Jump to content Japan - English

Software(Japanese)  >  Security(Japanese)

IceWall software

FAQ - 1 Technology
»

IceWall SSO

What Is IceWall SSO?
» What is Single Sign-On?
» What is IceWall SSO?
» Benefits
» Basic Features
Product Specifics
» Basic Architecture Diagram
» Operating Environment
» Reference Price
» Options
» FAQ
» Case Studies
» White papers
» Online Demo
» Support
» Implementation Services
» Contact Us
Related Products
» IceWall Federation
» IceWall Remote Configuration Manager

IceWall’s Office 365cloud Federation
Contact Us

1-3 Other

1-3-1  What does the basic system configuration(architecture) of IceWall SSO looks like?
1-3-2  What kind of redundancy is possible with IceWall SSO?
1-3-3  Can the configuration changes reflect without restarting?
1-3-4  Is Keyword conversion performed for a non HTML file?
1-3-5  How is session managed for Cookie not supported Browser(like i-mode)?
1-3-6  Can encrypted password be in the authentication DB?
1-3-7  What are the operational monitoring items in IceWall SSO?

1.Technology

» 1-1 Authentication authorization
» 1-2 Connection to the back-end
» 1-3 Other

2.Specifications

» 2-1 Product Specifications

3.Sales

» 3-1 Track Record
» 3-2 Other

» FAQ Top page

Q.1-3-1 

What does the basic system configuration(architecture) of IceWall SSO looks like?

A. IceWall SSO is constructed from one 3 servers - IceWall server, authentication server and the authentication DB.
Please see the URL below for more details.

» IceWall SSO basic block diagram
» Top of page

Q.1-3-2 

What kind of redundancy is possible with IceWall SSO?

A.
  • Redundancy of IceWall server
    Redundancy of IceWall server is realized by using a multiple units of load balancer products.

  • Redundancy of authentication server
    Authentication server can put in a standby system with the main system. You must purchase a separate FailOver option in order to use this feature.

  • Redundancy of back-end Web server
    It is possible by FailOver options. In addition, it is also possible to use a load balancer product.

  • Redundancy of authentication DB
    It can be realized by using replication function of the database itself or by using clustering of DB server.

» Top of page

Q.1-3-3 

Can the configuration changes reflect without restarting?

A. The contents of the changed settings will be immediately reflected on the IceWall server side.
By issuing a setting change command on the authentication server, you can change the setting without restarting the server.
However there are also some settings for which changes cannot be applied with out restart so it is necessary to restart that cases.
» Top of page

Q.1-3-4 

Is Keyword conversion performed for a non HTML file?

A. You can perform keyword conversion even for non-HTML content by specifying the MIME type for the keyword conversion target contents to in the configuration file of IceWall server.
» Top of page

Q.1-3-5 

How is session managed for Cookie not supported Browser?

A. Session can be maintained by embedding the session ID in the a part of the URL.
» Top of page

Q.1-3-6 

Can I hold the encrypted password in the authentication DB?

A. There is a standard feature of IceWall SSO in which passwords are stored in plain text by DB hash of the non-reversible(MD5, SHA, SHA256) format.
You can also incorporate your own encryption algorithm if you use password encryption library of IceWall SSO.
» Top of page

Q.1-3-7 

What are the operational monitoring items in IceWall SSO?

A. The following are the operational monitoring items which IceWall SSO provides.
  • Access logs
    Its contents describes details about each access.
  • Error Logs
    It outputs problems on system basis.
  • Security logs
    Log that can be used for login and logout auditing purposes are output.
» Top of page
Printable version
Privacy statement Using this site means you accept its terms  
Please note: all of the links on this page navigate you to pages in Japanese.