Section 2, “Timeout Per Protected Resource Scenarios,” on page 5
Section 3, “Access Gateway Service Scenarios,” on page 10
Section 4, “SSL VPN Server Scenarios,” on page 11
1 Linux Access Gateway Appliance Scenarios
novdocx (en) 17 September 2009
Section 1.1, “Installing the SLES 11 Version,” on page 1
Section 1.2, “Upgrading the Linux Access Gateway Appliance,” on page 2
Section 1.3, “Migrating a SLES 9 Access Gateway to SLES 11,” on page 3
Section 1.4, “Configuring Timeout Per Protected Resource,” on page 5
1.1 Installing the SLES 11 Version
This beta scenario introduces you to the new Access Gateway Appliance which is built on SUSE®
Linux Enterprise Server (SLES 11). The SLES 11 version of the Access Gateway Appliance
supports newer hardware, and SLES 11 is a supported operating system that provides security
updates.
The previous version of the Access Gateway Appliance is built on SLES 9 SP3. The SLES 9
operating system is no longer a supported operating system and does not run on the latest hardware.
1.1.1 Assumptions
You need an installed 3.1 SP2 version of the Administration Console and Identity Server. For
installation information, see the Access Manager Installation Guide (http://www.novell.com/
This scenario explains how you can upgrade the SLES 9 Linux Access Gateway Appliances in a
cluster from 3.0 SP4 to 3.1 SP2 and use the timeout per protected resource feature.
1.2.1 Assumptions
Your current Access Manager setup has a 3.0 SP4 IR4 version of the Administration Console, the
Identity Server, and the Linux Access Gateway Appliance. The secondary Linux Access Gateway
Appliance in your cluster also has the SSL VPN server installed.
1.2.2 Known Issues
In Access Manager 3.0 SP4, the SSL VPN server installed with the Linux Access Gateway
Appliance is accelerated by using its public IP address. After upgrading to 3.1 SP2, you must
change the Web server IP address to the loopback IP address , 127.0.0.1. For more information,
see Section 2.2.7: Configuration Changes to the SSL VPN Server Installed with the Linux Access Gateway in the SSL VPN Server Guide (http://www.novell.com/documentation/beta/
3 Upgrade the primary Linux Access Gateway Appliance to 3.1 SP2.
After the successful upgrade of the Linux Access Gateway Appliances, the timeout per
protected resource feature is not enabled by default.
4 To enable the timeout per protected resource feature:
4a Modify the authentication contract configuration at the Identity Server.
4b Apply the changes to the Linux Access Gateway Appliance cluster.
novdocx (en) 17 September 2009
The timeout per protected resource feature is enabled on the Linux Access Gateway
Appliances.
5 If you have an SSL VPN server installed on the Linux Access Gateway Appliance, apply
changes to the SSL VPN server after it is upgraded to 3.1 SP2, to get the 3.1 SP2 features.
NOTE: Any SSL VPN connection made before the changes are applied at the SSL VPN server
are not enabled for the new client cleanup options.
6 Upgrade the policies.
For upgrade information, see “Upgrading the Policies” (http://www.novell.com/
documentation/beta/novellaccessmanager31/installation/data/bgfx9yh.html#bhn7nna) in the Access Manager Installation Guide (http://www.novell.com/documentation/beta/
novellaccessmanager31/installation/data/bookinfo.html).
1.3 Migrating a SLES 9 Access Gateway to SLES 11
This scenario explains how to migrate a SLES 9 SP3 Access Gateway Appliance on 3.1.1 to the
SLES 11 version of the Access Gateway Appliance. The 3.1 SP1 version of the Access Gateway
Appliance should be in a test environment.
1.3.1 Assumptions
You have an installed SLES 9 version of the Access Gateway that is imported into the
Administration Console.
You have an Administration Console and Identity Server that have been upgraded to 3.1 SP2.
For installation information, see the Access Manager Installation Guide (http://
This scenario explains how to restrict session availability based on user activity. It explains how to
configure the Timeout Per Protected Resource feature.
In previous versions of Access Manager, there is one global session timeout for all the protected
resources. With Access Manager 3.1 SP2, session availability for individual protected resources can
be configured and managed for each resource by using Timeout Per Protected Resource. You can
configure a specific authentication timeout value for each individual contract at the Identity Server,
then assign the contracts to the protected resources of the Access Gateway.
1.4.1 Assumptions
If the authentication method used for the contract is Name/Password-Basic, the session might be
active after the timeout because the browser can still send requests with the basic authentication
header.
1.4.2 Procedure
1 At the Identity Server, configure authentication contract C1, using the Name/Password-Form
method. Set the authentication timeout value to 15 minutes and set the Activity realm to
2 At the Access Gateway, create protected resource PR1 and assign C1 to it.
3 Use valid credentials to access the protected resource at 7:00 pm.
test
.
4 Leave the session idle for 5 minutes and access the resource again at 7:05 pm.
5 Leave the session idle for 10 minutes and access the resource again at 7:15 pm.
6 Leave the session idle for 15 minutes and access the resource again at 7:30 pm.
1.4.3 Test Results
For Step 5: The session does not time out by 7:15 because the user was active at 7:05 pm.
For Step 6: The session times out by 7:30 and the user is required to log in again.
1.4.4 Troubleshooting Tips
If the user does not time out after the configured timeout value has elapsed, check the defined
contracts at the Identity Server to ensure that there is no other contract in the
User activity in another contract in the same activity realm can affect your contract's timeout.
If the activity realm had not been configured and is left blank, any activity by the user at the Identity
Server can affect the user’s session timeout. You must specify a unique activity realm for this
scenario to work.
test
activity realm.
2 Timeout Per Protected Resource Scenarios
Section 2.1, “Same Activity Realm,” on page 6
Section 2.2, “Unique Activity Realms,” on page 8
Access Manager 3.1 SP2 Beta 1 Scenarios5
2.1 Same Activity Realm
The purpose of this scenario is to introduce you to the Timeout Per Protected Resource feature,
which is new in Access Manager 3.1 SP2. This scenario is designed to help you understand the
effect of having two authentication contracts in the same activity realm.
2.1.1 Assumptions
You have an installed and configured 3.1 SP2 version of an Administration Console, an Identity
Server, and an Access Gateway. The Access Gateway can be either an Access Gateway
Appliance or an Access Gateway Service.
The base URL of the Identity Server is secure (it uses SSL/HTTPS).
You understand authentication methods and authentication contracts.
You have read “Assigning a Timeout Per Protected Resource” (http://www.novell.com/