Configure the custom library proxy 

Add a proxy policy to the proxy-ecm-config.tpl file to enable communication between IBM Connections and ECM servers.


Before starting

To edit configuration files, use the IBM WAS wsadmin client. See Starting the wsadmin client for details.

Important: When configuring the proxy to allow your users access to trusted third-party web sites, ensure that those sites implement appropriate security controls. Configuring the proxy to mirror content from third-party servers may cause the proxy to mirror malicious content from those servers, so be sure to allow access to trusted sites only.


Procedure

To configure the proxy-ecm-config.tpl file for custom libraries...

  1. Start the wsadmin client.

  2. Access and check out the proxy-ecm-config.tpl file:

    1. Enter the following command to access theproxy-ecm-config.tpl file: execfile("connectionsConfig.py")

        If you are prompted to specify which server to connect to, type 1.

    2. Check out the proxy-ecm-config.tpl file:

        LCConfigService.checkOutProxyEcmConfig("<working_directory>","<cell_name>")

        where:

        • <working_directory> is the temporary working directory to which the file is copied and are stored while you make changes. Use forward slashes to separate directories in the file path, even if you are using the Microsoft™ Windows™ operating system.

            AIX and Linux™ only: The directory must grant write permissions or the command does not run successfully.

        • <cell_name> is the name of the WAS cell hosting the IBM Connections application. This argument is case-sensitive, so type it with care. To obtain the cell name:print AdminControl.getCell()

        For example:

        • AIX or Linux:LCConfigService.checkOutProxyEcmConfig("/opt/temp","foo01Cell01")

        • Microsoft Windows:LCConfigService.checkOutProxyEcmConfig("c:/temp","foo01Cell01")

  3. Navigate to the working directory and open the proxy-ecm-config.tpl file in a text editor. In the policy element, replace the URL attribute with the server address of the ECM server:

      <proxy:policy url="http://<www.myECMServer.com:8080>/*" acf="none" basic-auth-support="true">
              <proxy:actions>
                  <proxy:method>GET</proxy:method>
                  <proxy:method>HEAD</proxy:method>
                  <proxy:method>POST</proxy:method>
                  <proxy:method>PUT</proxy:method>
                  <proxy:method>DELETE</proxy:method>
              </proxy:actions>
              <proxy:headers>
                  <proxy:header>User-Agent</proxy:header>
                  <proxy:header>Accept*</proxy:header>
                  <proxy:header>Content*</proxy:header>
                  <proxy:header>Authorization*</proxy:header>
                  <proxy:header>X-Method-Override</proxy:header>
                  <proxy:header>Set-Cookie</proxy:header>
                  <proxy:header>If-*</proxy:header>
                  <proxy:header>Pragma</proxy:header>
                  <proxy:header>Cache-Control</proxy:header>
                  <proxy:header>X-Server</proxy:header>
                  <proxy:header>X-Update-Nonce</proxy:header>
                  <proxy:header>X-Passthrough-Basic</proxy:header>
                  <proxy:header>X-Requested-With</proxy:header>
                  <proxy:header>If-Modified-Since</proxy:header>
                  <proxy:header>If-None-Match</proxy:header>
                  <proxy:header>com.ibm.lotus.openajax.virtualhost</proxy:header>
                  <proxy:header>com.ibm.lotus.openajax.virtualport</proxy:header>
              </proxy:headers>
              <proxy:cookies>
                  <proxy:cookie>LtpaToken</proxy:cookie>
                  <proxy:cookie>LtpaToken2</proxy:cookie>
                  <proxy:cookie>JSESSIONID</proxy:cookie>
              </proxy:cookies>
          </proxy:policy>

  4. You can optionally specify values for the following proxy:meta-data properties. Add any custom configurations before these proxy:meta-data elements.

      circular_redirects

        Specifies that circular redirects are allowed. This property accepts a Boolean value of true or false specified in lower-case letters. If set to true, it supports using a proxy for a site that redirects to the same URL but with different parameters. Such a change is not recognized as a new URL. The default value of this property is true.

