Scenario 2: Virtual host junctions with interfaces

Learn how to set up virtual host junctions on separate WebSEAL interfaces and two junctions configured to share a common protected object space.

The following scenario sets up:

Refer to the accompanying diagram as you proceed through the steps.

Required architecture:

Figure 1. Virtual host junction scenario 2
Virtual host junction scenario 2

Procedure - general setup:

  1. Install and configure a default WebSEAL with the first of the two required interfaces (to support SSL communication with a.b.com:443):

  2. To support SSL communication between browsers and the a.b.com virtual host (over port 443), install a server-side certificate (named ab in this example) in WebSEAL's pdsrv.kdb key file database. This certificate must be generated and signed by a Certificate Authority (CA). WebSEAL presents this certificate, on behalf of the interface, to authenticate to client browsers.

    WebSEAL provides an option to configure a separate certificate key database for junction SSL operations. We can use a separate certificate key database rather than sharing the one used for client certificates specified in the [ssl] stanza. For information, see Configuration of the WebSEAL key database file and the description of the jct-cert-keyfile option in jct-cert-keyfile.

  3. Configure a second interface to support SSL communication with y.z.com:443: sssssssssssssssss ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss ss>
  4. To support SSL communication between browsers and the y.z.com virtual host (over port 443), install a server-side certificate (named yz in this example) in WebSEAL's pdsrv.kdb key file database. This certificate must be generated and signed by a Certificate Authority (CA). WebSEAL presents this certificate, on behalf of the interface, to authenticate to client browsers. WebSEAL provides an option to configure a separate certificate key database for junction SSL operations. We can use a separate certificate key database rather than sharing the one used for client certificates specified in the [ssl] stanza. For information, see Configuration of the WebSEAL key database file and the description of the jct-cert-keyfile option in the jct-cert-keyfile.

  5. Assign the appropriate name as a value to the web-host-name stanza entry in the WebSEAL configuration file. We must assign the appropriate name value to ensure that the primary WebSEAL host name is used when required.

Procedure - create virtual host junctions:

  1. Create two virtual host junctionsto support HTTP and HTTPS communication to a.b.com. Use the -g option to allow the two junctions to share the object space:

      pdadmin> server task default-webseald-webseal.ibm.com virtualhost create -t tcp -h cruz1.ibm.com -v a.b.com vhost-ab-tcp pdadmin> server task default-webseald-webseal.ibm.com virtualhost create -t ssl -h cruz1.ibm.com -v a.b.com -g vhost-ab-tcp vhost-ab-ssl

  2. Create a virtual host junctionto support communication with w.x.com:80:

  3. Create a virtual host junction to support communication with y.z.com:443:

Parent topic: Virtual Hosting