Reverse Proxy Deployment Guide

Size: px
Start display at page:

Download "Reverse Proxy Deployment Guide"

Transcription

1 Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later

2 Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Symantec Corporation 350 Ellis Street Mountain View, CA Rest of the World: Symantec Limited Ballycoolin Business Park Blanchardstown, Dublin 15, Ireland 2

3 Contents About Reverse Proxy 4 Pre-Deployment Checklist 6 Deploy a Reverse Proxy 7 Virtual IP 8 Create an HTTP Service for Your Reverse Proxy 9 Create an HTTPS Service for Your Reverse Proxy 11 Create an SSL Certificate Keyring 13 Set up a Basic Policy 14 Authenticating Users 15 Configure an IWA Authentication Realm 16 Create an LDAP-Based Authentication Realm 17 Configure a Local Authentication Realm 18 Create a RADIUS Authentication Realm 19 SAML Authentication 20 Authentication Policy 23 Authentication Modes 23 Advanced Policy Tasks 25 Two-Way URL Rewrite 26 ProxyAV Integration 27 Regional Access Control 28 Monitoring Users and Resources 30 Monitoring the Appliance 31 SNMP Monitoring 32 Monitor User Activity 33 3

4 About Reverse Proxy A reverse proxy acts as a front-end for general purpose Web, FTP, streaming, and other content servers, typically to secure those servers and improve access performance. In a typical Blue Coat reverse proxy implementation, web applications reside behind a firewall, which forwards traffic to the secured ProxySG inside environment. Because the firewall allows only the ProxySG to communicate with the web application. Potential attackers would need to bypass both the firewall and the ProxySG appliance, which obscures the internal URL structure of the content server from external users. Restricting access to the content servers to only the ProxySG's IP address provides further security. In addition to securing your content and application servers, The ProxySG appliance further improves user access in the following ways: User Authentication Functioning as an intermediary between users on the Internet and your content servers, the ProxySG can challenge users to authenticate, or transparently check for existing authentication credentials. Supported authentication servers include Windows Active Directory, SiteMinder, and Oracle, with authentication methods ranging from Integrated Windows Authentication to SAML. Real-Time Virus, Malware and Trojan Scanning When deployed in conjunction with your ProxySG Reverse Proxy, a ProxyAV appliance can scan the data users upload to your content and application servers for most of today's Internet-borne threats. SSL Encryption and Termination Reducing the resource load on your content and application servers, the Reverse Proxy solution can terminate HTTPS connections from users and forward those connections to the server using HTTP. User connections remain secure with the proxy translating HTTP responses into HTTPS. Ensuring protocol compliance, limiting exposure to vulnerabilities based on non-rfc-compliant attacks. HTTP Compression To further expedite delivery of Web applications, the ProxySG provides built-in gzip and deflate HTTP compression support. These compression services effectively reduce the bandwidth required for serving content. Content Acceleration With an optimized TCP stack, the ProxySG appliance can serve HTTP and HTTPS content very quickly. Chief among the methods the appliance uses to accelerate content are object pipelining (retrieving several related elements at the same time) and adaptive refresh, where content stored in cache is evaluated regularly for freshness based on how frequently it is requested. With these advanced caching measures in place, the strain on your content servers is greatly reduced. 4

5 Typical Reverse Proxy Deployment With your ProxySG appliance deployed as detailed in the proceeding image, your content servers remain protected while the proxy transparently processes Internet-based requests for access. 5

6 Pre-Deployment Checklist Before you configure your ProxySG appliance to handle incoming traffic from the Internet, there are a few things that need to be set up. Public DNS Resolution To enable Internet users to reach your web server, you'll need to have a public DNS record set up. When you have identified the dedicated public IP address you'll be using for this web server, contact a DNS hosting service to have them translate your domain name, ( to that public IP address. Firewall configuration and port forwarding With a public IP address defined to accept traffic at your network's edge, configure your firewall to forward traffic to the ProxySG Appliance's internal IP address. This is known as port forwarding or Virtual IP addressing, depending on the firewall vendor For security, only forward the ports for which your web server serves data. Typically, that's TCP ports 80 and 443 for HTTP and HTTPS, and in some cases, FTP on TCP port 21. If your firewall provides Intrusion Detection or Prevention, (IDS/IPS) functionality or inspects and controls the flow of data, be sure to consult the manufacturer's documentation for managing these security services when hosting websites. Initial setup of your ProxySG Appliance Follow the steps to cable and configure your ProxySG Appliance in the Quick Start Guide provided with your hardware. This information is also available at Extra Blue Coat Security: ProxyAV If you would like to secure your reverse proxy infrastructure and the content that flows in and out of your network, Blue Coat recommends deploying a ProxyAV Appliance. Please see the ProxySG/AV Integration Guide at for help with initial ProxyAV configuration tasks. 6

7 Deploy a Reverse Proxy The topics in this chapter will guide you through the initial steps of configuring your ProxySG appliance as a Reverse Proxy. Virtual IP 8 Create an HTTP Service for Your Reverse Proxy 9 Create an HTTPS Service for Your Reverse Proxy 11 Create an SSL Certificate Keyring 13 Set up a Basic Policy 14 7

