+

Search Tips   |   Advanced Search

Integration and authentication with a reverse proxy


General architecture

Reverse proxies typically front MobileFirst runtimes as part of the deployment, following the gateway pattern.

The gateway icon (GW) represents a reverse proxy such as WebSphere DataPower or Security Access Manager. The GW protects MobileFirst resources from the Internet, the reverse proxy provides termination of SSL connections and authentication. The reverse proxy can also act as a policy enforcement point (PEP).

When a gateway is used, app (A) on device (D) uses the public URI advertised by the gateway instead of the internal MobileFirst URI.

The public URI can be exposed as a setting within the app or can be built in during promotion of the app to production before the app is published to public or private app stores.


Authentication at the gateway

If authentication ends at the gateway, MPF can be informed of the authenticated user using either a custom HTTP header or cookie. Figure 2 shows a typical authentication flow.

This configuration was tested with DataPower and Security Access Manager for header-based authentication and LTPA-based authentication.

Header-based authentication

  • On successful authentication, the gateway forwards a custom HTTP header with the user name or ID IBM MPF.
  • IBM MobileFirst Platform Foundation is configured to use HeaderAuthenticator and HeaderLoginModule on either Tomcat or WAS.

LTPA-based authentication


Parent topic: Integrate with other IBM products