Table of Contents
When you install multiple Webgates for a single IIS instance:
The webgate.dll must be configured as an ISAPI filter at the individual Web site level, not the default (top) Web server level
The /access virtual directory is mapped at the Web site level to the respective /access directory in the Webgate installation.
When configuring the impersonation DLL for multiple Webgates, you need to configure a user to act as the operating system.
There can only be one postgate.dll configured at the (top) Web Sites level of a machine. However, you might have multiple webgate.dlls configured at different levels below the top level Web Sites. If you perform multiple Webgate installations on one machine, multiple versions of the postgate.dll file might be created that can cause unusual Access Manager behavior.
Task overview: Installing and configuring multiple Webgates for a single IIS instance:
Note:
If you perform multiple Webgate installations on one machine, multiple versions of the postgate.dll file might be created which can cause unusual Access Manager behavior. The postgate.dll is not supported in environments where you have multiple Webgates configured with a single IIS v6 web server instance.
To install each Webgate when you have several with one IIS instance:
Install the ISAPI Webgate as described in Registering and Managing 10g WebGates with Access Manager 11g.
Go to the Web site to protect, and configure webgate.dll as the ISAPI filter using these steps:
Start the Internet Information Services (IIS) Manager: Click Start, Programs, Administrative Tools, Internet Information Services (IIS) Manager
Right click Web Sites, and then click the Properties option.
Click the ISAPI filter tab, look for the path to webgate.dll; if it is present in the filter, then select it and click the Remove button.
Under Web Sites, right-click the name of the Web site to protect, and select the Properties option.
Click the ISAPI filter tab to add the filter DLLs.
Add the following filter to identify the path to the webgate.dll file, and name it "webgate".
Webgate_install_dir/access/oblix/apps/webgate/bin/webgate.dll
Save and apply these changes.
Go to the Directory Security tab.
Confirm that "anonymous access" and "basic authentication" are selected so that Access Manager provides authentication for this Web server.
Save and apply these changes.
Go to Web sites level to protect and create an /access virtual directory that points to the newly installed Webgate_install_dir:
Under Web Sites, right-click the name of the Web site to be protected.
Select New and create a new virtual directory named access
that points to the appropriate Webgate_install_dir/access.
Under Access Permissions, check Read, Run Scripts, and Execute.
Save and apply these changes.
In the file system, set directory permissions for Access Manager:
In the file system, locate and right-click Webgate_install_dir\access, and the select Properties.
Click the Security tab.
Add user "IUSR_machine_name" and then select "Allow" for "Modify".
For example, for a machine_name of Oracle, select IUSR_ORACLE.
Add user "IWAM_machine_name" and then select "Allow" for "Modify"
For example, for a machine_name Oracle, select IWAM_ORACLE.
Add user "IIS_WPG" and then select "Allow" for "Modify".
Add user "NETWORK SERVICE" and then select "Allow" for "Modify".
For the group "Administrators", select "Allow" for "Modify".
If Webgate has been set up in Simple or Cert mode, perform the follow steps:
In the file system, locate and right-click the "password.xml" file in Webgate_install_dir\access\oblix\config\password.xml.
Click the Security tab.
Give "Allow" for "Read" rights to users "IUSR_machine_name", IWAM_machine_name, "IIS_WPG", and "NETWORK SERVICE".
Add a new Web service extension using the following steps:
Right click Web Service Extensions, and then select Add a new Web service extension....
Add the Extension name Oracle Webgate
.
Click Add to add the path to the extension file, and then enter the path to the appropriate webgate.dll.
Webgate_install_dir\access\access\oblix\apps\webgate\bin\webgate.dll
Click OK to save the changes.
Check box beside Set extension status to allowed.
Click OK to save the changes.
Ensure that there is no webgate.dll in the ISAPI filter at the top Web site level ("web sites").
Perform the next set of tasks using instructions in the following topics:
Repeat these steps when you install the next Webgate for the IIS instance.
The client's access token is known as an impersonation token. The impersonation token identifies the client, the client's groups, and the client's privileges. The information in the token is used during access checks when the thread requests access to resources on the client's behalf.
The Access System authenticates and authorizes the user. IISImpersonationExtension.dll of Access Manager in the wildcard extension behaves like a filter for each request to the Web server. The Access System designates a special user that does have the right to impersonate another user by configuring it using the impersonation username/password on the AccessGate Configuration page. That designated user must have "act as operating system" rights. DLL impersonates the user authenticated and authorized by Access Manager and generates the impersonation token.
You perform the following steps to set the impersonation DLL for each Webgate that protects a Web site for a single IIS Web server instance. You can do this either immediately after the installation task in the previous topic or all at one time.
Note:
This task must be performed for each Webgate that protects an individual Web site for a single IIS Web server instance.
To add the impersonation DLL:
Webgate_install_dir\access\oblix\apps\webgate\bin\IISImpersonationExtension.dll
This example shows the default path, where Webgate_install_dir is the file system directory where you have installed this particular Webgate.
IISImpersonationExtension.dll
to highlight it, then click Edit.Client Certificate Authentication: "Enabling SSL and Client Certification for Multiple Webgates"
You can enable SSL on the IIS v6 Web and add cert_authn.dll as an ISAPI filter.
You perform this task to set the enable client certification for each Webgate that protects a Web site for a single IIS Web server instance. You can do this either immediately after the adding the impersonation DLL to an individual Web site or all at one time.
Note:
Procedures in this topic apply equally to 32-bit and 64-bit Webgates, and IIS 6, unless stated otherwise.
If you select client certificate authentication during setup, you must also add the cert_authn.dll as one of the ISAPI filters in the respective Web site.
To enable SSL on the IIS v6 Web:
Start the Internet Information Services (IIS) Manager, if needed: Click Start, Programs, Administrative Tools, Internet Information Services (IIS) Manager.
Expand the local computer icon to display your Web Sites.
Expand the appropriate individual Web Site, then expand \access\oblix\apps\webgate\bin.
Right click cert_authn.dll
and select Properties.
In the Properties panel, select the File Security tab.
In the Secure Communications sub-panel, click Edit.
In the Client Certificate Authentication sub-panel, click Accept Certificates and click OK.
Click OK in the cert_authn.dll Properties panel.
Repeat for each Webgate installed on this host.
Proceed to the next task: "To add cert_authn.dll as an ISAPI filter".
To add cert_authn.dll as an ISAPI filter:
cert_authn
".\Webgate_install_dir\access\oblix\apps\webgate\bin
cert_authn.dll
as the executable.