8 Virtual IP A Virtual IP address (VIP) is an IP address that can configured on the ProxySG appliance to take the place of a physical IP. This is especially useful if you will be configuring your appliance to handle multiple Reverse Proxy-hosted websites on the same TCP port. If your deployment serves only a single host, VIP configuration and use is optional. 1. Log in to the web-based management console 2. Browse to the Configuration tab > Network > Advanced. 3. In the VIPs Tab, click New. The Add Virtual IP dialog appears.. 4. Enter the IP Address. The IP address must be unique and congruent with the other IP addresses defined on the appliance. In your initial planning stages, this is the IP address that will be used to handle incoming traffic from either your Edge Firewall or if your ProxySG Appliance is not protected by a Firewall, the public address defined in public DNS for your website. 5. Click OK to create the VIP object. 6. Click Apply to save this object to your ProxySG's configuration. 8

9 Create an HTTP Service for Your Reverse Proxy This topic explains how to configure a listener for reverse proxy. This object contains the IP address and TCP port that the ProxySG Appliance will use to intercept traffic from the Internet or your edge firewall. 1. Log in to the web-based management console. 2. Browse to the Configuration tab > Services > Proxy Services. 3. Click the New Service button at the bottom of the page. 4. Enter a name for the new service. 5. Choose the type of Proxy Service that will be used. Proxy service types are responsible for how the ProxySG Appliance interprets and manages the traffic being passed through the service. Choose HTTP to handle a simple HTTP-based web site. 6. Enable Detect Protocol. 7. Disable the Enable ADN check mark. 8. In the Listeners section, New. 9

10 9. The Source Address configuration is used to restrict the source of clients connecting through this service. Unless your Reverse Proxy is deployed in a completely closed environment, we recommend to leave this at the default setting, All. 10. The Destination Address section is used to define the address the ProxySG is monitoring for connections that are relevant to this Reverse Proxy configuration. This can be either a physical IP address already assigned to one of the ProxySG's interfaces or a Virtual IP (or VIP) Address you've configured previously. See Creating a Virtual IP Address for steps to add a VIP to your ProxySG Appliance configuration. 11. Define a port or a range or ports that the appliance will monitor for connections. If you plan to add multiple ports for your Reverse Proxy configuration, define only one port number per service object and repeat for as many ports as you'll be configuring. 12. Set the Action to Intercept. 13. Click OK to create the new Service Object. 14. Click Apply to save the configuration. 10

11 Create an HTTPS Service for Your Reverse Proxy This topic will guide you through configuring a listener for your secure reverse proxy. This object contains the IP address and TCP port that the ProxySG Appliance will use to intercept traffic from the Internet or your edge firewall. 1. Log in to the ProxySG's web-based management console. 2. Browse to the Configuration tab > Services > Proxy Services.. 3. Click the New Service button at the bottom of the page. 4. Enter a name for the new service. 5. Choose the type of Proxy Service that will be used. Proxy service types are responsible for how the ProxySG Appliance interprets and manages the traffic being passed through the service. Choose HTTPS Reverse Proxy for this configuration. 6. Select the Keyring you've created for this configuration. If you have not yet done so, please follow the steps in the topic, Create a New Keyring. 7. Select the CA Certificate List that will be used to validate the certificate being presented to users. <All CA Certificates> is the default here, and will suffices for most configurations. 11

12 8. Enable support for SSL protocols. SSL v3 and v2 are not enabled by default as they are not recommended due to their insecure nature. 9. Disable the Enable ADN check mark. 10. In the Listeners section, click New. 11. The Source Address configuration is used to restrict the source of clients connecting through this service. Unless your Reverse Proxy is deployed in a completely closed environment, we recommend to leave this at the default setting, All. 12. The Destination Address section is used to define the address the ProxySG is monitoring for connections that are relevant to this Reverse Proxy configuration. This can be either a Physical IP address already assigned to one of the ProxySG's interfaces or a Virtual IP (or VIP) Address you've configured previously. See Creating a Virtual IP Address for steps to add a VIP to your ProxySG Appliance configuration. 13. Define a port or a range or ports that the appliance will monitor for connections. If you plan to add multiple ports for your Reverse Proxy configuration, define only one port number per Service Object and repeat for as many ports as you'll be configuring. For a standard HTTPS web server, enter 443 as the port number. 14. Set the Action to Intercept. 15. Click OK to create the new service object. 16. Click Apply to save the configuration. 12

