22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.3.4 Security proxies<br />

In most cases, forward proxies are also configured to be caching proxies. This is<br />

so often true that <strong>IBM</strong> incorporates it into the name of it’s Edge Server<br />

component: <strong>IBM</strong> Caching Proxy. Figure 5-1 depicts a typical forward caching<br />

proxy.<br />

.<br />

Figure 5-1 A caching proxy acting as a forward proxy<br />

1 - Client<br />

2 - Caching proxy<br />

3 - Cache<br />

4 - Router/gateway<br />

5 - Internet<br />

6 - Web server<br />

On top of their essential simple proxy functionality, proxies can also be<br />

configured to enforce security policies. Such security proxies can handle, or<br />

proxy, both authentication and authorization requests. In these cases, the<br />

authentication of the client user, and the client’s authorization to access specific<br />

content, are verified by the proxy server itself. The security credentials are then<br />

sent to the back end servers by the proxy with the request, and the back end<br />

server must be configured to trust the credentials provided by the proxy.<br />

There are many different products and offerings, and as many topologies to<br />

choose from, but from a proxy-function point of view, security is an extra function<br />

that the proxy can do.<br />

In most cases, security functionality can be added to a standard proxy as a<br />

security plug-in (for example, <strong>IBM</strong> Tivoli WebSeal Plug-In for <strong>IBM</strong> WebSphere<br />

Edge Server). There are also stand-alone products, like <strong>IBM</strong> Tivoli Access<br />

Manager for e-Business, which serve only as security proxies.<br />

See 4.1.6, “Enterprise access management and identity management systems”<br />

on page 130 for some additional discussion of such security proxies.<br />

Chapter 5. Proxies 169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!