displayed in the left pane.

  5. Click the arrow next to Core.
  6. Choose Dynamically Created from the User Profile drop-down menu.
  7. Click Save.
  8. InstallDir/SUNWps/bin/gateway -n gateway profile name start

    To Create a Gateway Instance with a Certification Module
  1. Log in to the identity server admin console as administrator.
  2. Choose the required organization.
  3. Select Services from the View drop-down menu.
  4. The services are displayed in the left pane.

  5. Click the arrow next to Authentication Configuration.
  6. The Service Instance List displays.

  7. Click New...
  8. The New Service Instance page displays.

  9. Enter the service instance name gatewaypdc.
  10. Note: You must use this name.

  11. Click Create.
  12. The Service Instance List displays.

  13. Click on gatewaypdc to edit the service.
  14. The gatewaypdc show properties page displays.

  15. Click Edit...
  16. The Module List for your organization displays.

  17. Click Add...
  18. The Add Module page displays.

  19. Choose Cert from the Module Name field and a Flag option.
  20. Click OK.
  21. Add the root CA from the CA authority on the gateway machine.
  22. See “Installing Certificates From a Certificate Authority” in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.

  23. Restart the gateway machine.

Allowing 40-bit Browser Connections

Select this option if you want to allow 40-bit (weak) Secure Sockets Layer (SSL) connections. If you do not select this option, only 128-bit connections are supported.

If you disable this option, the user needs to ensure that the browser is configured to support the required connection type.


Note

The user needs to do the following in case of Netscape Navigator 4.7x:

  • Select Security Info under Tools in the Communicator menu.
  • Click the Navigator link in the left pane.
  • Click Configure SSL v2 or Configure SSL v3 under Advanced Security (SSL) Configuration.
  • Enable the required ciphers.

    To Allow 40-bit Browser Connections
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Allow 40-bit Browser checkbox to enable 40-bit browser connections.
  8. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Disabling SSL Version 2.0

You can enable or disable SSL version 2.0. Disabling SSL 2.0 means that browsers that support only the older SSL 2.0 will not be able to authenticate to Secure Remote Access. This ensures a greater level of security.

    To Disable SSL Version 2.0
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Enable SSL Version 2.0 field and deselect the option.
  8. This option is enabled by default.

  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling Cipher Selection

Secure Remote Access supports a number of standard ciphers. You have the option of supporting all the pre-packaged ciphers, or selecting the required ciphers individually. You can select specific SSL ciphers for each gateway instance. If any of the selected ciphers is present at the client site, the SSL handshake occurs successfully.

    To Enable Individual Cipher Selection
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Enable SSL Cipher Selection field and select the option.
  8. This option allows you to select the required ciphers from the list of SSL2, SSL3 and TLS ciphers.

  9. Click Save at the top or bottom of the Edit Gateway Profile page to record the change.
  10. You can select the ciphers that you want to be supported at your client sites. Deselecting the Enable the SSL Ciphers Individually option automatically selects all the listed ciphers.

  11. For the changes to take effect, restart the gateway by typing:
  12. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Rewriting all URLs

See Chapter 5, "Configuring Rewriter" for details.

    To Specify Domain-based Rulesets

See Chapter 5, "Configuring Rewriter" for details.

    To Specify the MIME Mappings

See Chapter 5, "Configuring Rewriter" for details.

Specifying the List of Configured Portal Servers

You can configure multiple portal servers for the gateway to service requests. While installing the gateway, you would have specified the portal server that the gateway needs to work with. This portal server is listed in the Portal Server List by default. You can add more portal servers to the list in the format http://portal server name:port number. The gateway tries to contact each of the portal servers listed in a round robin manner to service the requests.

    To Specify the List of Configured Portal Servers
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Portal Server List field. Specify the portal server in the format http://portal server name:port number in the edit field and click Add.
  8. The specified portal server is added to the Portal Server List field.

  9. Click Save at the top or bottom of the page to record the changes.
  10. For the changes to take effect, restart the gateway by typing:
  11. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Specifying the Retry Interval for the Portal Server

You can set the frequency (in minutes) at which the gateway needs to check if the portal server is available.