13 Create an SSL Certificate Keyring If your Reverse Proxy deployment hosts HTTPS websites or services, the certificate for those services can be served from the ProxySG appliance. This relieves the web server behind the appliance from having to spend resources managing SSL termination. The connection between the ProxySG appliance and the server running web services can then be HTTPbased. 1. Browse to the Configuration tab > SSL > Keyrings and click Create. 2. Enter a name for the new keyring. 3. Select Show Key Pair to permit backup and portability of the configuration and click OK. 4. Click Apply to commit the configuration to your appliance. 5. Select the new keyring from the list and click the Edit button 6. Generate a Certificate Signing Request (CSR) by clicking the Create button. The Create CSR dialog displays. 7. Complete the form, paying close attention to the Common Name field. This should be a hostname or FQDN that resolves to the ProxySG appliancefrom outside of your protected network. This is the first step in ensuring that Internet-based browsers can trust the certificate the proxy presents. When you've completed the form, click OK, Close then Apply. 8. Edit the keyring again and you will find the Certificate Signing Request field has created a CSR in PKCS#10 format. Highlight the text from -----BEGIN CERTIFICATE REQUEST to -----END CERTIFICATE REQUEST and copy using CTRL+C (or on Apple systems, the Apple key and C) to copy to your system's clipboard. 9. Paste the CSR into a new text file on your local workstation. Save the file with a.csr extension. 10. Send the CSR to be signed by a Certificate Authority (CA). The CA should provide you with a Root CA certificate as well as a server certificate. In some cases, an intermediate CA certificate is also provided. 11. Edit the keyring again. This time, click the Import button under Certificate. 12. Paste the certificates into the Import Certificate text box that appears. The server certificate should be listed first, followed by the intermediate. The CA certificate should be pasted into this field last. When all certificates have been entered into the text box, click OK, Close and Apply. 13

14 Set up a Basic Policy The ProxySG appliance uses policy to control how users on the Internet to access your content servers. The steps below will guide you through creating policy to permit user access and to forward their requests to your back-end content server (s). 1. Log in to the web-based management console. 2. Browse to the Configuration tab > Policy > Visual Policy Manager and click Launch. 3. From the menu at the top of the Visual Policy Manager (VPM) click Policy > Add Web Access Layer 4. Right-click the Destination field in the rule that's been created, click Set > New > Request URL. 5. Enter the domain name users will use to access the reverse proxy web site. 6. Click Add, Close and OK. 7. Right-click the Action field, click Allow. 8. From the menu at the top of the VPM, click Policy > Add Forwarding Layer. 9. Right-click the Destination field, click Set > New Server URL. 10. Enter the domain name users will use to access the reverse proxy web site. 11. Right-click the Action field. 12. Click Set > New > Select Forwarding. 13. Name the object, (for example, MyWebServer) 14. Under Forward To, select the forwarding host you created earlier. 15. Click Add>> to add the forwarding host to the box on the right. 16. Click OK, OK. 17. Click Install Policy. 14

15 Authenticating Users There are many options available on the ProxySG Appliance for securing user access to your web server. Based on your existing security infrastructure, find the steps for configuring each type of authentication realm in this chapter. Configure an IWA Authentication Realm 16 Create an LDAP-Based Authentication Realm 17 Configure a Local Authentication Realm 18 Create a RADIUS Authentication Realm 19 SAML Authentication 20 Authentication Policy 23 Authentication Modes 23 15

16 Configure an IWA Authentication Realm If your enterprise environment uses a Windows domain and Integrated Windows Authentication (IWA), the ProxySG appliance can communicate with it to authenticate incoming users and authorize their access to web servers in your protected network. Join the ProxySG applianceto the Domain. 1. Browse to the Configuration tab > Authentication > Windows Domain. 2. Enter a hostname for your ProxySG appliancein the Hostname field. This same hostname must be configured in your internal DNS server if you will be using Kerberos IWA authentication. 3. Click Add New Domain. 4. Enter a text label for the new domain entry. Use the same name you defined in the hostname field and click OK and Apply. 5. Select the entry in the Domains list and click the Join button. 6. Enter the Windows Active Directory domain name in the DNS Domain Name field and a domain administrator account with password into the subsequent fields. When done, click OK. 7. A confirmation dialog box is displayed to report success or failure in joining the domain. Configure the Authentication Realm 1. Browse to the Configuration tab > Authentication > IWA 2. Click New and set a name for the IWA realm. Choose Direct and select the domain you created earlier, then click OK and Apply. Test the configuration 1. Click the IWA Servers tab in Authentication > IWA 2. Click the Test Configuration button. A prompt is displayed to enter a username and password. Enter a user name and password for an account in the Active Directory and click OK to see the results of the test. 16

17 Create an LDAP-Based Authentication Realm In order for your ProxySG applianceto authenticate users against an LDAP server, you need to create an LDAP realm. Follow the steps below to configure an LDAP authentication realm. For more information on LDAP realm support and advanced configuration items, please see the Authentication WebGuide at 1. In the web-based management console, browse to Configuration > Authentication > LDAP. 2. In the LDAP Realms tab, click New. 3. Enter a name for the new realm, choose the type of LDAP server and enter the server host IP address. Click OK. 4. Click the LDAP Servers tab to define: a. LDAP Protocol Version used by your LDAP directory. b. Enable the Follow Referrals check box if your LDAP directories are distributed across several servers that use continuation references. This option allows your searches to follow referrals and return all matching entries found during a search operation. c. Select the Case Sensitive check box if your LDAP directory uses case-sensitive values for the user names and passwords. d. Enter the IP address for your alternate LDAP directory server, if present, in the Alternate Server Host field. 5. Click the LDAP DN tab to configure the base Distinguished Names that will be used to match user and group names within the LDAP tree. a. Click New to create a new Base DN object. b. Enter the base DN, based on your LDAP structure, to identify the point at which user objects will be searched. 6. Click the LDAP Search & Groups tab to define a Base DN; a set of user credentials that the ProxySG appliancewill use to perform searches against the LDAP directory. a. Enable the Anonymous search allowed check box if your LDAP structure supports it,. If not, remove the check mark. b. In the Search user DN field, enter the LDAP account that will be used to perform LDAP searches, in LDAP structure (for example, cn=bc_admin,cn=users,dc=acme,dc=com). c. Click the Change Password button to enter the password for the search account. d. (Optional) To support nested group searches, enable the Nested Groups Support check box. 7. Click Apply to save your LDAP Realm configuration. 17

