Agents Installation and Configuration Guide
Agents Installation and Configuration Guide
Contact
ILEX
51 boulevard Voltaire
92600 Asnières-sur-Seine
Telephone: +33 1 46 88 03 40
Fax: +33 1 46 88 03 41
[email protected]
www.ilex-international.com
Legal information
Sign&go is a registered trademark of Ilex. All other trademarks mentioned in this document are the
property of their respective owners.
This document is provided for information purposes only. Ilex provides no guarantee nor accepts any
liability for the information contained in this document. All information and data in this document may
be modified at any time without prior notice.
In accordance with article L. 122-4 of the Code de la Propriété Intellectuelle (French intellectual
property law), any full or partial reproduction, representation or distribution of this document by any
means whatsoever, without the express permission of Ilex, is prohibited and constitutes a breach of
the law that can result in prosecution under Articles L 335 - 2 and subsequent articles of the Code de
la Propriété Intellectuelle (French intellectual property law).
TAB LE OF C ONT EN TS
1 FOREWORD
This document is an installation and configuration guide for the various Sign&go agents. It describes
how to install and configure a Sign&go agent on the Windows and UNIX platforms as well as
integration with various Web and proxy servers.
It describes the installation (page 10) and generic configuration (page 60) for the various agents. In
addition, a large part of this document is dedicated to the description of manual installation methods
for some of the elements (page 22).
The installation and configuration of the ‘Ilex Proxy Server’ is detailed in another document. Please
refer to the .PDF documents provided with the installation CD.
2 OVERVIEW
2.1 Definition
This installation concerns the Web and Proxy integration components. These components intercept
the server HTTP requests and validates the permissions against the Sign&go security server. These
components, called agents, are available on various platforms.
2.3.1 Apache
Apache does not permit using the pathmapping (dynamic URL modifications) and user
authentication by client certificate in SSL functions at the same time. The <CertInfo> configuration
parameter enables choosing which of these two functions to implement.
Sign&go agents for Apache 2.2 and 2.4 Linux must be installed on a 2.6 Linux kernel minimum
In addition, where SSL certificates are concerned, only the following data is available:
SUBJECT_DN, ISSUER_DN and KEYSIZE.
In particular, the SERIALNUMBER of the client’s certificate is NOT accessible.
2.3.3 Domino
If the HTTP request contains a Basic HTTP identifier/password (authorisation: HTTP header),
Domino tries to validate this identifier/password against its internal repository before anything else. If it
does not find any user having this identifier/password pair, it refuses the request even if the resource
(the URL) is not protected.
From a functional point of view, this translates into the following constraints:
In the following behaviours, the identifier/password pair used to authenticate the user by Sign&go
must be identical to that of a user in the Domino repository:
Basic HTTP SSO login
An agent’s operating mode is determined by the <Role> configuration parameter in the agent’s
configuration file (see paragraph ‘Role of the ISAPI filter, <Role>’ on page 63).
The installation program always configures the agent in ‘Authorisation agent’ mode (Role=0).
To implement both the authorisation and authentication functions, the same agent must be installed
TWICE on the same IIS or ISA Server, as described below.
NOTE: Even with the automatic method, certain agents require some manual operations to
complete their installation. All of the operations and the list of agents which require manual
modification are referenced in “Post installation” on page 19.
In all cases, whether or not the host server uses a specific account, for reasons of security it is highly
recommended to create a directory reserved exclusively for the agent’s log files due to the fact that the
server must access it for both reading and writing.
Note: installation programs for AIX and Generic Linux are supplied without a ‘Virtual Machine’
(i.e., NoVM), for all other platforms a ‘Virtual Machine’ is embedded in the installer (i.e., VM).
In cases where the target server already has a JVM installed, it must be at least version 1.5 (applies to
AIX and Generic Unix only).
3.4 Introduction
Once the installation has started, read the instructions then click Next.
VERY IMPORTANT: before continuing the installation and to be sure of which agents to install,
please refer to section 2.2 ’Supported platforms and servers’ on page 6; if not, you run the risk
of installing an agent that it unsuitable for the target platform.
Choose the type of agent then click Next.
Note: For the Microsoft ISA Server agent, the agent must be installed in the Microsoft ISA
Server directory.
Note: These two parameters (Name and Password) serve as the ‘login’ to the security server
and therefore must be identical to those specified in the Sign&go security server’s
configuration. Please refer to the agent configuration documentation for more information.
