Configure Apache or IBM HTTP Web Agents
The examples in this section are for Apache agent on Linux, but you can adapt them to your configuration.
| IBM HTTP server 9 supports Apache directives; IBM HTTP server 8,5 does not. |
AmAgent directive to switch the agent on or off
Switch the agent on or off globally or independently for different server locations. Server locations include the global environment, a virtual host, a specific location, or a set of directory blocks. Use the following settings:
AmAgent On-
The agent protects server locations. It allows or denies requests based on AM policy configuration and not-enforced rules.
AmAgent Off-
Apache or IBM HTTP server protects server locations; the agent plays no part in protecting the server locations.
Default: AmAgent is set to On at a global level in the
httpd.conf configuration file as follows:
AmAgent On AmAgentConf /opt/web_agents/apache24_agent/instances/agent_1/config/agent.conf AmAuthProvider Off
The AmAgent configuration is hierarchical; when it is On or Off globally
it is set for all server locations except those explicitly specified otherwise.
|
Consider setting
|
Example where AmAgent is On globally and Off for specific directories
In the following example httpd.conf, the agent is On globally and
Off for the /var/www/transaction directory:
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/transaction>
AmAgent Off
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
AmAgent On
AmAgentConf /opt/web_agents/apache24_agent/instances/agent_1/config/agent.conf
AmAuthProvider Off
- Accessing a resource in
/var/www/ -
The agent protects the resource, and overrides the
Require all granteddirective.To access the resource, the request must match a not-enforced rule in the agent configuration or be allowed by an AM policy evaluation.
- Accessing a resource in
/var/www/transaction -
Apache or IBM HTTP server manages the access and applies the
Require all granteddirective. The agent plays no part in protecting the resource.
AmAgent is Off globally and On for specific server locations
When AmAgent configuration is Off, configure the server location
/agent as On. This allows AM to redirect requests to the /agent
endpoint after authentication.
|
In the following example httpd.conf, the agent is Off globally but On
for the /var/www/transaction and /agent locations:
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/transaction>
AmAgent On
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Location /agent>
AmAgent On
</Location>
AmAgent Off
AmAgentConf /opt/web_agents/apache24_agent/instances/agent_1/config/agent.conf
AmAuthProvider Off
- Accessing a resource in
/var/www/ -
Apache or IBM HTTP server manages the access and applies the
Require all granteddirective.The agent plays no part in protecting the resource. - Accessing a resource in
/var/www/transaction -
The agent protects the resource, and overrides the
Require all granteddirective.To access the resource, the request must match a not-enforced rule in the agent configuration or be allowed by an AM policy evaluation.
AmAuthProvider directive to use Apache as the enforcement point
When AmAgent is On, combine AM policy with Apache Require
directives to control access globally or independently for different server
locations. Server locations include the global environment, a virtual host, a
specific location, or a set of directory blocks.
| Using multiple authorization sources increases complexity. To reduce the risk of an invalid security configuration, test and validate the directives. |
Use the following settings:
AmAuthProvider Off-
The agent acts as the enforcement point, allowing or denying requests based on not-enforced rules and AM policies.
AmAuthProvider On-
Apache or IBM HTTP server acts as the enforcement point, allowing or denying requests based on AM policy and Apache
RequiredirectivesFor information about
Requiredirectives, refer to Require Directive on the Apache website.Require AmAuthis a directive specifically for Web Agents. When the directive is specified, users must be authenticated with AM. Otherwise, the agent redirects them to AM for authentication.
Default: AmAuthProvider is Off
The AmAuthProvider configuration is hierarchical; when it is On or Off
globally it is set for all server locations except those explicitly specified
otherwise.
For simplicity, it is recommended to leave AmAuthProvider as Off
globally and set it to On for specific locations where you want Apache to act
as the enforcement point.
When AmAuthProvider is On and the request doesn’t match a not-enforced rule
When a request doesn’t match a not-enforced rule, the agent does the following:
-
Checks that the user is authenticated with AM, and redirects the user for authentication if not.
-
Requests policy information from AM for the request.
-
Relays the policy information to the Apache
Require AmAuthdirective.
Apache or IBM HTTP server uses the Require AmAuth directive and other
Require directives to allow or deny access to resources.
The following image shows the flow of requests:
When AmAuthProvider is On and the request matches a not-enforced rule
When a request matches a not-enforced rule, the agent does not require the user
to be authenticated with AM or request policy information from AM.
The Require AmAuth directive returns a neutral value.
Apache or IBM HTTP server uses the other Require directives to allow or deny
access to resources.
The following image shows the flow of requests:
Consider the following points for using not-enforced rules when AmAuthProvider
is On:
-
Instead of using not-enforced rules to provide caveats to AM policy enforcement, use Apache
Requiredirectives. -
In server locations where the agent is configured with not-enforced rules, set
AmAuthProvidertoOffto let the agent do the enforcement. -
If you use not-enforced rules when
AmAuthProviderisOn, remember that the agent drops out of authorisation decisions for requests that match a rule. ApacheRequiredirectives are used to allow or deny requests.