    To Specify the Retry Interval for the Portal Server
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Scroll down to the Server Retry Interval field. Specify the time interval in minutes at which the gateway needs to check whether the portal server is available.
  8. Click Save at the top or bottom of the page to record the changes.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling Logging

You can specify the gateway log file to capture either minimum information or detailed information about each session. The log information is saved in the directory specified in the Log Location attribute as part of the Logging section of the Identity Server Configuration attributes. This log is located on the portal server machine.

The log name uses the following convention:

srapGateway_gatewayhostname_gateway profile name

The log information can be saved as a file or as a database as specified in the Identity Server Configuration. The fields in the log are comma-separated ASCII values, and can be exported to other data analysis tools.

    To Enable Gateway Logging
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Logging checkbox to enable gateway logging.
  8. Select the Enable per Session Logging checkbox to capture minimum log information such as Client Address, Request Type, and Destination Host.

  9. Note

    Log information is captured only if the Enable Logging field has already been enabled.


  10. Select the Enable Detailed per Session Logging for the gateway to capture detailed log information such as Client, Request Type, Destination Host, Type of Request, Client Requested URL, Client Post Data size, SessionID, Response Result code, and Complete Response size.

  11. Note

    Detailed log information is captured only if the Enable per Session Logging checkbox has already been enabled.


  12. Click Save at the top or bottom of the page to record the changes.
  13. For the changes to take effect, restart the gateway by typing:
  14. InstallDir/SUNWps/bin/gateway -n gateway profile name start

Enabling Netlet Logging

You can enable logging for Netlet related activities by selecting this option. The Netlet log will contain the following details about the Netlet sessions:

    To Enable Netlet Logging
  1. Log in to the identity server admin console as administrator.
  2. Select the Service Configuration tab.
  3. Click the arrow next to Gateway under SRAP Configuration.
  4. The Gateway page displays.

  5. Click Edit... next to the gateway profile for which you want to set the attribute.
  6. The Edit Gateway Profile page displays.

  7. Select the Enable Netlet Logging checkbox to enable Netlet logging.
  8. Click Save at the bottom of the page to record the changes.
  9. For the changes to take effect, restart the gateway by typing:
  10. InstallDir/SUNWps/bin/gateway -n gateway profile name start


Authentication Chaining

Authentication chaining provides a higher level of security over the regular mechanism of authentication. You can enable users to be authenticated against more than one authentication mechanism.

The procedure described here is only for enabling authentication chaining along with PDC authentication at the gateway. For authentication chaining without PDC authentication at the gateway please refer to Sun ONE Identity Server Administration Guide.

For example, if you chain the PDC, Unix and Radius authentication modules, the user will have to authenticate against all the three modules to access the portal server desktop.


Note

PDC is always the first authentication module to be presented to the user if it is enabled.


    To Add Authentication Modules to an Existing PDC Instance
  1. Log in to the identity server admin console as administrator.
  2. Choose the required organization.
  3. Select Services from the View drop-down menu.
  4. The services are displayed in the left pane.

  5. Click the arrow next to Authentication Configuration.
  6. The Service Instance List displays.

  7. Click gatewaypdc.
  8. The gatewaypdc properties page displays.

  9. Click Edit in front of Authentication Configuration
  10. Add Module displays.

  11. Select Module Name and set Flag to Required. Option can be blank.
  12. Click OK.
  13. Click Save after adding one or more modules.
  14. Click Save in the gatewaypdc properties page.
  15. For the changes to take effect, restart the gateway by typing:
  16. InstallDir/SUNWps/bin/gateway -n gateway_profile_name start

Wild Card Certificates

A wild card certificate accepts a single certificate with a wild card character in the fully-qualified DNS name of the host.

This allows the certificate to secure multiple hosts within the same domain. For example, a certificate for *.domain.com can be used for abc.domain.com, and abc1.domain.com. In fact, this certificate is valid for any host in the domain.com domain.

    To Create a Wild Card Certificate

See “Generating Self-Signed Certificates” in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.

You need to specify a * in the fully-qualified host name. For example, if the fully-qualified host name is abc.florizon.com, specify it as *.florizon.com. The certificate that is generated is now valid for all host names in the florizon.com domain.


