Integration Prerequisites

Document created by RSA Information Design and Development on Jul 30, 2019
Version 1Show Document
  • View in full screen mode

Configure Runtime Interfaces

Perform these steps to configure application interfaces on the IBM Security Access Manager appliance.

1. Log in to the local management interface of the appliance.

2. Browse to Manage System Settings > Network Settings > Interfaces.

3. On the Network Configuration page, under Interfaces section, select 1.1 interface and click Edit.

4. On the Edit Interface window, select IPv4 Settings tab and click New.

5. On the Add Address window, enter IP address/subnet mask in Address field and click Save Configuration.

6. Click Save Configuration on the Edit Interface window.

7. Browse to Manage System Settings > Network Settings > Hosts file.

8. On the Manage Hosts File page, click New.

9. On the Create Host Record window,

  • Enter IP address configured above in Address field.
  • Enter a hostname in the Hostname field.
  • Click Save.

10. Deploy changes.

 

Create Reverse Proxy Instance

Perform these steps to create a reverse proxy instance on the IBM Security Access Manager.

Note:  Before you begin make sure that the Runtime Component is configured for the appliance.

1. Log in to the local management interface of the appliance.

2. Browse to Secure Web Settings > Manage > Reverse Proxy.

3. Click New.

4. On the New Reverse Proxy Instance window,

  1. On the Instance tab, specify a name for Instance Name field, from IP Address for the Primary Interface drop-down list, select the IP address configured in step 5 in previous section and click Next.

  1. On the IBM Security Access Manager tab, specify the password for sec_master in the Administrator Password field and click Next.

  1. On the Transport tab, click Finish.

5. Select the reverse proxy server created above and click Manage > Configuration > Edit Configuration File.

6. On the Advanced Configuration File Editor, under WEBSEAL GENERAL section, for web-host-name specify the hostname that was configured in step 9 in previous section and click Save.

7. Deploy changes

 

Next Step

Browse to the Configuration Summary to configure RSA SecurID Access with IBM Security Access Manager.

 

Attachments

    Outcomes