When AmAuthProvider is On and Require AmAuth is not specified
When AmAuthProvider is On, the Require AmAuth directive should always be
specified. If AmAuthProvider is On but the Require AmAuth directive is
not specified, users are still required to authenticate with AM but
Apache does not use policy information from AM in its decision.
The following image shows the flow of requests:
The following example has this configuration:
-
The request doesn’t match a not-enforced rule.
-
AmAuthProviderisOnfor the/var/www/transactiondirectory. -
Require AmAuthis not specified
//Not a recommended configuration
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/transaction>
AmAuthProvider On
Options Indexes FollowSymLinks
AllowOverride None
<RequireAll>
Require ip 19.168.2
</RequireAll>
</Directory>
AmAgent On
AmAgentConf /opt/web_agents/apache24_agent/instances/agent_1/config/agent.conf
AmAuthProvider Off
- Accessing a resource in
/var/www/transaction -
Apache or IBM HTTP server uses the
Require ipdirective to allow or deny the request. The user must be authenticated with AM and a valid user must be set, but AM policy information is ignored.
Example where AmAuthProvider is Off globally and On for specific directories
The example is configured as follows:
-
The request doesn’t match a not-enforced rule
-
AmAuthProviderisOffglobally -
AmAuthProviderisOnfor the/var/www/transactiondirectory: -
Require AmAuthis specified
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/transaction>
AmAuthProvider On
Options Indexes FollowSymLinks
AllowOverride None
<RequireAll>
Require AmAuth
Require ip 19.168.2
</RequireAll>
</Directory>
AmAgent On
AmAgentConf /opt/web_agents/apache24_agent/instances/agent_1/config/agent.conf
AmAuthProvider Off
- Accessing a resource in
/var/www/ -
The agent acts as the enforcement point, allowing or denying requests based on not-enforced rules and AM policies.
- Accessing a resource in
/var/www/transaction -
The agent provides AM policy information to the
Require AmAuthdirective. Apache uses that and theRequire ipdirective to allow or deny the request.To access the resource, the user must be authenticated with AM, and the request must meet AM policy requirements and come from the specified IP address.
Apache as a reverse proxy
This section has an example configuration of Apache HTTP Server as a reverse proxy between AM and Web Agents. You can use any reverse proxy that supports the WebSocket protocol.
For information about how to configure Apache for load balancing, and other requirements for your environment, refer to the Apache documentation.
-
Locate the
httpd.conffile in your deployed reverse proxy instance. -
Add the modules required for a proxy configuration, as follows:
# Modules required for proxy LoadModule proxy_module modules/mod_proxy.so LoadModule proxy_http_module modules/mod_proxy_http.so LoadModule proxy_wstunnel_module modules/mod_proxy_wstunnel.soThe
mod_proxy_wstunnel.somodule is required to support the WebSocket protocol used for communication between AM and the agents. -
Add the proxy configuration inside the
VirtualHostcontext. Consider the following directives:<VirtualHost 192.168.1.1> ... # Proxy Config RequestHeader set X-Forwarded-Proto "https" (1) ProxyPass "/openam/notifications" "ws://am.example.com:8080/am/notifications" Upgrade=websocket (2) ProxyPass "/openam" "http://am.example.com:8080/am" (3) ProxyPassReverseCookieDomain "openam.internal.example.com" "proxy.example.com" (4) ProxyPassReverse "/openam" "http://am.example.com:8080/am" (5) ... </VirtualHost>(1) RequestHeader: Set to
httpsorhttp, depending on the proxy configuration. If the proxy is configured for https, as in the above example, set tohttps. Otherwise, sethttp. In a later step, you configure AM to recognize the forwarded header and use it in thegotoparameter for redirecting back to the agent after authentication.(2) ProxyPass: Set to allow WebSocket traffic between AM and the agent. If HTTPS is configured between the proxy and AM, set to use the
wssprotocol instead ofws.(3) ProxyPass: Set to allow HTTP traffic between AM and the agent.
(4) ProxyPassReverseCookieDomain: Set to rewrite the domain string in `Set-Cookie`headers in the format internal domain (AM’s domain) public domain (proxy’s domain).
(5) ProxyPassReverse: Set to the same value configured for the
ProxyPassdirective.For more information about configuring Apache HTTP Server as a reverse proxy, refer to the Apache documentation.
-
Restart the reverse proxy instance.
-
Configure AM to recover the forwarded header you configured in the reverse proxy. Also, review other configurations that may be required in an environment that uses reverse proxies. For more information, refer to Agent connection to AM through a load balancer/reverse proxy