Disabling Browser Caching

As the gateway component provides secure access to backend corporate data from any location using just a web browser, it may be necessary that the information not be cached locally by the client.

You can disable caching of pages redirected through the gateway by modifying the attribute in the platform.conf file of the specific gateway.

Disabling this option can have an impact on the gateway performance. Every time the desktop is refreshed, the gateway has to retrieve everything referenced by the page, such as images which may have been previously cached by the browser. However, by enabling this feature, remotely accessing secure content will not leave a cached footprint on the client site. This could outweigh performance implications if the corporate network is being accessed from an Internet cafe or similar remote location that is not under corporate IT control.

    To Disable Browser Caching
  1. Log in as root and edit the platform.conf file of the required gateway instance:
  2. /etc/opt/SUNWps/platform.conf.profilename

  3. Edit the following line:
  4. gateway.allow.client.caching=true

    This value is set to true by default. Change the value to false to disable browser caching at the client side.

  5. Restart the gateway using:
  6. InstallDir/SUNWps/bin/gateway -n new profile name start


Running the Gateway in the chroot Environment

To provide high security in a chroot environment, the chroot’d directory content must be as minimal as possible. For example, if any programs exist which allow a user to modify a file under the chrooted directory, then chroot will not protect the server against an attacker modifying files under the chroot tree. CGI programs should not be written in an interpreted language, such as bourne shell, c-shell, korn shell or perl, but should be compiled binaries so interpreters do not need to be present under the chroot directory tree.


Note

The watchdog feature is not supported in the chroot environment.


    To Install chroot
  1. As root, in a terminal window, copy the following files to an external source such as a computer on the network, a backup tape or a floppy disk.
  2. cp /etc/vfstab external-device

    cp /etc/nsswitch.conf external-device

    cp /etc/hosts external-device

  3. Run the mkchroot script from:
  4. InstallDir/SUNWps/bin/chroot


    Note

    The mkchroot script cannot be terminated by pressing Ctrl-C, once execution has begun.

    In the event of an error during the execution of the mkchroot script, see "Execution Failure of the mkchroot Script".


You are prompted for a different root directory (new_root_directory). The script creates the new directory.

In the following examples, /safedir/chroot is the new_root_directory.

mkchroot version 6.0

Enter the full path name of the directory which will be the chrooted tree:/safedir/chroot

Using /safedir/chroot as root.

Checking available disk space...done

/safedir/chroot is on a setuid mounted partition.

Creating filesystem structure...dev etc sbin usr var proc opt bin lib tmp etc/lib usr/platform usr/bin usr/sbin usr/lib usr/openwin/lib var/opt var/tmp dev/fd done

Creating devices...null tcp ticots ticlts ticotsord tty udp zero conslog done

Copying/creating etc files...group passwd shadow hosts resolv.conf netconfig nsswitch.conf

done

Copying binaries...................................done

Copying libraries.....................................done

Copying zoneinfo (about 1 MB)..done

Copying locale info (about 5 MB)..........done

Adding comments to /etc/nsswitch.conf ...done

Creating loopback mount for/safedir/chroot/usr/java1.2...done

Creating loopback mount for/safedir/chroot/proc...done

Creating loopback mount for/safedir/chroot/dev/random...done

Do you need /dev/fd (if you do not know what it means, press return)[n]:

Updating /etc/vfstab...done

Creating a /safedir/chroot/etc/mnttab file, based on these loopback mounts.

Copying SRAP related data ...

Using /safedir/chroot as root.

Creating filesystem structure...........done

mkchroot successfully done.

  1. Manually mount the Java directory mentioned in the platform.conf file to the chroot directory using the following command:
  2. mkdir -p /safedir/chroot/javadir

    mount -F lofs javadir /safedir/chroot/javadir

    For Solaris 9, do the following:

    mkdir -p /safedir/chroot/usr/lib/32

    mount -F lofs /usr/lib/32 /safedir/chroot/usr/lib/32

    mkdir -p /safedir/chroot/usr/lib/64

    mount -F lofs /usr/lib/64 /safedir/chroot/usr/lib/64

    To mount this directory at system startup, add a corresponding entry in the /etc/vfstab file:

    javadir - /safedir/chroot/javadir lofs - no -

    For Solaris 9:

    /usr/lib/32 - /safedir/chroot/usr/lib/32 lofs - no -

    /usr/lib/64 - /safedir/chroot/usr/lib/64 lofs - no -

  3. Type the command below to restart the gateway:
  4. chroot /safedir/chroot ./InstallDir/SUNWps/bin/gateway start

    stopping gateway ... done.

    starting gateway ...

    done.

