User guide
Chapter 1: Security Risks
1-28
Interstage Single Sign-on
This section explains the security threats for Interstage single sign-on and the countermeasures that can
be taken.
Configuration Model
The figure below shows the basic configuration model for Interstage single sign-on.
Figure 1-1 Interstage Single Sign-on System
The Interstage Single Sign-on system consists of three types of servers: repository servers,
authentication servers, and business servers. The user uses the system from the client Web browser.
Each server executes Web server programs. Programs that perform single sign-on run on the Web
server programs. The authentication and repository servers verify users, and the business server
authorizes the use of protection resources and provides various business services. More than one
business server can be established.
Configure the system so that clients accessing from the Internet go through the application gateway
allocated in the demilitarized zone (DMZ). Allocate the servers in the intranet connection to protect the
system from being accessed directly from the Internet.