Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Novell ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE Manual

Also see for ACCESS MANAGER 3.1 SP1 - ADMINISTRATION: ManualManualQuick start guideInstallation guideManual

Page 1 preview
Page 2 preview
Page 3 preview
Page 4 preview
Page 5 preview
Page 6 preview
Page 7 preview
Page 8 preview
Page 9 preview
Page 10 preview
Page 11 preview
Page 12 preview
Page 13 preview
Page 14 preview
Page 15 preview
Page 16 preview
Page 17 preview
Page 18 preview
Page 19 preview
Page 20 preview
Page 21 preview
Page 22 preview
Page 23 preview
Page 24 preview
Page 25 preview
Page 26 preview
Page 27 preview
Page 28 preview
Page 29 preview
Page 30 preview
Page 31 preview
Page 32 preview
Page 33 preview
Page 34 preview
Page 35 preview
Page 36 preview
Page 37 preview
Page 38 preview
Page 39 preview
Page 40 preview
Page 41 preview
Page 42 preview
Page 43 preview
Page 44 preview
Page 45 preview
Page 46 preview
Page 47 preview
Page 48 preview
Page 49 preview
Page 50 preview
Page 51 preview
Page 52 preview
Page 53 preview
Page 54 preview
Page 55 preview
Page 56 preview
Page 57 preview
Page 58 preview
Page 59 preview
Page 60 preview
Page 61 preview
Page 62 preview
Page 63 preview
Page 64 preview
Page 65 preview
Page 66 preview
Page 67 preview
Page 68 preview
Page 69 preview
Page 70 preview
Page 71 preview
Page 72 preview
Page 73 preview
Page 74 preview
Page 75 preview
Page 76 preview
Page 77 preview
Page 78 preview
Page 79 preview
Page 80 preview
Page 81 preview
Page 82 preview
Page 83 preview
Page 84 preview
Page 85 preview
Page 86 preview
Page 87 preview
Page 88 preview
Page 89 preview
Page 90 preview
Page 91 preview
Page 92 preview
Page 93 preview
Page 94 preview
Page 95 preview
Page 96 preview
Page 97 preview
Page 98 preview
Page 99 preview
Page 100 preview
Page 101 preview
Page 102 preview
Page 103 preview
Page 104 preview
Page 105 preview
Page 106 preview
Page 107 preview
Page 108 preview
Page 109 preview
Page 110 preview
Page 111 preview
Page 112 preview
Page 113 preview
Page 114 preview
Page 115 preview
Page 116 preview
Page 117 preview
Page 118 preview
Page 119 preview
Page 120 preview
Page 121 preview
Page 122 preview
Page 123 preview
Page 124 preview
Page 125 preview
Page 126 preview
Page 127 preview
Page 128 preview
Page 129 preview
Page 130 preview
Page 131 preview
Page 132 preview
Page 133 preview
Page 134 preview
Page 135 preview
Page 136 preview
Page 137 preview
Page 138 preview
Page 139 preview
Page 140 preview
Page 141 preview
Page 142 preview
Page 143 preview
Page 144 preview
Page 145 preview
Page 146 preview
Page 147 preview
Page 148 preview
Page 149 preview
Page 150 preview
Page 151 preview
Page 152 preview
Page 153 preview
Page 154 preview
Page 155 preview
Page 156 preview
Page 157 preview
Page 158 preview
Page 159 preview
Page 160 preview
Page 161 preview
Page 162 preview
Page 163 preview
Page 164 preview
Page 165 preview
Page 166 preview
Page 167 preview
Page 168 preview
Page 169 preview
Page 170 preview
Page 171 preview
Page 172 preview
Page 173 preview
Page 174 preview
Page 175 preview
Page 176 preview
Page 177 preview
Page 178 preview
Page 179 preview
Page 180 preview
Page 181 preview
Page 182 preview
Page 183 preview
Page 184 preview
Page 185 preview
Page 186 preview
Page 187 preview
Page 188 preview
Page 189 preview
Page 190 preview
Page 191 preview
Page 192 preview
Page 193 preview
Page 194 preview
Page 195 preview
Page 196 preview
Page 197 preview
Page 198 preview
Page 199 preview
Page 200 preview
Page 201 preview
Page 202 preview
Page 203 preview
Page 204 preview
Page 205 preview
Page 206 preview
Page 207 preview
Page 208 preview
Contents
  1. legal notices
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. About This Guide
  7. additional documentation
  8. Configuring the Access Gateway to Protect Web Resources
  9. Creating a Reverse Proxy and Proxy Service
  10. Configuring a Proxy Service
  11. Configuring the Web Servers of a Proxy Service
  12. Configuring Protected Resources
  13. Setting Up a Protected Resource
  14. Understanding URL Path Matching
  15. Modifying Authentication Procedures
  16. Assigning an Authorization Policy to a Protected Resource
  17. Assigning an Identity Injection Policy to a Protected Resource
  18. Assigning a Form Fill Policy to a Protected Resource
  19. Assigning a Policy to Multiple Protected Resources
  20. Configuring Protected Resources for Specific Applications
