Add portal application
Create and configure a header-based application to route incoming traffic to specific back-end servers.
Access Gateway applications can use policies and specialized policy configurations to create portal applications. A portal directs some traffic to specific back-end servers based on access policy and URI requests, and directs any remaining traffic to another back-end server.
When a user requests a resource, the portal receives the request and routes it to an appropriate back-end server. Each request consists of a core URL (for example, www.myportal.com) and specific resources, which are the elements that follow the core URL (for example, /2nd in the preceding diagram).
This is demonstrated in the preceding architecture diagram where any requests to www.myportal.com/2nd are routed to 2ndbackend.myportal.com, requests to www.myportal.com/3rd are routed to 3rdbackend.myportal.com, and other requests are routed to backend.myportal.com.
Portal applications use custom policies and configurations to define access to multiple back-end servers. A default policy redirecs URIs that don't fall under other policies to a default back-end application. Additional policy statements and their configurations are used to rewrite requests and redirect the requests to specific back-end applications.
The following table provides examples of how user requests are rewritten to meet the expected behaviors:
|User request||Expected behavior||
Inbound and outbound rewrites
|myportal.com/||Redirect to backend.myportal.com.||backend.myportal.com
|myportal.com/abc.htm||Redirect to backend.myportal.com/abc.htm.||backend.myportal.com/abc.htm
|myportal.com/2nd||Redirect to 2ndbackend.myportal.com based on /2nd.||2ndbackend.myportal.com
|myportal.com/2nd/efg.html||Redirect to 2ndbackend.myportal.com based on /2nd.
Strip /2nd on inbound rewrite. Add /2nd back on out bound rewrite.
|myportal.com/3rd||Redirect to 3rdbackend.myportal.com based on /3rd.||3rdbackend.myportal.com
|myportal.com/3rd/hij.html||Redirect to 3rdbackend.myportal.com based on /3rd.
Strip /3rd on inbound rewrite. Add /3rd on outbound rewrite.
The following sections describe each of the policies applied to the preceding examples:
The default policy is applied to all requests which don't match some other specific policy. The default policy causes requests to be rewritten against the default application domain and then forwarded to the back end application. After the request is serviced the result is rewritten back to the original domain and returned.
Rewrite policy for requests to /2nd
Each subsequent back-end includes a policy and advanced configuration to rewrite requests as required. In this example, the policy specifies /2nd as the root URI that triggers a rewrite. The rewriting rules remove the URI and redirect the request to a secondary back-end application (2ndbackend.myportal.com).
Rewrite policy for requests to /3rd
Each subsequent back-end includes a policy and advanced configuration to rewrite requests as required. In this example, the policy specifies /3rd as the root URI that triggers a rewrite. The rewriting rules remove the URI and redirect the request to a secondary back-end application (3rdbackend.myportal.com).
- Determine the external URL used by the application, in this example www.myportal.com
- Determine the universe of possible URIs, and their associated back ends. For instance, the sample architecture uses the following:
www.myportal.com/2nd > 2ndbackend.myportal.com.
www.myportal.com/3rd > 3rdbackend.myportal.com.
With all other URIs using backend.myportal.com as their backend.
- Determine all required header attributes required for authentication.
|Create a containing group||
Best practice, create an optional group to be assigned to the application.
|Create header application||
Create a header application which defaults to the shared common back end.
|Assign certificate to a portal application||
Assign an optional certificate to the application.
|Add additional attributes||
Add optional, but often necessary, additional attributes to the application.
|Add required access policy||
Add all required policy for all serviced URIs
|Test the application||
Test the application using header and policy simulation.