iTP Secure WebServer System Administrator's Guide (Version 7.0)
Contents
iTP Secure WebServer System Administrator’s Guide—523346-012
xviii
D. Security Concepts (continued)
D. Security Concepts (continued)
Design Goals D-9
Relative Advantages D-10
E. Tool Command Language (Tcl) Basics
Tcl Syntax Rules E-1
Tcl Commands E-3
Script Commands E-4
F. HTTP/1.1 Feature List
Glossary
Index
Examples
Example 4-1. Sample Certificate in RADIX-64 Format 4-14
Example 4-2. Example Default Root Certificate 4-20
Example 4-3. Sample Secure Transport httpd.stl.config File 4-33
Example 5-1. Sample WebSafe2 install.WS Script 5-9
Example 7-1. Sample httpd.config File 7-2
Example 7-2. Sample httpd.stl.config File 7-8
Example 7-3. Sample URL 7-10
Example 7-4. Sample Image Map 7-50
Example 7-5. Sample WID Configuration File 7-61
Example 7-6. Sample WebSafe2 Configuration File 7-62
Example 8-1. Server MIME Types 8-8
Example 8-2.
Sample cgilib.h File 8-33
Example 8-3.
Sample Pathway CGI Program 8-34
Example 10-1. RLS Server Class Definition 10-2
Example 11-1. Sample Visit-Organized Report 11-15
Figures
Figure 1-1. iTP Secure WebServer Architecture 1-7
Figure 4-1. Cipher Negotiation Between Web Client and Server Lists 4-36
Figure 5-1. WebSafe2 Internet Security Processors (WISPS) in an iTP Secure
WebServer Environment 5-2
Figure 5-2. Setting Up Secure Communication Using a WebSafe2 Internet Security
Processor (WISP) 5-4
Figure 6-1. WebServer Management Processes 6-2
Figure 7-1. Image Map Areas 7-51