Configuring certificate-based authentication

To configure certificate-based authentication for systems that include a Web server security plug-in and a redirector plug-in, perform the following tasks, stopping after each step to make sure that things are working properly before proceeding.

  1. Install and configure the Enterprise Security Web Server plug-in on your Web server. See Chapter 11, “Configuring the Web Server Plug-in.” You may want to use an insecure server that accepts client requests on port 80 before deploying this to your production environment.

    NoteTo improve performance, Sybase strongly recommends that you install EAServer and the Web server on different machines. Typically, the portal generates numerous requests to the localhost HTTP listener, and if the Web server and EAServer are on the same machine, these requests are routed through the Web server, the security plug-in, and the redirector plug-in before EAServer receives them.

  2. To use an LDAP server, instead of the ACDB:

    1. Configure Enterprise Security to use the LDAP authentication delegate—see Chapter 10, “Configuring LDAP Authentication.”

    2. Configure a certificate mapper to tell Enterprise Security how to find the LDAP user based on the certificate provided by the client—see “Certificate mapping”.

    3. Map the PortalWebPlugin role to a user or set of users in the LDAP server.

  3. On the same server where the Enterprise Security Web Server plug-in is installed, install the EAServer redirector plug-in on Apache, iPlanet, or Netscape, and configure EAServer to accept Web server requests. For installation and configuration instructions, see Chapter 9, “Web Server Redirector Plug-In,” in the EAServer System Administration Guide. To access the HTML version, use a Web browser to open html/docs/index.html in your EAServer installation.

  4. Set up the Web server to demand client certificates. See your Web server documentation for more information.

  5. Edit global.propeties.xml, located in the Repository/WebApplication/onepage/config subdirectory of your EAServer installation, and set the values of the secure and secure_login properties to on. See the Enterprise Portal Developer’s Guide for more information about these properties.

  6. Configure an EAServer HTTPS listener for accessing the portal—see “Configuring listeners” in Chapter 3, “Creating and Configuring Servers,” in the EAServer System Administration Guide. Set the listener’s security characteristic to a value that does not include the string “mutual_auth.”

  7. Configure the redirector to support HTTPS—see “Configuring the redirector to support HTTPS connections”.

  8. Configure the server’s HTTP configuration properties—see “Configuring EAServer HTTP properties”.

  9. Create one or more URL assets that represent protected Web pages to force the Web server security plug-in to create a PortalSession object when a user attempts to log in to the portal—see “Creating an asset”.

StepsConfiguring the redirector to support HTTPS connections

  1. Edit the conn_config file in your redirector plug-in installation, and set the following properties:

  2. Set up an HTTPS listener in EAServer for accessing the portal.

StepsConfiguring EAServer HTTP properties

If you have multiple HTTP or HTTPS listeners, you must tell EAServer where to redirect requests.

  1. In Jaguar Manager, expand the Servers folder, highlight the server you are using (typically, Jaguar), and select File | Server Properties.

  2. Select the HTTP Config tab, and enter:

  3. Click OK to save your changes.