In order to communicate with the security server, the agent’s details must be entered in the
Sign&go configuration with the aid of the Sign&go administration.
This information is used when installing the Apache 1.3 or 2.0 or 2.2 agents on Windows or Linux
platforms automatically.
Enter each directory name then click Next.
3.13 Installation
The progress of the installation is shown with the aid of a progress bar.
Select the Web site that the agent should be installed on:
In the following sections, it is assumed that Apache is installed in the directory $APACHE13. In the
following commands, replace $APACHE13 by the path where the Apache server has actually been
installed.
The steps required to integrate the Sign&go agent with Apache are as follows:
Stop the server,
Copy the files,
Configure the agent,
Edit the configuration file,
Restart the server,
Verify the installation.
Note: The integration of the agent for Apache 1.3 on Linux with the Web server is automated by
scripts during the installation. Therefore all that is required is to indicate the name of the
directories where the configuration files and the Apache modules are located (see “Location of
Apache” on page 16). If the installation has been successfully carried out, there is no need to
read the rest of this chapter.
.
cd $APACHE13/bin
./apachectl stop
sngwebag.xml.
The filter for Apache server 1.3 on Linux has been compiled with gcc, therefore the associated
libraries libc.so, ld-linux.so are required in order for it to operate.
For the rest of this section it is assumed that Apache’s modules are located in the
$APACHE_MODULES directory.
Add the following to the end of the AddModule directives already present:
AddModule mod_sngwebag.c
Note 1: In the case where the AddModule directive does not exist or where Apache has been
installed and recompiled, the AddModule directive may be unnecessary.
Note 2: A parameter named SNGAGENTdir exists which enables defining the location where
the agent will look for the .xml configuration file (as well as the directory where the logs will be
written). This parameter should be placed in the httpd.conf configuration file. For example:
SNGAGENTdir /NewSnGDir
It enables placing the .xml configuration file in a different directory from the default one
(/etc/signandgo). This parameter is optional, if it does not exist, the .xml configuration file is
expected to be in the default directory: /etc/signandgo.
These different modifications to the httpd.conf file are given as examples. Installation of the Sign&go
agent generates a file named sng.conf which groups all of these modifications together.
In the case whereby Apache is used for authentication by client certificate, mod_ssl must be
configured to make the certificate data available. The following lines give an example of the directives
that need to be added to the configuration file:
<Location /auth/certif.html>
SSLVerifyClient require
SSLOptions +StdEnvVars
</Location>
cd $APACHE13/bin
./apachectl start"
Warnings:
Depending upon the configuration of the Apache server, the following cases could arise:
After an automatic installation of the Apache 1.3 server, the following message may appear during
starting of the server:
This is a harmless message that can be ignored. The installer can not avoid this message because it
depends on the Apache server type. It is an inherent consequence of the order of certain commands
(LoadModule and AddModule) in the server’s configuration file httpd.conf. If desired, the messages
can be prevented by performing a manual installation of the filter. This way the commands will be in an
order adapted to the type of server installed.
If the installed version of Apache has been recompiled, the DSO (Dynamic Shared Object) support
might not be active. In this case, the Apache server can not accept external modules. The agent
cannot be installed in an Apache version that does not support external modules.
To recompile a version of Apache that accepts external modules, refer to the Apache Web server
documentation.
Here is the simplified method for compiling Apache, where PREFIX is the installation directory and NN
is the sub-version:
gzip –d apache_1.3.NN.tar.gz
tar xvf apache_1.3.NN.tar
./configure –-prefix=PREFIX –-enable-rule=SHARED_CORE –-enable-module=most
\
–-enable-shared=max
make
make install
In the following sections it is assumed that the Apache server is installed in $PATH (by default $PATH
= “C:\Program Files\Apache Software Foundation\Apache1.3”). In the commands described
below, replace $PATH with the pathname of the Apache server installation.
Note: Integration of the agent with the Apache server can be carried out automatically during
the setup by choosing an automatic installation (See “Choice of installation type” on page 14)
for further details.
The steps required to integrate the Sign&go agent with Apache are as follows:
Stop the server,
Copy the files,
Configure the agent,
Edit the configuration file,
Restart the server,
Verify the installation.
cd $PATH
apache -k stop
No messages appear,
To continue, go the section “Copying the files” on page 25.
file httpd.conf (by default in the $PATH/conf/) and Apache’s modules directory (by default
$PATH/modules/).
