iTP Secure WebServer System Administrator's Guide (iTPWebSvr 5.1+)
Contents
iTP Secure WebServer System Administrator’s Guide—522659-001
xx
Examples (continued)
Examples (continued)
Example 7-5. Sample WID Configuration File 7-56
Example 7-6.
Sample WebSafe2 Configuration File 7-57
Example 8-1.
Server MIME Types 8-8
Example 8-2.
Sample cgilib.h File 8-33
Example 8-3.
Sample Pathway CGI Program 8-34
Example 10-1.
RLS Server Class Definition 10-2
Figures
Figure 1-1. iTP Secure WebServer Architecture 1-6
Figure 4-1.
Cipher Negotiation Between Web Client and Server Lists 4-31
Figure 5-1.
WebSafe2 Internet Security Processors (WISPS) in an iTP Secure
WebServer Environment 5-2
Figure 5-2.
Setting Up Secure Communication Using a WebSafe2 Internet Security
Processor (WISP) 5-4
Figure 6-1.
WebServer Management Processes 6-2
Figure 7-1.
Image Map Areas 7-49
Figure 8-1.
CGI Relationships 8-2
Figure 8-2.
Generic-CGI Server class 8-3
Figure 8-3.
Pathway CGI Interface 8-5
Figure 9-1.
Directory and Configuration Overview 9-4
Figure 9-2.
A J2EE Web Container With Two Applications 9-7
Figure 9-3.
JSP Data Flows 9-8
Figure 9-4.
iTP WebServer Servlet Architecture 9-12
Figure 9-5.
A Basic JSP Model 9-34
Figure 9-6.
A Model/View/Controller Design 9-35
Figure 9-7.
Requests and Responses in a JSP Application. 9-38
Figure 11-1.
Requesting a Ticket 11-2
Figure 11-2.
Using a Ticket 11-3
Figure 11-3.
Proxies 11-9
Figure 11-4.
Relative and Absolute References 11-11
Figure 11-5.
Sample Visit-Organized Report 11-14
Figure D-1.
Basic Encryption D-2
Figure D-2.
Public-Key Systems D-4