Requirements for connections through the Security Proxy

Requirements for connections through the Security Proxy include:

  • SSL/TLS must be enabled on the hosts to which you want to establish SSL/TLS connections. See the documentation included with the hosts for instructions.

  • A centralized management server with the Security Proxy Add-On installed must be available. The Security Proxy must be configured to require client authorization. (It can optionally be configured to require client authentication. For client authentication, you can use a single certificate or two separate client certificates on each server (Security Proxy and destination host).

  • You may need multiple digital certificates to successfully establish the SSL/TLS sessions between the client and the Security Proxy, and the client and the destination host.