iTP Secure WebServer System Administrator's Guide (iTPWebSvr 6.0+)

Contents
iTP Secure WebServer System Administrator’s Guide523346-002
xviii
Examples (continued)
Examples (continued)
Example 7-1. Sample httpd.config File 7-2
Example 7-2. Sample httpd.stl.config File 7-8
Example 7-3. Sample URL 7-10
Example 7-4. Sample Image Map 7-48
Example 7-5. Sample WID Configuration File 7-56
Example 7-6. Sample WebSafe2 Configuration File 7-57
Example 8-1. Server MIME Types 8-8
Example 8-2. Sample cgilib.h File 8-33
Example 8-3. Sample Pathway CGI Program 8-35
Example 9-1. Directory and Configuration Overview 9-3
Example 9-2. Use of getAttribute() Method to Obtain Environment Variables 9-33
Example 10-1. RLS Server Class Definition 10-2
Example 11-1. Sample Visit-Organized Report 11-15
Figures
Figure 1-1. iTP Secure WebServer Architecture 1-7
Figure 4-1. Cipher Negotiation Between Web Client and Server Lists 4-31
Figure 5-1. WebSafe2 Internet Security Processors (WISPS) in an iTP Secure
WebServer Environment 5-2
Figure 5-2. Setting Up Secure Communication Using a (WISP) 5-4
Figure 6-1. WebServer Management Processes 6-2
Figure 7-1. Image Map Areas 7-49
Figure 8-1. CGI Relationships 8-2
Figure 8-2. Generic-CGI Server class 8-3
Figure 8-3. Pathway CGI Interface 8-5
Figure 9-1.
A J2EE Web Container With Two Applications 9-6
Figure 9-2.
JSP Data Flows 9-7
Figure 9-3. iTP Secure WebServer Servlet Architecture 9-11
Figure 9-4. A Basic NSJSP Model 9-36
Figure 9-5. A Model-View-Controller Design 9-37
Figure 9-6. Requests and Responses in a JSP Application. 9-40
Figure 11-1. Requesting a Ticket 11-3
Figure 11-2. Using a Ticket 11-3
Figure 11-3. Proxies 11-10
Figure 11-4. Relative and Absolute References 11-12
Figure D-1. Basic Encryption D-2
Figure D-2. Public-Key Systems D-4
Figure D-3. Certificate Chain D-6