Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - NSAPI PROGRAMMER GUIDE Guide de l'utilisateur Page 167

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 332
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 166
More Secure Use
2-91
Using a Firewall
When a firewall is set, a group of authentication servers and repository servers must be set up in an
independent network, and all accesses to the authentication serves and repository servers pass through
the firewall.
Any accesses from other than business servers or clients are blocked by the filtering function of the
firewall.
The following shows an example of the Interstage Single Sign-on configuration using a firewall:
Figure 2-11 Interstage Single Sign-on Using a Firewall
1. A firewall is installed so that authentication servers and repository servers make up an independent,
secure network.
2. The access control is set in the firewall so that accesses to repository servers through the firewall
can be made only from the business server, and other accesses are blocked as invalid accesses.
3. Replication is secure because it is performed within the network protected by the firewall.
4. SSL communication is set for authentication servers to prevent electrical interception or alteration
by encrypting communication from clients.
Vue de la page 166
1 2 ... 162 163 164 165 166 167 168 169 170 171 172 ... 331 332

Commentaires sur ces manuels

Pas de commentaire