This guide explains how to administer the Sun JavaTM System Portal Server Secure Remote Access 7.2 server.
The Sun Java System Portal Server Secure Remote Access (SRA) server enables remote users to securely access their organization's network and its services over the Internet. Additionally, the SRA provides your organization with a secure internal portal, providing access to content, applications, and data to any targeted audiences such as employees, business partners, or the general public.
This preface has the following sections:
The Sun Java System Portal Server Secure Remote Access 7.2 Administration Guide is intended for users that configure and administer the Secure Remote Access server.
The Sun Java System Portal Server Secure Remote Access 7.2 Administration Guide assumes that you are a network or system administrator experienced in managing UNIX systems and TCP/IP networks. You do not need root access to the required machines for installing the various components of the Secure Remote Access server. You do need the required administrative privileges to carry out other operations such as configuring users and services.
Portal Secure Remote Access server administrators should understand the following technology:
Sun Java System Portal Server
Sun Java System Directory Server
Sun Java System Access Manager
Your web container, such as:
Sun Java System Application Server 8.2
Sun Java System Web Server 7.0
Your operating system
Basic UNIX® administrative procedures
Lightweight Directory Access Protocol (LDAP)
Web Services for Remote Portlets (WSRP)
You also need to know the following to be able to write Rewriter rules:
Understanding of Hypertext Markup Language (HTML) and HTML tags
A fair knowledge of JavaScriptTM
Basic knowledge of Extensible Markup Language (XML)
This book is organized as follows:
Part I, Secure Remote Access Server Components
Chapter 1, Introduction to Portal Server Secure Remote Access Server describes the relationship between Sun Java System Portal Server and Portal Server Secure Remote Access.
Chapter 2, Working With Gateway explains Gateway related concepts and tasks to manage the Gateway.
Chapter 3, Working With Proxylet describes Proxylet, which enables users to access intranet web pages through the Gateway without parsing the web pages.
Chapter 4, Working with Rewriter describes how to access the intranet web pages through the Gateway using Proxylet and Rewriter.
Chapter 5, Working with NetFile describes how to access and operate remote file systems and directories using NetFile.
Chapter 6, Working with Netlet explains how to securely run common TCP/IP services over insecure networks such as the Internet using Netlet.
Part II, Configuring the Secure Remote Access Server
Chapter 7, Configuring the Secure Remote Access Server Access Control describes how to manage access to the Portal Server administration console.
Chapter 8, Configuring the Secure Remote Access Gateway explains how to configure the Gateway attributes from the Portal Server management console.
Chapter 9, Configuring Rewriter in the Gateway Service explains how you can use Gateway services under the Rewriter tab to perform various tasks.
Chapter 10, Working with Certificates describes managing certificates and installing self-signed certificates from a Certificate Authority.
Chapter 11, Configuring the Netlet describes configuring the Netlet attributes from the Portal Server management console.
Chapter 12, Configuring Netlet With Private Domain Certificates describes configuring the client browser’s Java Plug–in, so that Netlet can be used with PDC.
Chapter 13, Configuring Proxylet describes configuring Proxylet from the Portal Server management console.
Chapter 14, Configuring NetFile describes using the Portal Server management console to set up NetFile options, privileges, and preferences.
Chapter 15, Configuring Secure Socket Layer Accelerators describes configuring various accelerators for Portal Server Secure Remote Access Server.
Part III, Managing the Secure Remote Access Server
Chapter 16, Managing the Gateway explains the way to create a Gateway Profile and Gateway instances.
Chapter 17, Federation Management Scenarios explains the various scenarios in maintaining a network identity.
Appendix A, Configuration Attributes describes attributes that you can configure for Sun Java System Portal Server Secure Remote Access through the Portal Server administration console for each Portal Server Secure Remote Access component.
Appendix B, Log Files contain debug and other types of information.
Appendix C, Country Codes lists the two-letter country codes that you need to specify during certificate administration.
An introduction to Portal Server concepts and components is available in the Sun Java System Portal Server 7.2 Technical Overview.
For other server documentation, go to the following:
Directory Server documentation at http://docs.sun.com/coll/1224.1
Access Manager documentation at http://docs.sun.com/coll/1292.2
Web Server documentation at http://docs.sun.com/coll/1308.3
Application Server documentation at http://docs.sun.com/coll/1310.3
Web Proxy Server documentation at http://docs.sun.com/coll/1311.4
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |