User guide
Registering a Business System
2-83
The file name and file path of the authentication server configuration file
Configuration file name:
ssoatcag.conf
Configuration file path (directory)
C:\Interstage\F3FMsso\ssoatcag\conf
/etc/opt/FJSVssoac/conf
Configuration items to Add
Table 2-8 Configuration Items to Add
Item Configuration
Name
Setting Contents Omissible or
Required
Restraint of
authentication
requests (except
from the protection
resource)
reject-incorrect-
protection-
resource-url
Set whether authentication requests (except
those from the business system protection
resource) are restrained.
YES : restrained
NO : unrestrained
Omitting this setting is the same as
specifying "NO". If values other than those
above are set, sso02040 is output to system
log, and “NO" is considered to have been set.
If users operate form authentication, and
directly access authentication Infrastructure
for authentication, the restraint of the
authentication request is invalid.
Omissible.
The protection
resource URL
which accepts
authentication
requests
protection-
resource-url
If authentication requests, except those from
the business system protection resource are
restrained, set the protection resource URL
which accepts authentication requests. This
configuration is valid only when “YES” is set
to “reject-incorrect-protection-resource-url”.
In the protection resource URL, set the site
configuration and path configuration
registered in the SSO repository using the
following URL forms.
<URL form>
[Protocol Scheme][Host Name][: Port
number][Path]
[Protocol Scheme]:
Set “http://” or “https://"
Omissible.
If “YES” is
specified for
“reject-
incorrect-
protection-
resource-
url”, this
setting is
required.