You need a fully-functioning Access Manager deployment.
The tasks in this section are required regardless of the approach you choose. In this procedure you will install and register a WebGate, which configures an Application Domain to protect resources. Then you verify that the environment is working with an authentication scheme other than Kerberos.
See Also:
High Availability Guide for details about high availability environments with two or more Managed Servers configured to operate as a cluster