The following sections explain how to configure the Access Gateway with a domain-base multi-homing service. The instructions assume that you have a functioning Novell Vibe server on Linux and a functioning Access Manager system (3.1 SP1 IR1 or higher) with a reverse proxy configured for SSL communication between the browsers and the Access Gateway.
The Vibe server needs to be configured to trust the Access Gateway to allow single sign-on with Identity Injection and to provide simultaneous logout. You also need to create an Access Gateway proxy service and configure it.
For information on other possible Access Gateway configurations, see “Teaming 2.0: Integrating with Linux Access Gateway”.
To use Novell Vibe as a protected resource of an Access Gateway and to use Identity Injection for single sign-on, the Vibe server needs a trusted relationship with the Access Gateway. With a trusted relationship, the Vibe server can process the authorization header credentials. The Vibe server accepts only a simple username (such as user1) and password in the authorization header.
This section explains how to set up the trusted relationship and how to enable simultaneous logout, so that when the user logs out of Vibe, the user is also logged out of the Access Gateway.
To configure the trusted relationship:
Log in to the Vibe server.
Stop the Vibe server with the following command:
/etc/init.d/teaming stop
Run the installer-teaming.linux script.
Accept the license agreement, then select
, then click .Confirm that your Vibe server is shut down, then select
, then click .Continue through the installation program until you reach the Network Information page. Ensure that you have a valid Host name specified. You will need this later in the installation.
Continue through the installation program until you reach the Reverse Proxy Configuration page. Specify the following configuration options:
Enable Access Gateway: Select this option to enable the reverse proxy access gateway.
Access Gateway address(es): Specify the IP address of the Access Gateway that is used for the connection to the Vibe server.
If the Access Gateway is part of a cluster, add the IP address for each cluster member. Wildcards such as 164.99.*.* are allowed.
When you specify IP addresses in this option, Vibe logins are allowed only from the specified addresses. Also, if Authorization header credentials are not present or are incorrect, the user is prompted for login using Basic Authentication.
Logout URL: Specify the URL of the published DNS name of the reverse proxy that you have specified for the ESP, plus /AGLogout.
You can find the domain used for the ESP by editing the LAG/MAG cluster configuration, then clicking
.For example, if the published DNS name of the proxy service that you have specified for the ESP is esp.yoursite.com, specify the following URL:
https://esp.yoursite.com/AGLogout
Use Access Gateway for WebDAV connections: Leave this option unselected.
Continue through the installation program to complete the reconfiguration process.
Start the Vibe server with the following command:
/etc/init.d/teaming start
Continue with Configuring a Reverse-Proxy Single Sign-On Service for Novell Vibe.
To configure a reverse-proxy single sign-on service for Vibe, complete the following tasks:
Before you can configure the domain-based proxy service, you need to create a new reverse proxy. For information on how to create a reverse-proxy, see Managing Reverse Proxies and Authentication
in Configuring the Access Gateway to Protect Web Resources
in the NetIQ Access Manager 3.2 SP1 Access Gateway Guide.
In the Administration Console, click Creating a New Reverse Proxy.
> > , then click the name of the reverse proxy that you created inClick the reverse proxy link that you have previously created. In the
, click , then fill in the following fields:Proxy Service Name: Specify a display name for the proxy service that the Administration Console uses for its interfaces.
Published DNS Name: Specify the DNS name you want the public to use to access your site. This DNS name must resolve to the IP address you set up as the listening address. For example, vibe.doc.provo.novell.com.
Web Server IP Address: Specify the IP address of the Vibe server.
Host Header: Select the
.Web Server Host Name: Because of your selection in the
field, this option is dimmed.Click
.Click the newly added proxy service, then select the
tab.Change the
to 8080.If the Linux Vibe server has port forwarding enabled, you do not need to change from the default port 80.
Click
.Click
.Continue with Configuring Protected Resources.
There are two policies that you need to create, LDAP Identity Injection, and X-Forwarded-Proto:
In the Administration Console, click
> .Select the policy container, then click
.Specify ldap_auth as the name for the policy, select for the type, then click .