At the end of the installation, verify that the following files have been copied to the Apache server’s
modules directory:
sngapa13w32.dll,
sngapa13w32.xml.
To continue, go to the next step.
Note: Use forward slashes (“/”) and not backslashes in the pathnames of files (“\”).
Add the following to the end of the LoadModule directives already present:
Add the following to the end of the AddModule directives already present:
AddModule mod_sngwebag.c
These different modifications to the httpd.conf file are given as examples. Installation of the Sign&go
agent generates a file named sng.conf which groups all of these modifications together.
In the case whereby Apache is used for authentication by client certificate, mod_ssl must be
configured to make the certificate data available. The following lines give an example of the directives
that need to be added to the ssl.conf configuration file:
<Location /auth/certif.html>
SSLVerifyClient require
SSLOptions +StdEnvVars
</Location>
cd $PATH
apache -k start
No messages appear,
To continue, go the section “Verifying the installation” on page 27.
Warnings:
Depending upon the configuration of the Apache server, the following cases could arise:
After an automatic installation of the Apache 1.3 server, the following message may appear during
starting of the server:
The message is just a warning and can be ignored; it is a consequence of the order in which the
Apache modules are loaded (LoadModule and AddModule) in the httpd.conf file and which the
installer has no control over. The messages can be avoided by performing a manual installation of the
filter which results in the commands being in a suitable order for the type of Apache server.
Additionally, another message can be displayed during start-up from the command line:
[warn] Loaded DSO sngapa13w32.dll uses plain Apache 1.3 API, this module
might crash under EAPI! (please recompile it with -DEAPI)
This comes from the fact that the Apache server (on Windows only) thinks that “EAPI” is not used. The
Apache server is incorrect in displaying this message because EAPI is just an extension of the
Apache API and is not mandatory. The use of EAPI or otherwise has no effect on the stability of the
server.
If the installed version of Apache has been recompiled, the DSO (Dynamic Shared Object) support
might not be active. In this case, the Apache server cannot accept external modules. The agent
cannot be installed in an Apache version that does not support external modules.
To recompile a version of Apache that accepts external modules, refer to the Apache Web server
documentation.
Note: The integration of the agent for Apache 2.0 on Linux with the Web server is automated by
scripts during the installation. Therefore all that is required is to indicate the name of the
directories where the configuration files and the Apache modules are located (see “Location of
Apache” on page 16). If the installation has been successfully carried out, there is no need to
read the rest of this chapter.
cd $APACHE20/bin
./apachectl stop"
The filter for Apache server 2.0 on Linux has been compiled with gcc, therefore the associated
libraries libc.so, ld-linux.so are required in order for it to operate.
For the rest of this section it is assumed that Apache’s modules are located in the
$APACHE_MODULES directory.
To continue, go to the next step.
Note: A parameter named SNGAGENTdir exists which enables defining the location where the
agent will look for the .xml configuration file (as well as the directory where the logs will be
written). This parameter should be placed in the httpd.conf configuration file. For example:
SNGAGENTdir /NewSnGDir
It enables placing the .xml configuration file in a different directory from the default one
(/etc/signandgo). This parameter is optional, if it does not exist, the .xml configuration file is
expected to be in the default directory: /etc/signandgo.
These different modifications to the httpd.conf file are given as examples. Installation of the Sign&go
agent generates a file named sng.conf which groups all of these modifications together.
In the case whereby Apache is used for authentication by client certificate, mod_ssl must be
configured to make the certificate data available. The following lines give an example of the directives
that need to be added to the ssl.conf configuration file:
<Location /auth/certif.html>
SSLVerifyClient require
SSLOptions +StdEnvVars
</Location>
cd $APACHE20/bin
"./apachectl start"
If the Apache server gives errors when starting from a command line, verify the file sngwebag.xml. If
the error persists, restart the installation procedure step by step.
If the installed version of Apache has been recompiled, the DSO (Dynamic Shared Object) support
might not be active. In this case, the Apache server cannot accept external modules. The agent
cannot be installed in an Apache version that does not support external modules.
To recompile a version of Apache that accepts external modules, refer to the Apache Web server
documentation.
Here is the simplified method for compiling Apache, where PREFIX is the installation directory and NN
is the sub-version:
gzip –d httpd-2_0_NN.tar.gz
tar xvf httpd-2_0_NN.tar
./configure –prefix=PREFIX –enable-most –enable-ssl –with-ssl=/usr/local
make
make install
cd $PATH
apache2 -k stop
No messages appear,
To continue, go the section “Copying the files” on page 31.