Execution Failure of the mkchroot Script

In the event of an error during the execution of the mkchroot script, the script will restore the files to their initial state.

In the following examples, /safedir/chroot is the chroot directory.

If the following error message is encountered:

Not a Clean Exit

  1. Copy the backed up files in step 1 of the procedure To Install chroot, to their original locations, and execute the following commands:
  2. umount /safedir/chroot/usr/java1.2

    umount /safedir/chroot/proc

    umount /safedir/chroot/dev/random

  3. Remove the /safedir/chroot directory.

Restarting the Gateway in the chroot Environment

Follow these steps to run the Secure Remote Access gateway in a chroot environment whenever the gateway machine is rebooted.

    To Restart the Gateway in the chroot Environment
  1. Stop the gateway running from the ’/’ directory.
  2. InstallDir/SUNWps/bin/gateway -n profilename stop

  3. Start the gateway to run from the chroot directory.
  4. chroot /safedir/chroot ./InstallDir/SUNWps/bin/gateway -n profilename start


    Note

    The /safedir/chroot/etc files (such as passwd and hosts) need to be administered, just like the /etc files, but only include host and account information required by the programs running in the chroot tree.

    For example, if you change the IP address of the system, also change the file /safedir/chroot/etc/hosts.



Customizing the Gateway User Interface

This section discuss the various property files that can be edited. You can edit labels on the gateway admin console, error messages, or the order of log information. This is useful if you are trying to customize the product for different locales.

You can customize the following files:

InstallDir/SUNWam/locale/srapGatewayAdminConsole.properties

InstallDir/SUNWps/locale/srapGateway.properties

InstallDir/SUNWps/web-src/WEB-INF/classes/srapgwadminmsg.properties


Note

You need to store a copy of each of these files in the respective locale directories if you have different locale settings.


srapGatewayAdminConsole.properties File

Edit this file to change the field names that appear on the gateway admin console.

srapGateway.properties File

Edit this file to:

By default the srapGateway.properties file is located under InstallDir/SUNWps/locale directory. All messages that appear on the gateway machine (gateway related messages) are located in this file, irrespective of the language of the messages.

If you need to change the language of the messages that appear on the client desktop, copy this file into the respective locale directory, for example InstallDir/SUNWps/locale_en_US.

srapgwadminmsg.properties File

Edit this file to:


Understanding the platform.conf File

The platform.conf file is located at:

/etc/opt/SUNWps

The platform.conf file contains the details that the gateway needs to start running. This section provides a sample platform.conf file and describes all the entries.

The advantage of including all the machine-specific details in the configuration file is that a common profile can be shared by gateways running on multiple machines.

Here is a sample:

#

# Copyright 11/28/00 Sun Microsystems, Inc. All Rights Reserved.

# "@(#)platform.conf  1.38 00/11/28 Sun Microsystems"

#

gateway.user=noaccess

gateway.jdk.dir=/usr/java_1.3.1_06

gateway.dsame.agent=http://pserv2.iportal.com:8080/sunportal/Remote ConfigServlet

portal.server.protocol=http

portal.server.host=pserv2.iportal.com

portal.server.port=8080

gateway.protocol=https

gateway.host=sunone071.india.sun.com

gateway.port=333

gateway.trust_all_server_certs=true

gateway.trust_all_server_cert_domains=false

gateway.virtualhost=sunone071.india.sun.com 10.12.147.71

gateway.notification.url=/notification

gateway.retries=6

gateway.locale=en_US

gateway.debug=error

gateway.debug.dir=/var/opt/SUNWps/debug

gateway.logdelimiter=&&

gateway.external.ip=10.12.147.71

gateway.certdir=/etc/opt/SUNWps/cert/portal

gateway.allow.client.caching=true

gateway.userProfile.cacheSize=1024

gateway.userProfile.cacheSleepTime=60000

gateway.userProfile.cacheCleanupTime=300000

gateway.bindipaddress=10.12.147.71

gateway.sockretries=3

Table 2-4 lists and describes all the fields in the platform.conf file. The table has three columns. The first column lists the entries in the file, the second column gives the default value, if any, and the third column gives a brief description of the field.

