User guide
Chapter 2: Environment Setup (SSO Administrators)
2-86
Item Configuration
Name
Setting Contents Omissible or
Required
If the value set for the protection resource
URL is incorrect, sso02007 error message is
output to the system log when the
authentication server starts and stops.
Note
• If the configuration file is not correct (for example, a required item is not set, or set with invalid
values), Interstage HTTP Server cannot be started.
• The error messages output when invalid settings are configured are registered in the system log.
When Interstage HTTP Server starts up, errors can be registered in this log more than once.
• If the configuration item does not allow multiple lines, when multiple lines are entered only the top
line is valid, and other lines will be ignored.
• Set the configuration file items using the “<configuration name>=<set value>” form from the head of
line. Do not include blanks in front of or behind “=”.
• Set the items of configuration file without unnecessary blanks.
For example, “<configuration name>=123 ” (with a blank behind 123) and “<configuration name>=
NO” (with a blank in front of NO) are incorrect. Such entries will be ignored.
• If an invalid configuration name is set, it is ignored.
• Lines starting with “#” are regarded as comment lines.
The following example shows how to set a configuration file.
Example
The following is an example of a protection resource URL which accepts the authentication request and
restrains all authentication requests except those from the protection resource:
Protection resource URL:
https://bus.example.com:443/protect/
https://bus.example.com:443/bussystem/
Reject-incorrect-protection-resource-url=YES
protection-resource-url=https://bus.example.com:443/protect/
protection-resource-url=https://bus.example.com:443/bussystem/
About the set value of configuration item "protection-resource-url"
Set all protection resource information registered in the SSO repository in the configuration item
“protection-resource-url” of the authentication server correctly.
If the set value does not correspond to the protection resource information, restraint of authentication
requests, except those from the protection resource, cannot be performed correctly.