Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
This article describes how to set up server-side and client-side https authentication in Tomcat, used in Smart ID Identity Manager.
For more information, see Default ports in Identity ManagerSmart ID.
Expandall |
---|
Prerequisites
Expand | ||
---|---|---|
| ||
For client-side authentication only:
|
Step-by-step instruction
Expand | |||||||||
---|---|---|---|---|---|---|---|---|---|
| |||||||||
The most basic HTTPS configuration is the server-side authentication and encrypted connection. This means that the Tomcat server will get an SSL server certificate to authenticate to the clients and trigger the HTTPS-encrypted connection. To set up server-side authentication:
|
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
If the end users are to authenticate with a client certificate to Identity Manager, an HTTPS connection with client authentication via a two-way SSL handshake, is required. This is typically used for login with smart card or soft token to Identity Manager. To set up client-side authentication:
|
Related information
- Configure secure connection for Identity Manager
- Smart ID Identity Manager
- Default ports in Identity ManagerSmart ID