Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - NSAPI PROGRAMMER GUIDE Uživatelská příručka Strana 167

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 332
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 166
More Secure Use
2-91
Using a Firewall
When a firewall is set, a group of authentication servers and repository servers must be set up in an
independent network, and all accesses to the authentication serves and repository servers pass through
the firewall.
Any accesses from other than business servers or clients are blocked by the filtering function of the
firewall.
The following shows an example of the Interstage Single Sign-on configuration using a firewall:
Figure 2-11 Interstage Single Sign-on Using a Firewall
1. A firewall is installed so that authentication servers and repository servers make up an independent,
secure network.
2. The access control is set in the firewall so that accesses to repository servers through the firewall
can be made only from the business server, and other accesses are blocked as invalid accesses.
3. Replication is secure because it is performed within the network protected by the firewall.
4. SSL communication is set for authentication servers to prevent electrical interception or alteration
by encrypting communication from clients.
Zobrazit stránku 166
1 2 ... 162 163 164 165 166 167 168 169 170 171 172 ... 331 332

Komentáře k této Příručce

Žádné komentáře