+

Search Tips   |   Advanced Search

Tune the security properties for the DMZ Secure Proxy Server for IBM WAS

When creating a DMZ Secure Proxy Server for IBM WebSphere Application Server, default security levels of high, medium and low are available. In addition to the predefined configuration levels, we can modify the security settings for our DMZ Secure Proxy Server for IBM WAS. When we choose to customize the settings, a qualitative value of high, medium or low is still assigned to inform you of the overall security level of our DMZ Secure Proxy Server for IBM WAS.

A DMZ Secure Proxy Server for IBM WAS must be installed before these steps can be completed. The DMZ Secure Proxy Server for IBM WAS profile must be registered with the AdminAgent for this panel to be available.

Install the DMZ Secure Proxy Server for IBM WAS in the DMZ rather than the secured zone presents new security challenges. The DMZ Secure Proxy Server for IBM WAS has been equipped with various capabilities to provide protection for meeting these challenges. It addition to the predefined security configurations for our DMZ Secure Proxy Server for IBM WAS we can also tune the settings to customize the protection.


Tasks

  1. Click Servers > Proxy Servers > secured_proxy_server > Custom security settings to open up the Proxy security settings panel.

  2. Choose your administration option for our DMZ Secure Proxy Server for IBM WAS.

    • Local Administration - Security level: medium and high.

      This option allows two different types of administration. Managing the DMZ Secure Proxy Server for IBM WAS entirely using the wsadmin tool and loading updated profiles imported from inside the cell using the wsadmin tool are both considered Local Administration.

    • Remote Administration- Security level: low

  3. Choose your routing option for our DMZ Secure Proxy Server for IBM WAS.

    • Static routing - Security level: high
    • Dynamic routing - Security level: low and medium

  4. Choose your startup permission option for our DMZ Secure Proxy Server for IBM WAS.

    • Run as an unprivileged user - Security level: medium and high

    • Run as privileged user - Security level: low

  5. Optional: If Run as an unprivileged user is selected, enter the user name or the user group whose identity the server should assume after startup has completed.

  6. Choose your custom error page policy option for our DMZ Secure Proxy Server for IBM WAS.

    • Local error page handling - Security level: high

      If we choose to use local error page handling, we need to select which error responses should use custom error messages. Select Handle local errors for responses generated by the proxy server and select Handle remote errors for responses generated by the backend server. Both options may be selected to use custom error messages for local and remote errors. Manage your error code mappings to determine the custom error pages to be used for specific responses.

    • Remote error page handling - Security level: low and medium

      If we choose to use remote error page handling to include custom errors, we need to select which error responses should be customized. Select Handle local errors for responses generated by the proxy server and select Handle remote errors for responses generated by the backend server. Both options may be selected to use custom error messages for both local and remote errors. Manage the headers that should be sent to the custom error application and what status codes are to be recognized as errors.

We have finished customizing the security settings for our DMZ Secure Proxy Server for IBM WAS. A qualitative value of high, medium or low has been calculated based on the settings we have chosen to demonstrate the Current DMZ Security level.


Subtopics


Related:

  • WebSphere DMZ Secure Proxy Server for IBM WAS
  • Set up the proxy server