Note: Use forward slashes (“/”) and not backslashes in the pathnames of files (“\”).
Add the following to the end of the LoadModule directives already present:
These different modifications to the httpd.conf file are given as examples. Installation of the Sign&go
agent generates a file named sng.conf which groups all of these modifications together.
In the case whereby Apache is used for authentication by client certificate, mod_ssl must be
configured to make the certificate data available. The following lines give an example of the directives
that need to be added to the ssl.conf configuration file:
<Location /auth/certif.html>
SSLVerifyClient require
SSLOptions +StdEnvVars
</Location>
cd $PATH
apache2 -k start
No messages appear,
To continue, go the section “Verifying the installation” on page 32.
To recompile a version of Apache that accepts external modules, refer to the Apache Web server
documentation.
Important: Before starting installation of the agent, create a directory on the server for the
agent’s configuration file. Give all users READ and WRITE access to this directory. Do not start
installing the agent until this directory has been created.
Directory=FullNameOfTheDirectoryWhereSngwebagxmlIsLocated
For example: Directory=/opt/sngwebag
Note: For the choice of location of the sngwebag.xml configuration file, see the note “List of
URLs to filter <FilteredUrls>...</FilteredUrls>” on page 67 for information linked to security.
sngwebag.xml
This is the agent’s configuration file. It must be named sngwebag.xml and be located in the directory
specified by the file sngwebag.ini described above.
now click on the Internet Protocols tab followed by the HTTP sub-tab,
click on the Edit Server button,
using the scroll-bar, locate the DSAPI parameters. The window should resemble the following:
in the field entitled DSAPI filter file names enter: sngwebag without the lib at the beginning or
the .a at the end, even though the agent file is named libsngwebag.a,
click on Save & Close,
close Lotus Domino Administrator.
now click on the Internet Protocols tab followed by the HTTP sub-tab,
click on the Edit Server button,
using the scroll-bar, locate the DSAPI parameters. The window should resemble the following:
in the field entitled DSAPI filter file names enter: sngwebag without the lib at the beginning or
the .a at the end, even though the agent file is named libsngwebag.a,
click on Save & Close,
HTTP Server: DSAPI Sign&go Web Filter Version 3.0.0.x loaded successfully
If the filter cannot be loaded for any reason, the server console displays the following message during
start-up:
click on the Configuration tab then scroll the Server menu on the left,
next click on All Server Documents followed by Edit Server. The window should resemble the
following:
In the DSAPI section, enter the absolute pathname for Sign&go agent’s library file
sngdomiw32.dll,
Click on Save and Exit,
close Lotus Domino Administrator.
HTTP Server: DSAPI Sign&go Web Filter Version 3.0.0.x loaded successfully
If the filter can not be loaded for any reason, the server console displays the following message during
start-up:
If such an error occurs, check the file sngdomiw32.xml. Restart the installation step by step if the
error persists.
Note: Integration of the agent with the IIS server can be carried out automatically during the
setup by choosing an automatic installation (See “Choice of installation type” on page 14) for
further details.
The steps required to integrate the Sign&go agent with IIS are as follows:
Access the IIS management console,
Install the ISAPI filter on desired Web site,
Configure the agent,
Restart the server,
Verify the installation.
to continue, go to the section “Installing the ISAPI filter on the desired Web site” on page 43.
4.14.2.2 My Computer
Right mouse-click over the “My Computer” icon on the Desktop,
select Manage:
The Computer Management window will open. Open Services and Applications in the left hand
pane followed by Internet Information Services where the list of Web sites will be displayed:
to continue, go to the section “Installing the ISAPI filter on the desired Web site” on page 43.
once the Web site is stopped, right mouse-click on it again to access the context-sensitive menu:
click OK. The filter should now be installed on the desired Web site with the dialogue box
resembling the following:
click OK.
Note: Do not close the ‘Internet Information Services’ dialogue box as it will be used in the
following section.
If the sngiisw32.xml file has been correctly configured, there should be no errors reported by IIS
during starting of the Web site. If errors are seen, verify the configuration in the sngiisw32.xml file.
