Create virtual junctions
Use the Junction Management page to create one or more virtual junctions in the environment.
Steps
- Select Web > Manage > Reverse Proxy.
- Select the reverse proxy to manage junctions for.
- Select Manage > Junction Management.
- Click New > Virtual Junction.
- On the Junction tab page:
- Enter the junction label in the Junction Label field.
- Select the Stateful Junction check box to have the junction to be stateful.
- Select the HTTP/2 Junction check box to enable HTTP/2 protocol to the junction server.
- Select the HTTP/2 Proxy check box to enable HTTP/2 protocol to the proxy server.
- Specify the Server Name Indicator (SNI).
- Select a junction type from the listed options on the right.
Notes for HTTP/2 junctions:
- The protected Web Server must serve HTTP/2 over both TCP and SSL for WebSEAL mutual junction type with HTTP/2 to work. For example, Microsoft IIS only serves HTTP/2 over SSL. So an HTTP/2 mutual junction type cannot be created to an IIS Web Server.
- TCP HTTP/2 junction connections do not use HTTP/2 upgrade. They require the "Prior Knowledge" method to connect to an HTTP/2 Web Server over TCP. In Apache configuration terms, this is the "Direct mode".
- On the Servers tab page:
- Click New to add a target back-end server.At lease one target back-end server must be added to create a junction.
- Complete the fields displayed.
- Click Save.
- On the Basic Authentication tab page:
- Select the Enable Basic Authentication check box if BA header information is to be used for authentication with the back-end server.
- Enter the WebSEAL user name in the Username field.
- Enter the WebSEAL password in the Password field.
- Select the Enable mutual authentication to junctioned WebSEAL servers check box if mutual authentication is to be used between a frontend WebSEAL server and a back-end WebSEAL server.
- Select the key file from the list to use for mutual authentication.
- Select the key label from the list to use for mutual authentication.
- On the Identity tab page:
- Define how WebSEAL server passes client identity information in BA headers to the back-end server by selecting appropriate actions from the list under HTTP Basic Authentication Header.
- If GSO is selected in the previous step, enter the GSO resource or resource group name in the GSO Resource or Group field. If a value other than GSO is selected in the previous step, skip this step.
- Select what HTTP header identity information is passed to the back-end server in the HTTP Header Identity Information field.
- Select encoding from the list under HTTP Header Encoding.
- Check box on the right as necessary.
- On the SSO and LTPA tab page:
- Select the Enable LTPA cookie Support check box if the junctions are to support LTPA cookies.
- If LTPA version 2 cookies (LtpaToken2) are used, select the Use Version 2 Cookies check box.
- Select the LTPA keyfile from the list under LTPA Keyfile.
- Enter the keyfile password in the LTPA Keyfile Password field.
- On the General tab page:
- Specify the name of the form based single sign-on configuration file in the FSSO Configuration File field.
- Define the hard limit for consumption of worker threads in the Percentage Value for Hard Limit of Worker Threads field.
- Define the soft limit for consumption of worker threads in the Percentage Value for Soft Limit of Worker Threads field.
- To have denied requests and failure reason information from authorization rules to be sent in the Boolean Rule header, select the Include authorization rules decision information check box.
- Click Save.
Parent topic: Junctions