18 Configure a Local Authentication Realm Follow these steps to configure a Local authentication realm and some users. 1. Log in to the web-based management console. 2. Browse to the Configuration tab > Authentication > Local 3. In the Local Realms tab, click New. 4. Enter a name for the local realm. For this example, "Local" will be used as the realm name. 5. Click the Local Main tab. Make note of the local user list name, as it will be necessary in the next section. 6. Click Apply. User and group definitions are managed from the Command Line Interface (CLI). The steps below will guide you through creating users and groups. 1. Log in to the CLI and enter enable and configuration terminal mode. 2. At the (config) prompt, type: security local-user-list edit local_user_database 3. Add a group with the following command: group create users 4. (optional) Add another group with the following command: group create administrators 5. Create user accounts with the following steps: user create user1 6. Edit the user account to define the password and user group details for the user account: user edit user1 7. Create a password for the account by entering: password (Replace with an appropriate password) 8. (optional) Associate this user account with a local user group with the command: group add administrators Repeat this process for all user accounts you want to create. 18

19 Create a RADIUS Authentication Realm 1. Browse to the Configuration tab > Authentication > RADIUS. 2. Click the RADIUS Realms tab and click New. The Add RADIUS Realm dialog displays. 3. Enter a name for the realm, Primary Server host IP or hostname and define the server password, known as a RADIUS Secret. Click OK. 4. Click the RADIUS Servers tab if you have additional RADIUS servers in your environment you wish to configure for redundancy or if you wish to set server encoding, timeout values and case-sensitivity. 5. Click Apply to save your new realm. 19

20 SAML Authentication Your ProxySG appliance can authenticate incoming requests using SAML, (Security Assertion Markup Language). With the steps below, you'll be able to configure an Authentication Realm to authenticate users with this single-sign-on authentication configuration, based on your own authentication server infrastructure. In a SAML realm configuration, the ProxySG acts as the Service Provider (SP) and a back-end authentication server, (Microsoft Active Directory Federation Services server, Siteminder Federation Partnership R12, or Oracle Identity Federation) is used as the Identity Provider (IDP). For more information on configuring a SAML realm, please refer to the SGOS 6.6 Administration Guide. The ProxySG appliance and the IDP exchange data in XML documents called assertions. After a user is authenticated, the IDP sends an authentication assertion to the Proxy and establishes an authenticated session with the appropriate authorization for the user. Before you set up a SAML realm, perform the following tasks on your IDP: Install and configure the administration software. Set up the identity store for authentication. Identify the default user attribute to be passed in SAML assertions. For example, the User Principal Name attribute in LDAP. Identify any additional attributes that you want to be passed in assertions, for example, the memberof attribute, which identifies the groups of which a user is a direct member in LDAP. Determine the location (URL) of the IDP s metadata file. This is needed to complete the realm configuration. Export the IDP Metadata File To export the IDP metadata file, log in to the IDP s administration software. Exporting IDP metadata entails saving the XML document to disk. It is important to save the metdata file without opening it in a browser first. Browsers do not necessarily support XML file structure and may change the XML tags. If you use SiteMinder or Oracle, you will need to copy and paste the metadata file contents to the CLI using the inline idp-metadata command. Because XML files are text-based, it is best to use a text editor such as Notepad to open the file to copy its contents. To ensure that the SAML realm is configured correctly, Blue Coat recommends that you import metadata instead of entering the information manually. To import SiteMinder and Oracle metadata, use the #(config saml<realm-name>)inline idp-metadata <XML> CLI command. Export Metadata from Active Directory Federation Server Show steps. 1. Log in to the AD FS MMC. 2. Select Endpoints and look under Metadata for the URL beside the Federation Metadata type 3. Copy the URL and paste it into a browser address bar. 4. Save the XML document to disk. Export Metadata from SiteMinder Show steps. Before you can export metadata, make sure that you have created a SAML 2.0 IDP. The steps below assume that you 20