Note: In the specific case of IIS 6, in order for the state of the filter to be displayed correctly, it
might be necessary to make an HTTP: request, with the URL ‘http://localhost/’ for example
The Sign&go ISAPI filter is now installed on the machine. If the displayed dialogue box is different
from that shown above, for example if there is a downward-pointing red arrow in front of the Sign&go
filter it means that the filter has not been installed correctly and could not be loaded by IIS. In this
case, delete it (select the filter and click the Remove button) and restart the installation procedure
from the beginning. Remember that the automatic installation proposed at the beginning of the
procedure can be used.
regsvr32 sngisaw32.dll
Note: Before un-installing the agent for Microsoft ISA Server 2000, the following command
must be executed from the ISA server’s installation directory: regsvr32 /u sngisaw32.dll
regsvr32 sngisa2004w32.dll
Note: Before un-installing the agent for Microsoft ISA Server 2004, the following command
must be executed from the ISA server’s installation directory: regsvr32 /u sngisa2004w32.dll.
regsvr32 /u sngisa2004w32.dll.
Note : The instructions given in this chapter (below) DO NOT apply to the
Sun One Proxy Server 4.0 or higher.
4.18.2 Prerequisites
This chapter is dedicated to the integration of the Sign&go agent for Netscape/IPlanet/Sun One
Proxy Server up to Sun One Proxy Server 3.x included.
The Sign&go agent operates with Netscape 3.51 SP3 and higher.
In the following sections, it is assumed that the server is installed in the $PATH directory and that
Sign&go agent is located in the $FILTER_PATH. In the following commands, replace $PATH and
$FILTER_PATH by the correct pathnames respectively.
In the examples, $FILTER_PATH corresponds to /usr/netscape/suitespot/plugins/signandgo. It is
also assumed that that the Web server is named $SERVER_NAME, therefore throughout the rest of
this chapter this name must be replaced by that of your server.
The steps required to integrate the Sign&go agent with Sun One Proxy are as follows:
Stop the server,
Copy the files,
Configure the agent,
Edit the configuration file,
Re-start the server,
Verify the installation.
cd $PATH/proxy-$SERVER_NAME
./stop
Note: The first of the two commands above should be entered on one line with only a space
between “…FilterAuthTrans” and “shlib=…”. In the example above, the command has been
placed on two lines purely to aid legibility.
in obj.conf, above the block of NameTrans fn declarations, add the following before the existing
AuthTrans directives:
AuthTrans fn="FilterAuthTrans"
Note: A parameter named SNGAGENTdir allows specifying the pathname where the agent will
look for the .xml configuration file (also the location where the log files will be written). This
parameter is placed in the obj.conf or magnus.conf (depending on the version) file on the same
line as the FilterInit directive. For example:
It allows the .xml configuration file to be placed in directory other than /etc/signandgo. The
parameter is optional, if it does not exist, the .xml file is expected to be in the default directory:
/etc/signandgo.
cd $PATH/proxy-$SERVER_NAME
./start
Note 1: The first of the two commands above should be entered on one line with only a space
between “…sngsoproxw32.dll” and “funcs="…”. In the example above, the command has been
placed on two lines purely to aid legibility.
Note 2: Note the use of forward-slashes (“/”) rather than back-slashes (“\”) in the pathnames.
AuthTrans fn="FilterAuthTrans"
cd $PATH/server/https-$SERVER_NAME
./stop
Note 1: The first of the two commands above should be entered on one line with only a space
between “…FilterResponse"” and “shlib="…”. In the example above, the command has been
placed on two lines purely to aid legibility.
In the obj.conf file, before the block of NameTrans fn declarations, add the following at the
beginning of the existing AuthTrans declarations:
AuthTrans fn="FilterAuthTrans"
In the obj.conf file, before the block of ObjectType fn declarations, add the following at the
beginning of the existing ObjectType declarations:
ObjectType fn="FilterResponse"
Note: A parameter named SNGAGENTdir allows specifying the pathname where the agent will
look for the .xml configuration file (also the location where the log files will be written). This
parameter is placed in the obj.conf or magnus.conf (depending on the version) file on the same
line as the FilterInit directive. For example:
It allows the .xml configuration file to be placed in a directory other than /etc/signandgo. The
parameter is optional, if it does not exist, the .xml file is expected to be in the default directory:
/etc/signandgo.
Note 1: The first of the two commands above should be entered on one line with only a space
between “…FilterResponse"” and “shlib="…”. In the example above, the command has been
placed on two lines purely to aid legibility.
