SSL Offloading with Access Manager
Originally Published: 2014-12-09
Article Number
Applies To
Issue
Resolution
Alternatively, one can also try to rewrite at the web server level. Web servers like Apache support rewriting the response headers.
The third method is using the agent to redirect through the hoem page and rewrite the url there for https.
1. Rewrite at load balancer:
We do not have any working experience on F5. But based on what we have explored there is an easy way of doing it using iRules.
One such example is the following:
when HTTP_REQUEST {
# save hostname for use in response
set fqdn_name [HTTP::host]
}
when HTTP_RESPONSE {
if { [HTTP::is_redirect] }{
if { [HTTP::header Location] starts_with "/" }{
HTTP::header replace Location "https://$fqdn_name[HTTP::header Location]"
} else {
HTTP::header replace Location "[string map {"http://" "https://"} [HTTP::header Location]]"
}
}
}
We can also have this rewrite rule applicable specific to some redirects. More information on the same can be found in this link.
2. Rewrite at Apache:
Apache web server provides a way to rewrite the Location header which contains the redirection URL. This requires the “mod_headers” module to be loaded.
For example; the following command in Apache’s httpd.conf will force all the 302 redirects using http protocol to use https:
Header edit Location ^http://(.*)$ https://$1
Refer to the following links for more information:
http://httpd.apache.org/docs/2.2/mod/mod_headers.html
http://blog.delouw.ch/2009/10/29/302-redirect-behind-ssl-terminating-proxies/
NOTE: This solution works only in versions Apache 2.2.4 and above. This command documented in some sites as failing to work for specific configurations of Apache.
3.) Rewrite URL through home page.
Utilize the mode switch in webagent.conf.
cleartrust.agent.retain_url.redirect_to_ct_home=Mode3
# Mode 3 Agent uses ct_home.asp|jsp to redirect user to the original.
# URL for both Cookie based and Query based URL Retention.
Notes
1.) Don't include port number in retention.
cleartrust.agent.exclude_port_for_retained_url=True
2.) Set CTSESSION cookie for secure use only.
cleartrust.agent.secure=True
# Specifies that the browser should accept and send cookies only via secure
# methods. Used to restrict cookies to SSL connections.
3.) Allow secure cookies over HTTP
cleartrust.agent.set_cookie_secure=True
# Specifies that cookies should be marked as secure over a
# non-SSL connection. This will accommodate situations where
# the agent is running behind an ssl offloading device.
Related Articles
01388463 39Number of Views RSA Authentication Manager Secure Proxy Server for Cloud Access Service 165Number of Views RSA Authentication Manager 8.8 upgrade fails with ERROR: auth_manager.rest_service.old_access_key is not found 1.91KNumber of Views Configure RSA Authentication Manager as a Secure Proxy Server for Cloud Access Service 87Number of Views How to check for available SSL/TLS protocols and ciphers for a specific port in RSA Authentication Manager 8.x 1.6KNumber of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…
Don't see what you're looking for?