21 have already created the IDP (entity) in SiteMinder. 1. Log in to the CA Federation Manager 2. Select Federation > Entities 3. Beside the entity you created, select Action > Export Metadata 4. In the Partnership Name field, enter a name to identify the partnership between the ProxySG applianceand Siteminder. 5. Click Export. Siteminder generates the metadata document. 6. Save the XML document to disk. Export Metadata from Oracle Show steps. 1. Log in to the Oracle Enterprise Manager. 2. In the navigation tree on the left, select Identity and Access > OIF. 3. On the main page, select Oracle Identity Federation > Administration > Security and Trust. 4. Click the Provider Metadata tab. 5. In the Generate Metadata section, select Identity Provider from the Provider Type menu. 6. Select SAML 2.0 from the Protocol menu. 7. Click Generat. OIF generates the metadata document. 8. Save the XML document to disk. Prepare the ProxySG for SAML Authentication 1. Configure the CA Certificate List The ProxySG appliance CCL must contain at least one root certification authority (CA) certificate, but depending on other considerations, you may require more certificates. Refer to the following list to determine which certificates you must import to the CCL: Root CA certificate Required.Add the certificate for the root CA that issued the IDP s signing certificate to the CCL IDP s signing certificate Required if self-signed.if the IDP s signing certificate is self-signed, add it to the CCL. Certificates signed by the CA are included in SAML assertions. intermediate CA certificate Optional. You must import intermediate CA certificates to the ProxySG, but it is not necessary to add them to the CCL. For instructions on importing certificates to the ProxySG appliance, see the SGOS 6.5 Administration guide section, "Importing CA Certificates" (page 1178). 2. Set up an HTTPS reverse proxy service. The IDP redirects browsers to an HTTPS reverse proxy service on the appliance. While Blue Coat recommends this for security, it is only required for Active Directory IDP deployments where the SAML realm is using an HTTPS POST endpoint (SiteMinder and Oracle-based SAML realms can use HTTP). If your Reverse Proxy deployment already incorporates an HTTPS Reverse Proxy service, ensure that it is associated with a CCL that includes the CA certificate for your IDP. Configure SAML Attributes 21

22 The ProxySG appliance maps policy conditions to assertion attribute values. If you require more attributes than the ones included in SAML assertions, you can define them in the SAML realm. To define assertion attributes: 1. In the web-based management console, select Configuration > Authentication > SAML > Attributes. 2. Click New. A dialog displays. 3. Enter attribute settings: Attribute name This is the name of the attribute as it appears in the ProxySG appliance and IDP configuration, and when referring to the attribute in the attribute.<name>= policy condition. The name must be unique Attribute data type Select case-exact-string or case-ignore-string. The ProxySG appliance uses this setting to match assertion attribute values with policy conditions. SAML name This is the name of the attribute as it will appear in assertions from the IDP, in the Name=XML attribute of the <Attribute> element. For example, an assertion might include the line <saml:attributename="mail"> where mail is the SAML attribute name. 4. Click OK and Apply. Create SAML Realms 1. In the web-based management console, select Configuration > Authentication > SAML. 2. Click New. The New SAML Realm dialog displays. 3. Enter a name for the realm in the Realm name field. 4. From the Federated IDP CCL drop-down, select the CCL you created in "Configure the CCL" step earlier. 5. Do one of the following to specify configuration parameters: AD FS : Use preconfigured settings for the IDP. Copy and paste the URL for the metadata into the Federated IDP metadata URL field. SiteMinder and Oracle FS: Import metadata through the inline idpmetadata CLI command.) 6. From the Encryption keyring (optional) drop-down menu, select the keyring to use for decrypting encrypted assertions. 7. (Optional) If you need to encrypt assertions from the IDP, check the Require encryption check box. As long as encryption keyring is configured, the ProxySG appliance attempts to decrypt encrypted assertions whether or not the Require encryption check is enabled. 8. Specify the hostname for the SAML endpoint ; in other words, point to the HTTPS reverse proxy listener you set up. In the Virtual host field, enter the host and port in format <hostname_or_ip_address>:<port_number>. The hostname must match the common name in the SSL certificate for the HTTPS reverse proxy service. 9. (Optional) Define limits for assertions timestamps. Assertions with timestamps that fall outside of these limits are invalid. Specify an interval before the current time. Assertions stamped before this interval are invalid. In the Not before field, specify the number of seconds. The default value is 60. Once your realm is configured and verified, click here to configure authenticated user access policies. 22

23 Authentication Policy With an authentication realm configured, you can now configure policy on the ProxySG appliance to authenticate, log and control user access to your web server. The steps below will guide you through setting up a rules to authenticate users, restrict access for specific users and groups and to deny all other access to the web server. Create a Rule to Authenticate users: 1. Browse to the Configuration tab > Policy > Visual Policy Manager and click Launch. 2. Click the Policy menu and select Add Web Authentication Layer 3. Right-click the Destination field, click Set, New, Request URL. 4. Enter the URL for your web server, as users will access it from the Internet. Click add, close, OK. 5. Right-click the Action field, click Set, New, Authenticate. 6. Choose the authentication realm you would like to use to authenticate users. 7. Select an Origin authentication mode from the Mode dropdown, ("Authentication Modes" on page 23 for more information on Origin authentication modes) to ensure that the ProxySG sends the appropriate type of challenge to users. 8. Click OK, then OK. Secure your existing Web Access rules: 1. Browse to your Web Access layer in the VPM. 2. Identify the rule that permits users to access your Reverse Proxy web server. 3. Right-click the source in the rule, click Set, New, Group 4. Enter the group ID for the authentication realm you've selected. If your realm is an IWA or LDAP realm, you can click Browse to search the directory tree for a user group. 5. Click OK, OK once the group is defined. Prevent unauthorized access: 1. Click Add Rule and move the new rule beneath the existing Web Access Layer rule. 2. Position the rule beneath the existing allow rule. 3. Right-click the rule number next to the existing rule, click Copy. 4. Right-click the rule number next to the new rule, click Paste. 5. Right-click the Source object (currently showing the authentication user group) and select Negate. 6. Right-click the Action in this rule, select Deny. 7. Click Install Policy to commit these changes. Authentication Modes When authenticating your users, it's important to consider how the authentication challenge will be sent to the user and how the ProxySG appliancewill track that information. Specific to Reverse Proxy deployments, the Origin authentication mode will act as the Origin Content Server and issue authentication challenges as such. Every request that triggers an 23