In the obj.conf file, before the block of NameTrans fn declarations, add the following at the
beginning of the existing AuthTrans declarations:
AuthTrans fn="FilterAuthTrans"
In the obj.conf file, before the block of ObjectType fn declarations, add the following at the
beginning of the existing ObjectType declarations:
ObjectType fn="FilterResponse"
Note: A parameter named SNGAGENTdir allows specifying the pathname where the agent will
look for the .xml configuration file (also the location where the log files will be written). This
parameter is placed in the obj.conf or magnus.conf (depending on the version) file on the same
line as the FilterInit directive. For example:
It allows the .xml configuration file to be placed in a directory other than /etc/signandgo. The
parameter is optional, if it does not exist, the .xml file is expected to be in the default directory:
/etc/signandgo.
cd $PATH/server/https-$SERVER_NAME
./start
In obj.conf, in the block of Init fn declarations, add the following two lines at the beginning of the
existing Init-fn declarations:
Note 1: The first of the two commands above should be entered on one line with only a space
between “…sngiplaw32.dll"” and “funcs=” …”. In the example above, the command has been
placed on two lines purely to aid legibility.
Note 2: Note the use of forward-slashes (“/”) rather than back-slashes (“\”) in the pathnames.
In the obj.conf file, before the block of NameTrans fn declarations, add the following at the
beginning of the existing AuthTrans declarations:
AuthTrans fn="FilterAuthTrans"
In the obj.conf file, before the block of ObjectType fn declarations, add the following at the
beginning of the existing ObjectType declarations:
ObjectType fn="FilterResponse"
In magnus.conf, in the block of Init fn declarations, add the following two lines at the end of the
existing Init-fn declarations:
Note 1: The first of the two commands above should be entered on one line with only a space
between “…sngiplaw32.dll"” and “funcs="…”. In the example above, the command has been
placed on two lines purely to aid legibility.
Note 2: Note the use of forward-slashes (“/”) rather than back-slashes (“\”) in the pathnames.
In the obj.conf file, before the block of NameTrans fn declarations, add the following at the
beginning of the existing AuthTrans declarations:
AuthTrans fn="FilterAuthTrans"
In the obj.conf file, before the block of ObjectType fn declarations, add the following at the
beginning of the existing ObjectType declarations:
ObjectType fn="FilterResponse"
During start-up of $SERVICE_NAME_1, the password requested for the key file is “password”.
5 CONFIGURATION
5.1 Installation review
The installation of a Web agent (not including the ILEX Proxy Server, see the specific documentation
for this) deploys several components:
the agent configuration file in XML format,
a library file specific to the Web or Proxy server (.dll, .so or .a depending on which type).
Note: For Windows platforms, the library file and the configuration file both have the same
filenames apart from the file extension (for example: sngiisw32.dll and sngiisw32.xml) and are
to be found in the same directory. For UNIX platforms, the names are more arbitrary (for
example: sngapa13linux.so and sngwebag.xml). The location of the .xml configuration file is
configurable; this configuration is detailed in the corresponding chapter for each filter.
To configure the Sign&go Web agent, the installed ‘.xml’ file must be modified.
<Name>AG01</Name>
<Name>AGWEB</Name>
<Type>WEB</Type>
<Pass>password</Pass>
<AgentLogFile1>logAg1.log</AgentLogFile1>
<AgentLogFile2>logAg2.log</AgentLogFile2>
or:
<AgentLogFile1>/opt/sngagent/logs/log1.log</AgentLogFile1>
<AgentLogFile1>/opt/sngagent/logs/log2.log</AgentLogFile1>
or:
<AgentLogFile1>c:\program files\sngagent\logs\logAg1.log</AgentLogFile1>
<AgentLogFile2>c:\program files\sngagent\logs\logAg2.log</AgentLogFile2>
If these parameters are not defined as absolute pathnames (i.e. full path and file name), they will be
considered as paths relative to the location of the .xml configuration file.
ATTENTION: The agent will not create any directories; you must make sure that you create
them yourself.
Security
Particular attention must be paid to the log file directories. For reasons of security, certain servers
(Web or Proxy servers) execute HTTP: requests under specific user accounts having very limited
rights. The Sign&go agent executes under this same account. As a consequence, if the account does
not have sufficient privileges on this directory, no log files will be produced.
It is highly recommended to create a dedicated directory for the log files. This directory should have
Execute, Read and Write permissions either for the account used to run the host server (Web or
Proxy) or for ‘All users’.
