This Sun Java System Access Manager Policy Agent 2.2 Guide for Microsoft Internet Information Services 6.0 is a web agent guide. Therefore, it provides general information about web agents in the Sun JavaTM System Access Manager Policy Agent 2.2 software set. This guide also provides specific information about Sun Java System Access Manager Policy Agent 2.2 for Microsoft Internet Information Services 6.0.
Furthermore, this guide provides specific information for installing this agent to protect Microsoft Office SharePoint Portal Server 2003 (referred to as Microsoft Office SharePoint Server throughout this guide) and Outlook Web Access for Microsoft Exchange Server 2003 (referred to as Outlook Web Access throughout this guide). Outlook Web Access is the web-based email service for Microsoft Exchange Server. For more information, see Using Agent for Microsoft IIS 6.0 with Microsoft Office SharePoint or Outlook Web Access.
Throughout this guide the Microsoft Internet Information Services 6.0 deployment container is referred to as Microsoft IIS 6.0. For support and compatibility information about Agent for Microsoft IIS 6.0, see Supported Platforms of Agent for Microsoft IIS 6.0.
Included in this guide is information about installing, configuring, uninstalling, and troubleshooting web agents, with the focus being on Policy Agent for Microsoft IIS 6.0.
This Sun Java System Access Manager Policy Agent 2.2 Guide for Microsoft Internet Information Services 6.0 is intended for use by IT professionals who manage access to their network using Sun Java System servers and software. Administrators should understand the following technologies:
Directory technologies
JavaServer PagesTM (JSP) technology
HyperText Transfer Protocol (HTTP)
HyperText Markup Language (HTML)
eXtensible Markup Language (XML)
Web Services
Web Technologies
Sun Java System Policy Agent software works with Sun Java System Access Manager. Both products work with Sun Java Enterprise System, a software infrastructure that supports enterprise applications distributed across a network or Internet environment. Furthermore, Sun Java System Directory Server is a necessary component in a new Access Manager deployment since it is used as the data store. To understand how these products interact and to understand this book, you should be familiar with the following documentation:
Sun Java Enterprise System documentation set, which can be accessed online at http://docs.sun.com. All Sun technical documentation is available online through this web site, including the other documentation sets referred to in this list.
You can browse the documentation archive or search for a specific book title, part number, or subject.
Sun Java System Directory Server documentation set.
Sun Java System Access Manager documentation set, which is explained in more detail subsequently in this chapter.
Sun Java System Access Manager Policy Agent 2.2 documentation set, which is explained in more detail subsequently in this chapter.
This book is organized in the following manner:
Preface, this chapter, provides information about this book to help you use the book to your best advantage.
Chapter 1, Introduction to Web Agents for Policy Agent 2.2 introduces web agents in Policy Agent 2.2, focusing on what all web agents have in common in this release.
Chapter 2, About Policy Agent 2.2 for Microsoft IIS 6.0 provides information specific to Policy Agent 2.2 for Microsoft IIS 6.0, focusing on aspects of the agent that make it unique compared to other web agents.
Chapter 3, Installing Policy Agent 2.2 for Microsoft IIS 6.0 provides instructions for installing Policy Agent 2.2 for Microsoft IIS 6.0.
Chapter 4, The Relationship Between the Agent Profile and Web Agents in Policy Agent 2.2 provides information about the agent profile, which is an optional location for setting the credentials that the web agent must provide to authenticate with Access Manager.
Chapter 5, Post-Installation Configuration: Policy Agent 2.2 for Microsoft IIS 6.0 provides information about web agent configuration.
Chapter 6, Managing Policy Agent 2.2 for Microsoft IIS 6.0 provides information about the methods available for managing Policy Agent 2.2 for Microsoft IIS 6.0, with most of the information being applicable to all web agents in the Policy Agent 2.2 software set.
Chapter 7, Uninstalling Policy Agent 2.2 for Microsoft IIS 6.0 provides instructions for uninstalling Policy Agent 2.2 for Microsoft IIS 6.0.
Appendix A, Microsoft Office SharePoint or Outlook Web Access: Deploying Agent for Microsoft IIS 6.0 provides information and instructions for deploying Agent for Microsoft IIS 6.0 to protect Microsoft Office SharePoint and Outlook Web Access.
Appendix B, Silent Installation of a Web Agent in Policy Agent 2.2 provides instructions for creating and using a script for automatic installation of a web agent in the Policy Agent 2.2 software set.
Appendix C, Troubleshooting a Web Agent Deployment provides troubleshooting instructions for problems that might occur in Policy Agent 2.2 for Microsoft IIS 6.0.
Appendix D, Web Agent AMAgent.properties Configuration File provides a list of the properties in the web agent AMAgent.properties configuration file in Policy Agent 2.2 for Microsoft IIS 6.0, with most properties being applicable to all the web agents in the Policy Agent 2.2 software set.
Appendix E, Error Codes provides a list of error codes that might be encountered during installation or configuration.
Sun Microsystems server documentation sets, some of which are mentioned in this preface, are available at http://docs.sun.com. These documentation sets provide information that can be helpful for a deployment that includes Policy Agent.