24 authentication rule in policy will be subjected to additional authentication challenges, though they may be imperceptible to users as their browsers can store and serve their entered credentials. To reduce the amount of authentication challenges sent, (which can significantly reduce load on your authentication servers) authentication surrogates provide the opportunity to cache authenticated sessions with either an IP address or a cookie, stored in users' browsers. If your firewall configuration uses Network Address Translation to obscure users' source public IP addresses, only use Origin or Origin-Cookie authentication modes. More details on each of the available origin authentication modes: Origin The ProxySG acts like an OCS and issues OCS challenges. The authenticated connection serves as the surrogate credential. Origin-IP The ProxySG acts like an OCS and issues OCS challenges. The client IP address is used as a surrogate credential. Origin-IP is used to support IWA authentication to the upstream device when the client cannot handle cookie credentials. This mode is primarily used for automatic downgrading, but it can be selected for specific situations. Origin-cookie The ProxySG acts like an origin server and issues origin server challenges. A cookie is used as the surrogate credential. Origin-cookie is used in forward proxies to support pass-through authentication more securely than origin-ip if the client understands cookies. Only the HTTP and HTTPS protocols support cookies; other protocols are automatically downgraded to origin-ip. 24

25 Advanced Policy Tasks Now that your ProxySG appliance is configured to pass user requests from the Internet to your back-end content server, there are some advanced configuration tasks you can use to improve performance, security and control. Two-Way URL Rewrite 26 ProxyAV Integration 27 Regional Access Control 28 25

26 Two-Way URL Rewrite The ProxySG appliancecan use policy to accept the URL entered by a user on the Internet and alter it to match what the internal web server expects. The two primary uses for this are: 1. SSL offloading.the proxy accepts secure connections from users on HTTPS, while the back-end web server hosts the website as HTTP. 2. Web Servers configured with absolute links. This affects cases where users will access the web server from the Internet via one address, ( but the structure of the web servers URL links includes an absolute link ( This set of policy elements will ensure that absolute links work as expected, while users never see internal or nonsecure addresses while accessing your web site content. Policy Example In this example, users on the Internet access the page via while the web server URLs are defined as absolute links to For your scenario, simply replace the URLs with your own. Note the order: the publicly accessible URL that will direct users to the ProxySG appliance is first, while the second URL in the rewrite represents the URL the proxy will use to communicate with the web server. define url_rewrite P rewrite_url_prefix " " end define action portal rewrite(url," transform P end define action force_uncompressed delete (request.header.accept-encoding) end <Proxy> url= action.portal(yes) <Cache> action.force_uncompressed(yes) 26

27 ProxyAV Integration While the ProxySG appliancecan help to secure and control access to your content servers, a ProxyAV Appliance can help to further protect your data by scanning for viruses and control the types of files that can be transferred. Before you start In order to make use of your ProxyAV in your ProxySG Reverse Proxy deployment, you will need to make sure that your ProxyAV is configured and licensed, with the most up-to-date virus definitions for the anti-virus provider of your choice. A specialized webguide located here will help you with your initial configuration. Policy Configuration - Virus Scanning Scan data uploaded to your content server. 1. Launch the Visual Policy Manager. 2. In the Policy menu, click Add Web Access layer. 3. Name the new layer "AV Scan" 4. Right-click the action in the default rule, click Set, New, ICAP Request Service. 5. Choose your ICAP server from the list of available services on the left, click Add>> to move the server to the list of selected servers. 6. Error handling - Decide if you want to permit users to upload files if the ProxyAV appliance is unavailable. Select either Deny the client request or Continue without further ICAP request processing, depending on your security practices. 7. Click OK and Install Policy. Policy Configuration - File Upload Control Configure a policy to control the types of files users can upload to your back-end content server. To use the ICAP scanning function here, you make sure that a ICAP Request Modification rule is in place. 1. Launch the Visual Policy Manager. 2. In the Policy menu, click Add Web Access Layer, name it "File access" or something similar to identify this policy layer as the one used to control the types of files that can be uploaded. 3. Right-click the source field, click New, Apparent Data Type. 4. Name the object "blocked file types". 5. Select the file types you do not want users to be able to upload to your server. 6. Check the Enable ICAP Scanning box to leverage the ProxyAV to examine the file types contained within file archives (such as zip, rar, or gz).click OK, OK. 27