Example:
<AgentLogMask>0x0FFFF</AgentLogMask>
<MaxLogSize>2000</MaxLogSize>
5.3.7 <IlexAdminPattern>
Reserved for use by ILEX support staff. Do not modify.
<CacheSize>2000</CacheSize>
<FilterPriority>0</FilterPriority>
<QueryTimeout>15</QueryTimeout>
<IncludeHostname>1</IncludeHostname>
Note: To use the agent for IIS in authentication mode, an IIS version 5 or higher is required.
Example:
<Role>0</Role>
<IsaServer>0</IsaServer>
<CertInfo>0</CertInfo>
<BlackListDelay>120</BlackListDelay>
<BadUrlPatterns>.. , // </BadUrlPatterns>
In this example all URLs are refused if they contain two successive periods (“.”) or two successive
e” E”
slashes (“/”) whichever way they may be coded (“.”, “%2 , “%2 or “/”, “%2f”, “%2F”). Therefore, in the
example above, the URL is refused if it contains at least one of following combinations:
e” E”
“..”, “%2e%2 , “%2e%2E”, “%2E%2e”, “%2E%2 , “.%2e”, “%2e.”, “.%2E”, “%2E.”
or
”//”, “%2f%2f”, “%2f%2F”, “%2F%2f”, “%2F%2F”, “.%2f”, “%2f.”, “.%2F”, “%2F.”
rd
Each element in the list defines a range of values and must be comprised of 5 characters, the 3 of
which must be a minus (“-“). The two characters before the “-“ specify the range’s lower limit (in
hexadecimal) and the two characters after it specify the range’s upper limit (again in hexadecimal).
The elements in the list must be separated by commas (“,”) and have no spaces between them.
Example:
<BadUrlValues>00-1f,ff-ff</BadUrlValues>
In this example, a request is refused if its URL contains a byte whose numerical value is between 0
and 0x1F (31 decimal) inclusive or equal to 0xFF (255 decimal).
<HostName>localhost</HostName>
<HostName>192.168.0.2</HostName>
<Port>3100</Port>
Agent nCnx
All agents on Windows 20
Web iPlanet/Sun One server (Solaris) 20
Sun One Proxy Server 4 (Solaris) 20
Other agents 1
The value of this parameter is determined by taking the following points, which are inherent in the Web
(or proxy) server architecture, into account:
Ilex Agent installation and configuration guide Page 65/69
Sign&go
When an agent is started in a single process with several threads (workers), with IIS for example,
all of the nCnx connections are shared by all of the threads. As such there is no point in defining
nCnx higher than the number of simultaneous clients. In practice, thanks to the agent’s caching
mechanism, a value of 20 for nCnx should be sufficient for 100 simultaneous clients,
If each worker is a different process (with Apache on UNIX for example), each process only deals
with one client at a time and so one connection (nCnx=1) per process is sufficient, there is no
advantage to be gained from increasing this value (on the contrary, a higher number can cause a
potential shortage of TCP connections). In this case, the parameter nCnx must be defined as 1
This value (1) however, is multiplied by the total number of processes. If, for example, Apache on
Linux is configured with a maximum number of simultaneous clients equal to 250
(ThreadsPerChild=250), then the agent can establish up to 250 TCP connections with the security
server.
Example:
<nCnx>30</nCnx>
<Frequency>3</Frequency>
<ssl>0</ssl>
Note: Taking the parameters in this section into account dynamically requires that the .xml file
be accessible to the process or threads that attempt to read it. The reading of the .xml
configuration file is carried out by the host server’s process or threads. In most cases, for
reasons of security, these threads or process are created by an account having as few
privileges as possible. For the agent to be able to re-read the configuration file, it must be
READ accessible by the account that creates the process or threads.
5.5.3 Parameters
The parameters are: TTL, Protect, Case and a list of URL patterns which are all described below.
An example <FilteredUrls> section is shown here:
<FilteredUrls>
<TTL> 10 </TTL>
<Protect> 0 </Protect>
<Case> 0 </Case>
<Url> //*:8080/* </Url>
<Url> */auth/* </Url>
<Url> //*.ilex-si.com/* </Url>
<Url> //www.ilex.fr/auth/dologin.jsp </Url>
</FilteredUrls>
In this example: URLs that match at least one of the above patterns are not protected (Protect=0) by
the agent and are therefore accessible as if the agent didn’t exist. All modifications to this section will
be taken into account by the agent within 10 seconds after having saved the configuration file
(TTL=10).