(Optional) Specify a description for the injection policy. This is useful if you plan to create multiple policies to be used by multiple resources.
In the
section, click , then select .Fill in the following fields:
User Name: Select
> .Password: Select
> .Leave the default value for the Multi-Value Separator, which is comma.
Click
.To save the policy, click
, then click .For more information on creating such a policy, see Configuring an Authentication Header Policy
in the NetIQ Access Manager 3.2 Policy Guide.
When communicating over HTTPS from the browser to Access Manager, and over HTTP from Access Manager to Vibe, the X-Forwarded-Proto is a best practice. Vibe 3.3 was enhanced to take advantage of the HTTP header X-Forwarded-Proto.
In the Administration Console, click
> .Select the policy container, then click
.Specify x-forwarded as the name for the policy, select for the type, then click .
(Optional) Specify a description for the injection policy. This is useful if you plan to create multiple policies to be used by multiple resources.
In the
section, click , then select .Fill in the following fields:
Custom Header Name: Specify X-Forwarded-Proto as the name.
Value: Select https.
in the drop-down, then specifyLeave the other settings at the defaults.
Click
.To save the policy, click
, then click .For more information on creating such a policy, see Configuring an Authentication Header Policy
in the NetIQ Access Manager 3.2 Policy Guide.
You need to create three protected resources, one for HTML content, one for WebDAV content, and a public:
Create a protected resource for HTML content:
In the Basic auth with redirection for the name, then click .
, click , specify(Optional) Specify a description for the protected resource. You can use it to briefly describe the purpose for protecting this resource.
Specify a value for
For example, select the contract.Click the Edit icon.
In the dialog box that is displayed, fill in the following fields.
Contract: Select the
contract, which is same contract that you selected for the HTML content protected resource.Non-Redirected Login: Select this option.
Realm: Specify a name that you want to use for the Vibe server. This name does not correspond to a Vibe configuration option. It appears when the user is prompted for credentials.
Redirect to Identity Server When No Authentication Header is Provided: Select this option.
Click
twice.Create a public protected resource for Web Services:
In the public for the name, then click .
, click , specify(Optional) Specify a description for the protected resource. You can use it to briefly describe the purpose for protecting this resource.
For the
, select .Click
.In the /* path and add the following paths:
, remove the/ssf/atom/* /ssf/ical/* /ssf/ws/* /ssf/rss/* /ssr/* /rest/*
The /ssf/rss/* path enables non-redirected login for RSS reader connections. Vibe provides authentication for all of the paths listed above.
Click
.Create a protected resource for WebDAV content:
In the Basic auth without redirection for the name, then click .
, click , specify(Optional) Specify a description for the protected resource. You can use it to briefly describe the purpose for protecting this resource.
Specify a value for
For example, select the contract.Click the Edit icon.
In the dialog box that is displayed, fill in the following fields.
Contract: Select the
contract, which is same contract that you selected for the HTML content protected resource.Non-Redirected Login: Select this option.
Realm: Specify a name that you want to use for the Vibe server. This name does not correspond to a Vibe configuration option. It appears when the user is prompted for credentials.
Redirect to Identity Server When No Authentication Header is Provided: Do not select this option.
In the /* path and add the following path:
, remove the/ssfs/*
Click
twice.Assign the X-Forward-Proto Header policy to all three protected resources that you created:
Click
> > > .For each Vibe protected resource, click the
link, select the policy that you created, click , then click .Click
Assign the Identity Injection policy to two of the protected resources that you created, specifically
and . Do not assign this policy to the protected resource.Click
> > > .For each Vibe protected resource, click the
link, select the policy that you created, click , then click .Click
To save the configuration changes, click
> , then click .In the
, ensure that the protected resources you created are enabled.To apply your changes, click
> , then click .Continue with Disabling a Rewriter Profile.
In the Proxy Service List, ensure that the HTML Rewriter is disabled.
The recommended configuration for Novell Vibe is to configure Access Manager to forward cache control headers to the browser. For information on how to forward cache control headers to the browser, see Controlling Browser Caching
in the Configuring the Content Settings
in the NetIQ Access Manager 3.2 SP1 Access Gateway Guide.