Policy Agent 2.2 was first introduced with Access Manager 7, but now also supports Access Manager 7.1. The information in the table that follows specifies documents in the Access Manager 7 documentation set, which is available at the following location:
http://docs.sun.com/app/docs/coll/1292.1
The Access Manager 7.1 documentation set is available at this location:
http://docs.sun.com/app/docs/coll/1292.2
Table P–1 Access Manager 7 2005Q4 Documentation Set
Title |
Description |
---|---|
Available after the product is released. Contains last-minute information, including a description of what is new in this current release, known problems and limitations, installation notes, and how to report issues with the software or the documentation. |
|
Provides an overview of how Access Manager components work together to consolidate identity management and to protect enterprise assets and web-based applications. Explains basic Access Manager concepts and terminology |
|
Sun Java System Access Manager 7 2005Q4 Deployment Planning Guide |
Provides information about planning a deployment within an existing information technology infrastructure |
Sun Java System Access Manager 7 2005Q4 Performance Tuning Guide |
Describes how to tune Access Manager and its related components. |
Sun Java System Access Manager 7 2005Q4 Administration Guide |
Describes how to use the Access Manager console as well as how to manage user and service data via the command line. |
Sun Java System Access Manager 7 2005Q4 Federation and SAML Administration Guide |
Provides information about the features in Access Manager that are based on the Liberty Alliance Project and SAML specifications. It includes information on the integrated services based on these specifications, instructions for enabling a Liberty-based environment, and summaries of the application programming interface (API) for extending the framework. |
Offers information on how to customize Access Manager and integrate its functionality into an organization’s current technical infrastructure. Contains details about the programmatic aspects of the product and its API. |
|
Provides summaries of data types, structures, and functions that make up the Access Manager public C APIs. |
|
Are generated from Java code using the JavaDoc tool. The pages provide information on the implementation of the Java packages in Access Manager. |
|
Sun Java System Access Manager Policy Agent 2.2 User’s Guide |
Provides an overview of Policy Agent software, introducing web agents and J2EE agents. Also provides a list of web agents and J2EE agents currently available. |
Updates to the Release Notes and links to modifications of the core documentation can be found on the Access Manager page at the Sun Java System 2005Q4 documentation web site. Updated documents are marked with a revision date.
Other Policy Agent guides, besides this guide, are available as described in the following sections:
The Sun Java System Access Manager Policy Agent 2.2 User's Guide is available in two documentation sets: the Access Manager documentation set as described in Table P–1 and in the Policy Agent 2.2 documentation set as described in this section.
The individual agents in the Policy Agent 2.2 software set, of which this book is an example, are available on a different schedule than Access Manager itself. Therefore, documentation for Access Manager and Policy Agent are available in separate sets, except for the Sun Java System Access Manager Policy Agent 2.2 User's Guide, which is available in both documentation sets.
The documentation for the individual agents is divided into two subsets: a web Policy Agent subset and a J2EE Policy Agent subset.
Each web Policy Agent 2.2 guide provides general information about web agents and installation, configuration, and uninstallation information for a specific web agent.
Each J2EE Policy Agent 2.2 guide provides general information about J2EE agents and installation, configuration, and uninstallation information for a specific J2EE agent.
The individual agent guides are listed along with supported server information in the following chapters of the Sun Java System Access Manager Policy Agent 2.2 User's Guide:
The Sun Java System Access Manager Policy Agent 2.2 Release Notes are available online after an agent or set of agents is released. The release notes include a description of what is new in the current release, known problems and limitations, installation notes, and how to report issues with the software or the documentation.
For useful information for related products, see the following documentation collections on the Sun Java Enterprise System documentation web site (http://docs.sun.com/prod/entsys.05q4)
Sun Java System Directory Server:
Sun Java System Web Server:
Sun Java System Application Server:
Sun Java System Message Queue:
Sun Java System Web Proxy Server:
For product downloads, professional services, patches and support, and additional developer information, go to the following:
If you have technical questions about this product that are not answered in the product documentation, go to:
http://www.sun.com/service/contacting
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
Sun is interested in improving its documentation and welcomes your comments and suggestions.
To share your comments, go to http://docs.sun.com and click Send Comments. In the online form, provide the document title and part number. The part number is a seven-digit or nine-digit number that can be found on the title page of the guide or at the top of the document.
For example, the title of this guide is Sun Java System Access Manager Policy Agent 2.2 Guide for Microsoft Internet Information Services 6.0, and the part number is 819-4771.
Sun Function |
URL |
Description |
---|---|---|
Documentation |
Download PDF and HTML documents, and order printed documents |
|
Support and Training |
Obtain technical support, download patches, and learn about Sun courses |
The following table describes the typographic changes that are used in this book.
Table P–2 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. Perform a patch analysis. Do not save the file. [Note that some emphasized items appear bold online.] |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–3 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt |
machine_name% |
C shell superuser prompt |
machine_name# |
Bourne shell and Korn shell prompt |
$ |
Bourne shell and Korn shell superuser prompt |
# |