Article
Authors:
Ramesh Nerella
B Ajesh
Contents:
- Introduction
- Deployment Scenario
- Configuring Linux Access Gateway
- Path-Based Configuration
- Configuring a Protected Resource
Introduction
When the OutLook Web Access (OWA) server is protected by the Linux Access Gateway, you could face problems if the default rewriter configuration is used. The document outlines a proposed deployment scenario, steps to configure Linux Access Gateway, test setup used for this document and Known issues.
Deployment Scenario
- The user requests access to a resource protected by the Access Gateway.
- The Access Gateway redirects the user to the Identity Server, which prompts the user for a username and password.
- The Identity Server verifies the username and password against an LDAP directory (eDirectory™, Active Directory, or Sun ONE).
- The Identity Server returns an authentication success to the browser and the browser forwards the resource request to the Access Gateway.
- The Access Gateway verifies that the user is authenticated and retrieves the user’s credentials from the Identity Server.
- The Access Gateway uses an Identity Injection policy to insert the basic authentication credentials in the HTTP header of the request and sends it to the Web server.
- The Web server grants access and sends the requested page to the user.
Configuring Linux Access Gateway
Host or Domain-based Configuration
To accelerate the OWA server configured with basic/form-based authentication as a Host-based and Domain-based service, configure the following rewriter profile:
- Login to the Administration Console with the administrator credentials
- Select Access Manager > Access Gateways > Edit.
- Click the Reverse Proxy that you have configured.
- Select the HTML Rewriting tab and create a word profile as follows:
- Make sure the default profile is enabled.
- Create a new word profile as follows:
- Select New from HTML Rewriter Profile List, and then create a new HTML Rewriter word profile.
- Click the newly added word profile.
- Add the following values to the Variable or Attribute Name to Search for Is section:
formvalue value
- Select Rewrite Inbound Query String Data.
- Select Rewrite Inbound Post Data.
- Select Rewrite Inbound Headers.
- Click OK.
- Ensure that the configured profile is ordered at the top of the list.
Path-Based Configuration
To accelerate the OWA server configured with basic/form-based authentication as a Path-based service configure the rewriter profile as follows:
- Login to the Administration Console with the administrator credentials.
- Select Access Manager > Access Gateways > Edit.
- Click the Reverse Proxy that you have configured.
- Select the HTML Rewriting tab and create a word profile as follows:
- Create a new word profile as follows:
- Select New from HTML Rewriter Profile List, and then create a new HTML Rewriter word profile.
- Click the newly added word profile.
- Add the following content type to the And Document Content-Type Header Is section:
- text/x-component
- extension/htc
- Add the following values to the Variable or Attribute Name to Search for Is section:
formvalue value
- Add the following search and replace entries to the String to Search for Is section:
SEARCH STRING REPLACE STRING /exchange $path/exchange /exchweb $path/exchweb - Select Rewrite Inbound Query String Data.
- Select Rewrite Inbound Post Data.
- Select Rewrite Inbound Headers.
- Make sure that Enable Rewrite Actions remains selected.
- Click OK.
- Create a new word profile as follows:
Configuring a Protected Resource
- Click Access Gateways > Edit > [Name of Reverse Proxy] > [Name of Proxy Service] > Protected Resources.
- Either click the name of an existing resource or click New, then specify a display name for the resource.
- (Optional) Specify a description for the protected resource. You can use it to briefly describe the purpose for protecting this resource.
- Select an authentication contract. If you want to enable non-redirected login, select Name/Password - Basic as the authentication contract.
- (Optional) If you want to enable non-redirected login, click the Edit Authentication Procedure icon, then click the contract that you have added to specify the following information:
- Non-Redirected Login: Select the option to enable non-redirected login.
- Realm: Specify the security realm configured for the IIS server running the Outlook Web Access server.
To check the security realm configured for the IIS server, open the IIS Administration Console, right-click the Outlook Web Access Server the Access Gateway is protecting, then select Properties. The Directory Security tab contains the Security realm field.
- To create protected resource as follows:
- In the Protected Resource List, click New, specify a name such as root, then click OK.
- Specify the following values:
- Authentication Procedure: Select the contract you created.
- URL Path: Make sure that /* is selected. If you have configured Outlook Web Access as a path-based service, then click the URL path and add the path name of the service. For example, /owa/*, where owa is the path name.
- Click OK twice.
- To create protected resource as follows:
- In the Protected Resource List, click New, specify a unique name, then click OK
- Specify the following values:
- Authentication Procedure: Do not select any authentication procedure as the URL path is a public resource.
- URL Path: Specify /exchweb/*as the URL path. If you have configured Outlook Web Access as a path-based service, then click the URL path and add the path name of the service. For example, /owa/exchweb/*, where owa is the path name.
- Click OK twice
- In the Protected Resource List, ensure that the protected resource you created is enabled.
- If you want to enable single sign-on, then configure Identity Injection or Form Fill policy, depending on the Outlook Web Access configuration.
Disclaimer: As with everything else at Cool Solutions, this content is definitely not supported by Novell (so don't even think of calling Support if you try something and it blows up).
It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test, test, test before you do anything drastic with it.
Related Articles
- SharePoint Integration with Linux Access Gateway
- Configuring Outlook Web Access 2003 with Single Sign-on using Novell Access Manager
- Configuring NetIQ Access Manager as Reverse Proxy for Filr Site
- Teaming 2.0 Integration with Linux Access Gateway
- NOWS 2.5 admin / sbsadmin fail to perform administrative tasks
User Comments
- Be the first to comment! To leave a comment you need to Login or Register
- 6632 reads










0