SSL Termination between Gateway and Portal Server at Load Balancer means that SSL traffic between Gateway and the Portal Server is terminated at the Load Balancer. SSL communication has an overhead of encrypting and decrypting that affects performance.
Assume there are two instances of Portal Server: PS1 and PS2 on Node 1 and Node 2 respectively. Gateway is on Node 3 and Load Balancer is on Node 4 — between Gateway and Portal Server instances. Access Manager (AM) instances are on Portal Server (PS) instances. Assume there are two instances for Access Manager and Portal Server: Gateway —> Load Balancer —> Portal Server instances (PS 1, PS 2....and so on).
On Node 1, install Portal Server, Access Manager, and Directory Server.
Use Java ES 5 or Java ES Update 1 installer for installing Access Manager and Directory Server. Use Portal Server 7.2 GUI installer for installing Portal Server 7.2.
Start the web container and Directory Server and ensure that Portal Server is accessible, to check whether everything is installed properly on Node 1.
On Node 3, install Gateway and Access Manager SDK and point to Portal Server on Node 1. Ensure that you can login to Portal Server through Gateway on Node 1.
Now, you have setup a single Gateway and Portal Server without a Load Balancer.
On Node 2, install Application Server 9.1 to create Access Manager and Portal Server instances.
Login to Access Manager (on Node 1) Administration Console, through a web browser. In the Organization Aliases listbox on the right side with entries Node1.domain.com and domain, add the Node2.domain.com entry.
Click Service Configuration -> Platform. In the Platform Server List, add the http://Node2.domain.com:port entry.
On Node 2, install Access Manager. Point to Directory Server on Node 1. Restart Application Server 9.1 on Node 2 and ensure that the Access Manager Administration Console is accessible.
Create a Portal Server instance on Node 2.
Install Portal Server 2 in the Configure Later mode.
Modify the Webcontainer.properties.SJSAS9.1 and run the following command.
./psadmin create-instance -u amadmin -f ps-password -p portal-id -w /opt/SUNWportal/template/Webcontainer.properties.SJSAS91
Restart Application Server 9.1 and access the newly created Portal Server instance.
Install Load Balancer on Node 4. This can be a software or a hardware load balancer. Ensure that you can load balance Access Manager and Portal Server URIs through this SSL instance of Load Balancer.
Access Portal Server Administration Console on Node 1 or Node 2.
Go to Secure Remote Access -> default. In the Portal Servers list box, remove the existing entry. Add the https://Node4.domain.com:port/portal entry in the list box.
In the URLs to which User Session Cookie is Forwarded list box, add the following URLs and save:
http://Node1.domain.com:port http://Node1.domain.com:port/portal http://Node2.domain.com:port http://Node2.domain.com:port/portal https://Node4.domain.com:port https://Node4.domain.com:port/portal |
Click the Security Tab. In the Non-Authenticated URL list, add the following URLs to the existing URLs:
http://Node2.domains.com:port/amserver/css http://Node2.domain.com:port/amserver/login_images, http://Node2.domain.com:port/amserver/js http://Node2.domain.com:port/amconsole/console/js http://Node2.domain.com:port/amconsole/console/images http://Node2.domain.com:port/amconsole/console/css http://Node2.domain.com:port/amserver/images https://Node4.domains.com:port/amserver/css https://Node4.domain.com:port/amserver/login_images, https://Node4.domain.com:port/amserver/js https://Node4.domain.com:port/amconsole/console/js https://Node4.domain.com:port/amconsole/console/images https://Node4.domain.com:port/amconsole/console/css https://Node4.domain.com:port/amserver/images |
On Node 1 and Node 2, run the following command to populate Non-Authenticated URL list under the default Gateway profile:
./psadmin provision-sra -u amadmin -f ps_password -p portal-id --gateway-profile default --enable ./psadmin provision-sra -u madmin -f ps_password --loadbalancer-url https://Node4.domain.com:port/portal --console --console-url https://Node4.domain.com:port/psconsole -gateway-profile default ----enable |
On Node 1, open the /etc/opt/SUNWam/config/AMConfig.properties file and do following:
Add the following line: com.sun.identity.server.fqdnMap[Node4.domain.com]=Node4.domain.com
Edit the line: com.sun.identity.loginurl=https://Node4.domain.com:port/amserver/UI/Login
com.iplanet.am.jssproxy.trustAllServerCerts=true
On Node 1 and Node 2, add a Certificate Authority Root CA certificate to JVM keystore:
cd /usr/jdk/entsys-j2se/jre/lib security /usr/jdk/entsys-j2se/jre/bin/keytool -keystore cacerts -keyalg RSA import -trustcacerts -alias "Node1.domain.com" -storepass changeit -file path-to-rootca-certificate |
On Node 1 and Node 2, run the following command.
psadmin set-attribute -u amadmin -f ps-password p portal1 -m desktop -a AccessURL "https://Node4.domain.com:port" |
On Node 2, repeat the above step. Restart Application Server 9.1 and Common Agent Container.
Install server certificate and Root CA certificate on Gateway Node from the same Certificate Authority from where Load Balancer was assigned certificate.
Point the Gateway to Load Balancer instead of Portal Server and Access Manager on Node 1. Do the following on the Gateway Node.
In the platform.conf.default file, change gateway.ignoreServerList to true.
In the platform.conf.default file, change gateway.dsame.agent to https\://Node4.domain.com\:port/portal/RemoteConfigServlet.
In the AMConfig-default.properties and AMConfig.properties files, change the Access Manager related information as follows:
com.iplanet.am.server.host=Node4.domain.com com.iplanet.am.server.port=load-balancer-port com.iplanet.am.console.protocol=https com.iplanet.am.console.host=Node4.domain.com com.iplanet.am.console.port=load-balancer-port com.iplanet.am.profile.host=Node4.domain.com com.iplanet.am.profile.port=load-balancer-port com.iplanet.am.naming.url=https://Node4.domain.com:load-balancer-port/amserver/namingservice com.iplanet.am.notification.url=https://Node4.domain.com:load-balancer-port/amserver/notificationservice |
Restart the Gateway and access it.