Previous Topic: Determine the Deployment Mode Before ConfigurationNext Topic: Standalone Mode


Proxy Mode

In a proxy mode deployment, you use the federation system in the DMZ to forward requests to backend web servers that host federated applications. These backend systems sit behind a firewall and are not directly accessible.

Proxy mode offers the following advantages:

Note: You can protect the HTTP Headers against modification by an unauthorized user by setting an HTTP Header prefix. More information is available for protecting HTTP Headers in proxy mode.

In proxy mode, the federation system passes all requests to the backend network. Verify that all resources on a backend web server are protected by CA SiteMinder® or another access control product.

For example, a backend web server may host a federated application as well as unprotected resources behind the firewall. If the administrator exposes the federated application, the unprotected resources are also exposed because the federation system allows full access to the backend web server without checking for authorization. This assumes that the non-federated resources are URL-addressable.

The following figure shows a typical proxy mode deployment from the perspective of the relying party.

Graphic showing the Proxy Mode Architecture

The previous figure shows the following communication flow at the relying party:

  1. A user makes an initial request for a federated resource.
  2. Based on the data in the assertion, the federation system authenticates the user, contacting the user directory at the internal site to complete the user disambiguation process.
  3. After successful authentication, a redirect response is returned back to the user's browser.
  4. The federation system proxies the request to the target web server and the user accesses the resource.