Enabling the DLP plug–in configures the agent to extract the resource information from the protected document. The agent passes the information to the Policy Server as part of the authorization process.
Important! A separate procedure is required in the application tier to enable the integration. Do not modify the web agent configuration file before the SharePoint agent configuration object is modified. The CA SiteMinder® administrator is responsible for completing the task.
Follow these steps:
Agent-for-SharePoint_Home\proxy-engine\conf\defaultagent
Indicates the directory where the CA SiteMinder® Agent for SharePoint is installed.
Default: (Windows) [32-bit] C:\Program Files\CA\Agent-for-SharePoint
Default: (Windows) [64-bit] C:\CA\Agent-for-SharePoint
Default: (UNIX/Linux) /opt/CA/Agent-for-SharePoint
WebAgent.conf
Example: (Windows [32-bit]) LoadPlugin="C:\Program Files\CA\Agent-for-SharePoint\agentframework\bin\DisambiguatePlugin.dll"
Example: (Windows [64-bit]) LoadPlugin="C:\CA\Agent-for-SharePoint\agentframework\bin\DisambiguatePlugin.dll"
Example: (UNIX/Linux) LoadPlugin="/opt/CA/Agent-for-SharePoint/agentframework/bin/DisambiguatePlugin.so"
The CA SiteMinder® Agent for SharePoint is configured for the CA DataMinder integration.
The CA SiteMinder® Agent for SharePoint operates as a proxy-based solution. To protect your SharePoint resources, edit the proxy rules file so that the Agent for SharePoint forwards requests to one of the following destinations:
When using the CA SiteMinder® Agent for SharePoint, and the CA DataMinder content classification services together with multiple authentication, specific proxy rules are required for the proper protection of resources.
Important! Do not use any other proxy rule settings with the Agent for SharePoint, the CA DataMinder content classification service, and multi–authentication. Resources that the CA DataMinder content classification service classifies use an HTTP request header for proper forwarding by the Agent for SharePoint. If the Agent for SharePoint does not properly forward these requests using these rules (as they are shown here), unauthorized access or disclosure is possible.
Follow these steps:
Agent-for-SharePoint_home\proxy-engine\conf\proxyrules.xml
Indicates the directory where the CA SiteMinder® Agent for SharePoint is installed.
Default: (Windows) [32-bit] C:\Program Files\CA\Agent-for-SharePoint
Default: (Windows) [64-bit] C:\CA\Agent-for-SharePoint
Default: (UNIX/Linux) /opt/CA/Agent-for-SharePoint
proxyrules_xml_default.txt
Agent-for-SharePoint_home\proxy-engine\examples\proxyrules\proxyrules_example2.xml
Agent-for-SharePoint_home\proxy-engine\conf\proxyrules.xml
:///$$PROXY_RULES_DTD$$"
:///C:\Program Files\CA\Agent-for-SharePoint\proxy-engine\conf\dtd\proxyrules.dtd"
:////opt/CA/Agent-for-SharePoint/proxy-engine/conf/dtd/proxyrules.dtd"
Note: The previous examples indicate the default installation directory for the product. If you installed the product in a different directory, edit the examples to point to your installation directory instead.
http://www.company.com
http://www.example.com
<nete:cond type="header" criteria="equals" headername="HEADER">
<nete:cond type="header" criteria="equals" headername="SMSERVICETOKEN">
<nete:case value="value1">
<nete:case value="DLP">
<nete:xprcond>
<nete:xpr>
<nete:rule>^/_login/default.aspx\?ReturnUrl=(.*)</nete:rule> <nete:result>http://sharepoint.example.com:port_number/_trust/default.aspx?trust=name_of_siteminder_trusted_identity_provider&ReturnUrl=$1</nete:result> </nete:xpr>
<nete:xpr-default>
<nete:forward>http://sharepoint.example:port_number$0</nete:forward>
</nete:xpr-default>
</nete:xprcond>
<nete:forward>http://home.company.com$0</nete:forward>
The proxy rules are set.
Copyright © 2014 CA.
All rights reserved.
|
|