      connection-timeout

        Amount of time before an attempt to connect to a host times out. Specified in milliseconds, the default value of this property is 60,000, which is 1 minute.

      max_circular_redirects

        Maximum number of times a circular redirect is allowed before the proxy rejects it. Specified as an integer, the default value of this property is 100.

      maxconnectionsperhost

        Maximum number of simultaneous connections between the proxy and a given host. Specified as an integer, the default value of this property is 20.

      maxtotalconnections

        Maximum number of simultaneous connections between the proxy and all of the hosts together. Specified as an integer, the default value of this property is 50.

      socket-timeout

        Amount of time before an attempt to use a socket times out. Specified in milliseconds, the default value of this property is 60,000, which is 1 minute.

      unsigned_ssl_certificate_support

        Specifies that self-signed SSL certificates are supported. This property accepts a Boolean value of true or false specified in lower-case letters. The default value of this property is true. Change it to false when the system is ready for production.

      For example:

      <proxy:meta-data>
        <proxy:name>maxconnectionsperhost</proxy:name>
        <proxy:value>20</proxy:value>
      </proxy:meta-data>  

  5. If your environment uses a pass-through proxy, add a <proxy:meta-data> element containing each of the following parameters:

      passthru_host

        The address at which the proxy is listening. In most cases, accessing the host and port from a browser causes an authentication request popup to be displayed. Required.

      passthru_password

        Password that corresponds with the passthru_username value. Required. If you do not provide a user name and password, all other parameters are ignored.

      passthru_port

        The port at which the proxy is listening. If not specified, then a default value of port 80 is used. Required.

      passthru_realm

        User credential pairs are associated with realms, not URLs. This allows the same authorization information to be used for multiple URLs or whole URL trees. When a server sends back an unauthorized error, it includes the name of the realm that the requested URL belongs to. The client can then look and see whether it has stored a username and password for the realm, and if so, it supplies that information without having to prompt the user again. If a user name and password are needed for the proxy, you can specify the realm for the proxy so that the credentials do not get sent to any proxy. If you do not specify this parameter, then the credentials are sent for all authentication attempts. In the example below, Subversion User Authentication is specified as the passthru_realm. As a result, all authentication requests from this realm on the SVN server will be provided the given username and password. Optional. Specify the passthru_realm parameter in a production environment to prevent the user name and password information from being presented for all authentication requests.

      passthru_username

        User name for authenticating with the pass-through proxy. In the example below, any username which has read access to the subversion server will be sufficient when a GET request is sent to get authorization. Required. If you do not provide a user name and password, all other parameters are ignored.

      The following example shows the configuration for a fictitious proxy firewall.

      <proxy:meta-data>      
         <proxy:name>passthru_host</proxy:name>
         <proxy:value>9.17.237.132</proxy:value>
      </proxy:meta-data>
      <proxy:meta-data>
         <proxy:name>passthru_port</proxy:name>
         <proxy:value>3128</proxy:value>
      </proxy:meta-data>
      <proxy:meta-data>
         <proxy:name>passthru_realm</proxy:name>
         <proxy:value>Subversion User Authentication</proxy:value>
      </proxy:meta-data>   
      <proxy:meta-data>
         <proxy:name>passthru_username</proxy:name>
         <proxy:value>adamsmith</proxy:value>
      </proxy:meta-data>   
      <proxy:meta-data>
         <proxy:name>passthru_password</proxy:name>
         <proxy:value>password123</proxy:value>
      </proxy:meta-data>

  6. Check in your changes: LCConfigService.checkInProxyEcmConfig("<working_directory>","<cell_name>")

  7. Restart the IBM Connections server.


What to do next

To enable communication with more ECM servers, add a new copy of the current policy for each ECM server. In each new policy change the server name in the URL attribute.


Parent topic

Configure the AJAX proxy


Related tasks


Enable custom libraries


   

 

});

+

Search Tips   |   Advanced Search