  21. Configuring a Protected Resource for a SharePoint Server with an ADFS Server
  22. Configuring a Protected Resource for Outlook Web Access
  23. Configuring a Protected Resource for a Novell Teaming 2.0 Server
  24. Configuring HTML Rewriting
  25. Understanding the Rewriting Process
  26. Specifying the DNS Names to Rewrite
  27. Defining the Requirements for the Rewriter Profile
  28. Configuring the HTML Rewriter and Profile
  29. Disabling the Rewriter
  30. Configuring Connection and Session Limits
  31. Configuring TCP Connect Options for Web Servers
  32. Configuring Connection and Session Persistence
  33. Configuring the Access Gateway for SSL
  34. Prerequisites for SSL
  35. Configuring SSL Communication with the Browsers and the Identity Server
  36. Configuring SSL between the Proxy Service and the Web Servers
  37. Enabling Secure Cookies
  38. Securing the Proxy Session Cookie
  39. Managing Access Gateway Certificates
  40. Server Configuration Settings
  41. Saving, Applying, or Canceling Configuration Changes
  42. Starting and Stopping the Access Gateway
  43. Updating the Access Gateway
  44. Starting the Access Gateway Service Provider
  45. Stopping the Access Gateway Appliance
  46. Changing the Name of an Access Gateway and Modifying Other Server Details
  47. Setting the Date and Time
  48. Customizing Error Pages on the Gateway Appliance
  49. Customizing the Error Pages by Using the Default Template
  50. Customizing and Localizing Error Messages
  51. Configuring Network Settings
  52. Viewing and Modifying Gateway Settings
  53. Viewing and Modifying DNS Settings
  54. Configuring Hosts
  55. Adding New Network Interfaces to the Gateway Appliance
  56. Customizing Logout Requests
  57. Configuring X-Forwarded-For Headers
  58. Exporting the Configuration
  59. Importing the Configuration
  60. Cleaning Up and Verifying the Configuration
  61. Access Gateway Maintenance
  62. Interpreting Log Messages
  63. Configuring Logging of SOAP Messages and HTTP Headers
  64. Configuring Proxy Service Logging
  65. Calculating Rollover Requirements
  66. Enabling Logging
  67. Configuring Common Log Options
  68. Configuring Extended Log Options
  69. Configuring the Size of the Log Partition
  70. Viewing Cluster Statistics
  71. Monitoring Access Gateway Alerts
  72. Configuring Access Gateway Alerts
  73. Enabling Access Gateway Audit Events
  74. Managing Server Health
  75. Monitoring the Health of an Access Gateway
  76. Viewing the Health of an Access Gateway Cluster
  77. Viewing the Command Status of the Access Gateway
  78. Viewing Detailed Command Information
  79. Configuring the Content Settings
  80. Controlling Browser Caching
  81. Configuring Custom Cache Control Headers
  82. Understanding How Custom Cache Control Headers Work
  83. Enabling Custom Cache Control Headers
  84. Configuring a Pin List
  85. URL Mask
  86. Pin Type
  87. Purging Cached Content
  88. Protecting Multiple Resources
  89. Setting Up a Group of Web Servers
  90. Using Multi-Homing to Access Multiple Resources
  91. Path-Based Multi-Homing
  92. Virtual Multi-Homing
  93. Creating a Second Proxy Service
  94. Configuring a Path-Based Multi-Homing Proxy Service
  95. Managing Multiple Reverse Proxies
  96. Changing the Authentication Proxy Service
  97. Managing a Cluster of Access Gateways
  98. Managing the Servers in the Cluster
  99. Changing the Primary Cluster Server
  100. Troubleshooting the Linux Access Gateway
  101. Useful Tools
  102. The Linux Access Gateway Console
  103. Viewing Configuration Information
  104. Useful Files for Troubleshooting the Access Gateway Appliance
  105. Using Touch Files
  106. Protected Resource Issues
  107. Troubleshooting HTTP 1.1 and GZIP
  108. Protected Resources Referencing Non-Existent Policies
  109. Gateway
  110. Recovering from a Hardware Failure on an Access Gateway Machine
  111. COS Related Issues
  112. Memory Issues
  113. Rewriter Issues
  114. Reading Configuration Files
  115. Additional DNS Name Without a Scheme Is Not Rewritten
  116. The Access Gateway Hangs When the Audit Server Comes Back Online
  117. Troubleshooting a Failed Linux Access Gateway Configuration
  118. Linux Access Gateway Not Responding
  119. Connection and Authentication Issues
  120. Authentication Issues
  121. Form Fill Issues
  122. Form Fill Error Messages
  123. Authorization and Identity Injection Issues
  124. Identity Injection Failures