28 Regional Access Control Blue Coat's Geolocation service identifies public IP address blocks and their countries of origin. This allows you to control what regions can access your Reverse Proxy-protected web services. Enable Geolocation Services 1. In the web-based management console, browse to the Configuration tab > Geolocation > General. 2. Check the Enable Geolocation box to enable Blue Coat's geographic location service on the device and click Apply. If you receive an error message at this point that reads: Device is not entitled to download Geolocation Database your ProxySG Appliance is not licensed for Blue Coat's Geolocation service. Speak with your Blue Coat sales point of contact or Blue Coat Customer Care to inquire about adding this service to your appliance. Define Geolocation Policy 1. In the web-based management console, browse to the Configuration tab > Policy > Visual Policy Manager and click Launch. 2. Open your Web Access layer and add a new rule to the top of the list. 3. Right-click the source field and click Set> New > Client Geolocation. The Set New Client Geolocation dialog displays.. 4. Select the countries your intended users are in and click OK, OK. 5. Right-click the Action field and click Allow. Define Restrictive Geolocation Policy 28

29 1. Still in your Web Access layer, create a new rule beneath your initial Geolocation rule. 2. Right-click the source field, click Set > New > Client Geolocation. 3. Select all of the countries except for those you defined in the preceding rule and click OK, OK. 4. Click Install Policy. 29

30 Monitoring Users and Resources The ProxySG appliance offers several solutions for monitoring your deployment. From on-box tracking of users and system resources to our off-box Blue CoatReporter solution, it's easy to monitor your Reverse Proxy. Monitoring the Appliance 31 SNMP Monitoring 32 Monitor User Activity 33 30

31 Monitoring the Appliance The ProxySG appliance offers in-depth on-box monitoring capabilities in the Statistics tab of the web-based management console.this is where to find your appliance's health and other system monitoring information. ProxySG appliance Statistics Tab Important sections 1. System Here you'll find detailed statistics for system resources including CPU, Memory and Disk usage. Data is displayed in time-selectable graphs that show hourly, daily, weekly or monthly resource statistics. 2. Active/Errored Sessions This section shows the session details for all users on the system in real time. You can see how much data is transferred, how long they've been connected and what URL they are accessing. Options are also present here for terminating individual sessions or all sessions. 3. Health Monitoring System health is reported here. That includes CPU, memory, and interface utilization. You can set thresholds for alerts when these values reach or exceed usage percentage points.the Status tab in this section reports the state of hardware monitors as well as overall health check status. 4. Health Checks This page displays the access and test results for all authentication realms, DNS servers, external services like ICAP servers, and forwarding hosts. Here, you can see the current state of these services, how long they've been in that state, and what the results of automated health check were at past intervals. 5. Authentication Authenticated user sessions are tracked here. You can view user details such as authentication duration, bytes transferred and their connecting IP address. Available options include logout for one or all users and to refresh authentication surrogates or credentials. 31

32 SNMP Monitoring All ProxySG appliancesystem events are logged to the local event log. If configured, these same events are also sent SNMP server. Enable the SNMP management service 1. Browse to the Configuration tab of the web management console. 2. Click Services > Management Services. 3. Click the empty checkbox in the Enabled column and click Apply. 4. Browse to the Maintenance tab > SNMP. Your ProxySG appliancecan now be queried by your SNMP tool. To configure SNMP reporting, continue to step Define your SNMP version 1, 2, or 3 server settings here and click Apply. For more information on interpreting SNMP events on your monitoring utility, see the Critical Resource Monitoring Guide here: 32

33 Monitor User Activity You can monitor user access to your content servers in real-time via the Log Tail option in the Statistics tab > Access Logging. To view the current requests being made to your content servers, click Start Tail to output the access log to this live window. Depending on the busyness of your content servers, this might appear to flow too fast to read. Click Stop Tail to stop the output for easier reading. For longer-term and archival reporting, the ProxySG appliance can be configured to upload access log data to several types of log processing services. Blue Coat Reporter is uniquely tasked as the best method to analyze and report on user activity. Information about installing and configuring Blue Coat Reporter in your environment can be found on Blue Touch Online here: 9.x. 33

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7 Transparent Proxy Deployments SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Office 365 Best Practices: Protocols

Office 365 Best Practices:  Protocols Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.

More information

Migrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500

Migrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500 Migrating to a New ProxySG Appliance ProxySG 900/9000 to ProxySG S400/500 Migrating to a New Blue Coat ProxySG Appliance Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo,

More information

Multi-Tenant Policy Deployment Guide

Multi-Tenant Policy Deployment Guide Multi-Tenant Policy Deployment Guide SGOS 6.6.x and later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and

More information

Blue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA

Blue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA Solution for Integrating Authentication using IWA BCAAA Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue

More information

BCCPP Q&As. Blue Coat Certified Proxy Professional. Pass Blue Coat BCCPP Exam with 100% Guarantee

BCCPP Q&As. Blue Coat Certified Proxy Professional. Pass Blue Coat BCCPP Exam with 100% Guarantee BCCPP Q&As Blue Coat Certified Proxy Professional Pass Blue Coat BCCPP Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

SGOS on KVM Deployment Guide

SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide Guide Revision: 8/18/2017 2 SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide 3 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

IPv6 Classification. PacketShaper 11.8

IPv6 Classification. PacketShaper 11.8 PacketShaper 11.8 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Blue Coat Security First Steps Solution for Streaming Media

Blue Coat Security First Steps Solution for Streaming Media Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Security First Steps Solution for Streaming Media

Blue Coat Security First Steps Solution for Streaming Media Solution for Streaming Media Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager. IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity

More information

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0 Configuring Symantec Protection Engine for Network Attached Storage Dell FluidFS 5.0 Contents Abstract... 2 About software component... 2 How does FluidFS antivirus protect data on FluidFS cluster... 2

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Management Console User Guide

Management Console User Guide Secure Web Gateway Management Console User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY MANAGEMENT CONSOLE USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft

More information

Secure Web Gateway. SWG User Guide. Release Manual Version v

Secure Web Gateway. SWG User Guide. Release Manual Version v Secure Web Gateway SWG User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY SWG USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

NetBackup Collection Quick Start Guide

NetBackup Collection Quick Start Guide NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information

More information

Configuring Symantec Protection Engine for Network Attached Storage. Compuverde vnas Cluster

Configuring Symantec Protection Engine for Network Attached Storage. Compuverde vnas Cluster Configuring Symantec Protection Engine for Network Attached Storage Compuverde vnas Cluster Contents Abstract... 2 About software component... 2 How does Compuverde antivirus protect data on Compuverde

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Nimsoft Monitor Server

Nimsoft Monitor Server Nimsoft Monitor Server Configuration Guide v6.00 Document Revision History Version Date Changes 1.0 10/20/2011 Initial version of Nimsoft Server Configuration Guide, containing configuration and usage

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1

More information

Cloud Access Manager Configuration Guide

Cloud Access Manager Configuration Guide Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

SOA Software Intermediary for Microsoft : Install Guide

SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft Install Guide SOAIM_60 August 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks

More information

BlueCoat BCCPP. Blue Coat Certified Proxy Professional.

BlueCoat BCCPP. Blue Coat Certified Proxy Professional. BlueCoat BCCPP Blue Coat Certified Proxy Professional https://killexams.com/pass4sure/exam-detail/bccpp Question: 201 Which method of controlling downloads of certain file types works fastest on ProxySG?

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Web Application Firewall for Web Environments

Web Application Firewall for Web Environments Web Application Firewall Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business applications.

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT,

More information

Blue Coat Security First Steps Solution for Exception Pages

Blue Coat Security First Steps Solution for Exception Pages Blue Coat Security First Steps Solution for Exception Pages SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

Azure MFA Integration with NetScaler

Azure MFA Integration with NetScaler Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

OpenID Cloud Identity Connector. Version 1.3.x. User Guide

OpenID Cloud Identity Connector. Version 1.3.x. User Guide OpenID Cloud Identity Connector Version 1.3.x User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate OpenID Cloud Identity Connector User Guide Version 1.3.x January, 2016 Ping Identity

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

O365 Solutions. Three Phase Approach. Page 1 34

O365 Solutions. Three Phase Approach. Page 1 34 O365 Solutions Three Phase Approach msfttechteam@f5.com Page 1 34 Contents Use Cases... 2 Use Case One Advanced Traffic Management for WAP and ADFS farms... 2 Use Case Two BIG-IP with ADFS-PIP... 3 Phase

More information

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0 Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

McAfee Web Gateway Administration

McAfee Web Gateway Administration McAfee Web Gateway Administration Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction to the tasks crucial

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

This Readme describes the NetIQ Access Manager 3.1 SP5 release.

This Readme describes the NetIQ Access Manager 3.1 SP5 release. NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

Quick Connection Guide

Quick Connection Guide WebEx Connector Version 1.0.1 Quick Connection Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector Quick Connection Guide Version 1.0.1 March, 2014 Ping Identity Corporation

More information

Novell Access Manager

Novell Access Manager SSL VPN Server Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 SSL VPN Server Guide Legal Notices Novell, Inc., makes no representations

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285

More information

Configuration & Management Guide

Configuration & Management Guide Configuration & Management Guide Management Center v1.7.1.1 Guide Revision: September 13, 2016 2 TOC Management Center Overview 23 Web Console Overview 25 Dashboard 26 Network 26 Configuration 27 Jobs

More information

.NET SAML Consumer Value-Added (VAM) Deployment Guide

.NET SAML Consumer Value-Added (VAM) Deployment Guide .NET SAML Consumer Value-Added (VAM) Deployment Guide Copyright Information SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, page 1 The User

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Core Extensions Module: DNS Enforce Plugin Version 1.2 Table of Contents About the DNS Enforce Plugin... 3 What to Do... 4 Requirements... 4 Configure the Plugin... 4 Target IP...

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Enterprise Vault Troubleshooting FSA Reporting. 12 and later

Enterprise Vault Troubleshooting FSA Reporting. 12 and later Enterprise Vault Troubleshooting FSA Reporting 12 and later Enterprise Vault : Troubleshooting FSA Reporting Last updated: 2018-04-17. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved.

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

akkadian Global Directory 3.0 System Administration Guide

akkadian Global Directory 3.0 System Administration Guide akkadian Global Directory 3.0 System Administration Guide Updated July 19 th, 2016 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2014 Akkadian Labs. All rights reserved.

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management SOLUTION BRIEF CA API MANAGEMENT Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management 2 SOLUTION BRIEF ENABLE AND PROTECT YOUR WEB APPLICATIONS WITH CA API MANAGEMENT ca.com

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1 BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About

More information