Configuring a site - PingAccess - 7.3

PingAccess

bundle
pingaccess-73
ft:publication_title
PingAccess
Product_Version_ce
PingAccess 7.3
category
Product
pa-73
pingaccess
ContentType_ce

A site is only used in a proxy deployment. It contains the target address for the protected API and any other information necessary to access the application.

For more information about this procedure, including optional steps that are not included here, see Adding sites.

  1. Click Applications and then go to Sites > Sites.
  2. Click + Add Site.
  3. In the Site Name field, enter a unique name of up to 64 characters, including special characters and spaces. This name is used internally.
  4. In the Targets field, enter one or more targets.
    These targets are the actual locations of the site. The format for this is hostname:port or IP address:port. For example, www.example.com:80.
  5. Select the Secure check box if the site is expecting HTTPS connections.
    Note:

    This decision depends on whether the target expects an HTTPS connections from the PingAccess system to the protected web application.

    If you select Secure, you must also select a Trusted Certificate Group from the list, or select Trust Any to trust any certificatecertificate A digital file used for identity verification and other security purposes. The certificate, which is often issued by a certificate authority (CA), contains a public key, which can be used to verify the originator's identity. presented by the listed targets. The trusted certificate group defines what certificates or issuing certificate authorities PingAccess will trust when acting as a client to the backend server. For information about importing a certificate and creating a trusted certificate group, see Importing certificates and Creating trusted certificate groups.

  6. Click Save.
    Note: If the target site cannot be contacted, PingAccess saves the site and a displays a warning indicating the reason the site could not be reached.