1.5 Configuring the Access Gateway for Authentication

The procedures in Section 1.4, Configuring the Access Gateway set up the Access Gateway to protect your Web server by hiding its IP address and DNS name from Internet users. The procedure does not require the user to log in before accessing resources on the Web server. This section explains how to configure the Access Gateway so that the users are required to authenticate by supplying login credentials before they can access a protected resource. There are two parts to enabling authentication to protected resources:

1.5.1 Verifying Time Synchronization

The time must be synchronized between the Identity Server and the Access Gateway or set so the time difference is within one minute of each other for trusted authentication to work.

For the Identity Server or a Linux Access Gateway Service, use YaST to verify the time settings. For a Windows Access Gateway Service, use the Date and Time option in the Control Panel. If you have a Network Time Protocol server, configure the Access Manager machines to use it.

For an Access Gateway Appliance, complete the following steps:

  1. In the Administration Console, click Devices > Access Gateways, then click Edit > Date & Time.

  2. Select the method you want to use for time:

    Set Date & Time Manually: Allows you to select the current time. Click this option to select the year, month, day, hour, and minutes in your current time zone, then click OK.

    Set Up NTP: Allows you to specify the IP address of an NTP server. Click Set Up NTP. Use the public pool.ntp.org server or click New, then specify the IP address of an NTP server. To accept the configuration, click OK.

    If the time on the machine is wrong by more than an hour, use both methods to set the time. Set it manually first, and then configure it to use NTP.

  3. In the Time Zone section, select your time zone, then click OK.

    Regardless of the method you used to set the time, you must select a time zone.

  4. To save the changes to browser cache, click OK.

  5. To apply your changes, click Devices > Access Gateways, then click Update > OK.

  6. Continue with Enabling Trusted Authentication.

1.5.2 Enabling Trusted Authentication

Trusted authentication requires an authentication contract that specifies the type of authentication credentials. The Identity Server and the Access Gateway control these authentication requirements. You do not need to configure your Web server to require authentication. Access Manager enforces the requirements for you.

In this example, you set up an authentication contract that requires a username and a password to access a directory on a Web server.

  1. In the Administration Console, click Devices > Access Gateways, then click Edit > [Name of Reverse Proxy] > [Name of Proxy Service] > Protected Resources > New.

  2. Specify a display name for the protected resource, then click OK.

  3. Select either the Name/Password - Basic or the Name/Password - Form for the Authentication Procedure:

    Name/Password - Basic: Basic authentication over HTTP using a standard login page provided by the Web browser.

    Name/Password - Form: Form-based authentication over HTTP.

    Others are available, but for this basic setup, which does not enable SSL, select one of the above contracts. The contract needs to match the protocol.

    If these default authentication contracts are not available, you have not configured a relationship between the Access Gateway and the Identity Server. See Section 1.4.1, Configuring a Reverse Proxy and select a value for the Identity Server Cluster field.

  4. In the URL Path List, configure the URL path to the page that this authentication contract will protect. For the Web server configuration described in Prerequisites for Setup, click the /* path and modify it to specify the following path:

  5. Click OK.

  6. To save the changes to browser cache, click OK.

  7. To apply your changes, click Devices > Access Gateways, then click Update > OK.

  8. (Optional) To test this configuration from a client browser, log in to the Access Gateway:

    1. Specify the published DNS name to this resource in the browser. For the example illustrated in Figure 1-2, you would enter the following URL:

    2. Click the link to the protected page. This should be a link to the same page you configured in Step 4.

      Your browser should prompt you with a login page. If you selected Name/Password - Basic as the contract, the standard login page issued by your browser is displayed. If you selected Name/Password - Form, the default Access Manager login page is displayed.

    3. Log in to the Identity Server with a username and password that is stored in your LDAP directory (Server 3 in Figure 1-2).

      You should have access to the information you have placed in the protected directory on your Web server.

      If you have set up your Web server to require basic authentication to access this directory, you are prompted again for login credentials.

      If you receive an error, see Common Authentication Problems.

  9. Continue with Section 1.6, Setting Up an Identity Injection Policy.