Table 2-4  platform.conf file

Entry

Default Value

Description

gateway.user

noaccess

This is the user as whom the gateway runs.

The gateway has to be started as root and after initialization, it loses its root privileges to become this user.

gateway.jdk.dir

 

This is the location of the JDK directory that the gateway uses.

gateway.dsame.agent

 

This is the URL of the identity server that gateway contacts while starting up to get its profile.

portal.server.
protocol

portal.server.host

portal.server.port

 

This is the protocol, host and port that the default portal server installation is using.

gateway.protocol
gateway.host
gateway.port

 

This is the gateway protocol, host and port. These values are the same as the mode and port that you specified during installation. These values are used to construct the notification URL.

gateway.trust_all_
server_certs

true

This indicates whether the gateway has to trust all server certificates, or only those that are in the gateway certificate database.

gateway.trust_all_
server_cert_domains

false

Whenever there is an SSL communication between the gateway and a server, a server certificate is presented to the gateway. By default, the gateway checks if the server host name is the same as the server certificate CN.

If this attribute value is set to true, the gateway disables the domain check for the server certificate that it receives.

gateway.virtualhost

 

If the gateway machines has multiple hostnames configured, you can specify a different name and IP address in this field.

gateway.
notification.url

 

A combination of the gateway host, protocol and port is used to construct the notification URL. This is used to receive session notification from iDS/AME.

Ensure that the notification URL is not the same as any organization name. If the notification URL matches an organization name, a user trying to connect to that organization will get a blank page instead of the login page.

gateway.retries

 

This is the number of times that the gateway tries to contact the portal server while starting up.

gateway.locale

 

This is the gateway locale

gateway.debug

error

This sets the debug level of the gateway. The debug log file is located at debug_directory/files. The debug file location is specified in the gateway.debug.dir entry.

The debug levels are:

error - Only serious errors are logged in the debug file. The gateway usually stops functioning when such errors occur.

warning - Warning messages are logged.

message - All debug messages are logged.

on - All debug messages are displayed on the console.

The debug files are:

srapGateway.profilename - Contains the gateway debug messages.

Gateway_to_from_server.profilename - In message mode, this file contains all the requests and response headers between the gateway and internal servers.

Gateway_to_from_browser.profilename - In message mode, this file contains all the requests and response headers between the gateway and the client browser.

gateway.debug.dir

 

This is the directory where all the debug files are generated.

This directory should have sufficient permissions for the user mentioned in gateway.user to write to files.

gateway.
logdelimiter

 

Not used currently.

gateway.external.ip

 

In case of a multihomed gateway machine, you need to specify the external IP address here. This IP is used for the Netlet to run FTP.

gateway.certdir

 

This specifies the location of the certificate database.

gateway.allow.
client.caching

true

Allow or disallow client caching.

If allowed, client browsers can cache static pages and images for better performance (by reduced network traffic).

If disallowed, there is higher security as nothing is cached at client side but there will be a performance drop and higher network load.

gateway.userProfile.cacheSize

 

This is the number of user profile entries that get cached at the gateway. If the number of entries exceeds this value, frequent retries occur to cleanup the cache.

gateway.userProfile.cacheSleepTime

 

Sets the sleep time of the cache cleanup thread in seconds.

gateway.userProfile.cacheCleanupTime

 

The maximum time in seconds after which a profile entry can get removed.

gateway.
bindipaddress

 

On a multihomed machine, this is the IP address to which the gateway binds its serversocket.

gateway.sockretries

3

Not used currently.



Previous      Contents      Index      Next     


Copyright 2003 Sun Microsystems, Inc. All rights reserved.