Sun Java System Portal Server Secure Remote Access 7.2 Administration Guide

Preface

This guide explains how to administer the Sun JavaTM System Portal Server Secure Remote Access 7.2 server.

The Sun Java System Portal Server Secure Remote Access (SRA) server enables remote users to securely access their organization's network and its services over the Internet. Additionally, the SRA provides your organization with a secure internal portal, providing access to content, applications, and data to any targeted audiences such as employees, business partners, or the general public.

This preface has the following sections:

Who Should Use This Book

The Sun Java System Portal Server Secure Remote Access 7.2 Administration Guide is intended for users that configure and administer the Secure Remote Access server.

The Sun Java System Portal Server Secure Remote Access 7.2 Administration Guide assumes that you are a network or system administrator experienced in managing UNIX systems and TCP/IP networks. You do not need root access to the required machines for installing the various components of the Secure Remote Access server. You do need the required administrative privileges to carry out other operations such as configuring users and services.

Before You Read This Book

Portal Secure Remote Access server administrators should understand the following technology:

You also need to know the following to be able to write Rewriter rules:

How This Book Is Organized

This book is organized as follows:

Related Books

An introduction to Portal Server concepts and components is available in the Sun Java System Portal Server 7.2 Technical Overview.

Other Server Documentation

For other server documentation, go to the following:

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.


Note –

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Documentation, Support, and Training

The Sun web site provides information about the following additional resources:

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P–1 Typographic Conventions

Typeface 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories, and onscreen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with onscreen computer output 

machine_name% su

Password:

aabbcc123

Placeholder: replace with a real name or value 

The command to remove a file is rm filename.

AaBbCc123

Book titles, new terms, and terms to be emphasized 

Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–2 Shell Prompts

Shell 

Prompt 

C shell 

machine_name%

C shell for superuser 

machine_name#

Bourne shell and Korn shell 

$

Bourne shell and Korn shell for superuser 

#