Novell iChain Administration Guide

  Novell iChain Administration Guide
    Overview
      iChain Benefits
      iChain Features
    Installing iChain Components
      Product Components
      Installation Scenario
      System Requirements
      Installing iChain Services Software
      Managing the iChain Proxy Server
      Installing the iChain Proxy Server on Your Network
      Preparing the Network
      Troubleshooting iChain Proxy Server Issues
    Configuring a Typical Accelerator
      Setting Up an Accelerator
      Configuring the Authentication Server
      Configuring iChain for NetIdentity Authentication
    Understanding the Web Server Accelerator
      Accelerating Web Servers
      Web Server Accelerator Setup
      Accelerator/Web Server Page
      Using Web-Based Distributed Authoring and Versioning (WebDAV)
      Setting Up Authentication Using the Wireless Application Protocol (WAP)
      Setting Up Secure Exchange
      Multi-Homing
      Custom Login Pages
      Cache Freshness
      GZIP Compression Support
      Understanding HTTP 1.1
    Understanding Mutual Authentication
      Setting Up Mutual SSL
      Disabling Mutual SSL
      Using Third-Party Certificates
      Using Multiple Certificate Authorities
      Configuring the Online Certificate Status Protocol
    Understanding LDAP Authentication
      Allowing Authentication Through the HTTP Authorization Header
      Enabling Authentication Through the HTTP Authorization Header
    Using RADIUS Authentication
      Using Token Authentication with iChain
      Installing NMAS, Novell RADIUS, and a Token Method
      Configuring Novell RADIUS Components
      Setting Up the iChain RADIUS Client
    Accelerator Authentication Options
      Accelerator Authentication Parameter Page
      Authentication Profiles and How They Are Used
    Using Cross-Domain Authentication
      CDA Scenario and Examples
      Selecting Accelerators as Members of CDA and Cross-Domain Brokers
      Configuring the CDA
      CDA and Session Broker
    Configuring Session Broker
      What is Session Broker?
      Configuring Session Broker
      Configuring Session Broker without a Floppy Drive
      Troubleshooting Session Broker Issues
    Using the iChain Service Object (ISO)
      General Page
      Protected Resource Page
      Form Fill Policy Page
      Session Broker Page
      iChain Page
    Using iChain Access Control Rules
      Defining iChain Access Control Rules
      Defining Dynamic Access Control Rules
      Advanced Access Control Configuration
    Using Object-Level Access Control
      Setting Up Object-Level Access Control
      Using OLAC Custom Header Variables
      Customizing the Authorization Header
      Using OLAC Caching
      Using OLAC for Shared Secrets
      The Effects of Disabling OLAC
    Form Fill
      Understanding an HTML Form
      Designing a Basic Form Fill Policy
      Creating a Form Fill Policy
      Using Additional Form Fill Policy Options
      Troubleshooting a Form Fill Policy
      Setting Up SecretStore
    Using iChain to Manage Certificates
      Naming Certificates
      Creating Certificates Using the Appliance CA
      Obtaining a Certificate from an External CA
      Viewing (Exporting) a Certificate’s CA
      Modifying a Certificate
      Deleting a Certificate
      Backing Up a Certificate
      Restoring a Certificate
      Renewing a Third-Party Certificate
    Using Advanced Accelerator Features
      Using Secure Thin Client Services
      Using iChain With Novell Nsure Audit
      Logging
      Object Pinning
      Using the Proxy Server to Record IP Addresses When Resolving URL Masks
      Concurrent Login Restriction
    Rewriter Support
      The Internal Rewriter
      The Custom Rewriter
    Using Start Up Options and the Command Line Interface
      Customizing the Command Line Prompt
      Using the Enhanced Configuration Export
      Managing Appliance Security Features
    Using the Proxy Services Interface
      Using the Proxy Administration Tool
      The Home Panel Options
      The System Panel Options
      The Network Panel Options
      The Configure Panel Options
      The Monitoring Panel Options
      Using Appliance Commands
      Performing Patch Upgrades
    Using Logging Tools
      Using Strong Cryptography
      Using Step-Up Cryptography
      Automatic Configuration Mechanisms
      DNS Name Resolution
      Appliance Error Messages
      FTP Services
      Shutting Down and Restarting
      Using the SOCKS Client Service
      Time Synchronization
    Upgrading Your iChain System
      Upgrading from iChain 2.0, 2.1, and 2.2
      Upgrading from iChain 1.5
    Known Issues
      Installation and Upgrade Issues
      Known Issues With iChain 2.3 and NetWare 6.5
      Known Issues With iChain Form Fill
      Known Authentication Issues
      Known Proxy Administration Tool Issues
      Known Multi-Homing and Path-Based Issues
      Known Session Broker Issues
      Known Certificate Issues
      Known Rewriter Issues
      Miscellaneous Issues
    Using LDAP Server Load Balancing and Failover
    Documentation Updates
      February 2009 (SP6)
      March 2007 (SP5)
      March 16, 2006 (SP4)
      October 24, 2005
      August 8, 2005 (SP3)
      June 24, 2005 (SP3)
      April 12, 2005 (SP2)
      March 3, 2005 (SP2)
      January 26, 2005 (SP2)
    Legal Notices