Get started with a web application
Web applications are used by an enterprise and reside in the app server within the data center.
To provide secure access with Enterprise Application Access (EAA), attach an access and identity connector to the web application server inside the data center. The connector does a dialout to the Enterprise Application Access Cloud on port 443
. The users connect to the Enterprise Application Access Login Portal URL in their web browsers. They provide their credentials once to gain access to all of the applications.
Set up a web application and learn how to:
-
Create and install a connector in Amazon AWS environment.
-
Add users to the Enterprise Application Access Cloud directory, create an Akamai identity provider (IdP).
-
Associate the directory and deploy the IdP.
-
Configure a web application (HTTPS application) with time-based access control rules (ACL) for restricted access to certain users at specific times.
-
Add authentication with the identity provider (IdP) for the web application.
-
Verify if the user can access the web application using the external hostname.
Start with a simple configuration:
-
Use the cloud directory in Enterprise Application Access (do not use any other Active Directory or LDAP).
-
Use the Akamai cloud domain (do not use any custom external domain). You do not have to configure and upload certificates.
Also, we skip for now application services like URL rewrite rules for optimized content delivery, URL path-based policies, and use of Internet Content Adaptation Protocol (ICAP) for offload-processing of internet-based content by dedicated servers.
The authentication mechanism for the web application server is set to none (default). Additional configuration is needed if you want to use any of the advanced application-facing authentication mechanisms like SAML 2.0, WS Federation, and OpenID Connect 1.0.
Create, download and install an Access Identity Connector
Create and deploy a connector for Amazon AWS environment for any access application.
-
Log in to Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Clients & Connectors > Access and Identity Connectors.
-
Click Add New Connector (+).
-
Enter a connector name and an optional description.
-
Select a connector package type. The package type corresponds to the virtual environment where you are installing the connector. For example, if you install the connector on the Amazon AWS environment, select package type Amazon AWS EC2/VPC.
-
Enable Debugging.
-
Click Save Connector (✓).
The status of the connector changes to Created (Download CloudFormation Template). -
Click the connector status.
The connector file opens in a separate browser window. -
Download and save the connector file.
The connector file is used later to set up the connector in the virtual environment. -
Log in to your AWS console and select AWS services menu > AWS CloudFormation > CREATE STACK.
a. Under Create Template, select Upload a template to Amazon S3.
b. Click Choose File and select the downloaded CloudFormation template file.
c. Enter a stack name, NAT instance type, VPC ID, and subnet information and click Next.
For the NAT instance type recommended minimum is of m4.large.
d. Complete the configuration of tags, storage, and other features as needed. Since AWS does not use swap space for storage, you need a minimum of 12 GB of RAM memory.
-
Click CREATE.
Once the stack creation is complete, the connector instance starts and automatically connects to the EAA Cloud.
Next, return to the Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Clients & Connectors > Access and Identity Connectors.
-
Search for your connector and click Approve next to it.
-
Verify that the connector shows the private and public IP addresses assigned to it.
The connector reaches out to the EAA Cloud after installation.
The status changes to Ready and Connector is running.
The connector can do dialouts from the datacenter to the EAA Cloud, connecting the application inside the datacenter to the Internet through the EAA Cloud and the user.
Next, add users to the cloud directory.
Add users to the cloud directory
You need to add users who can access the web application to the cloud directory.
-
Log in to Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Identity & Users > Directories.
-
Select Cloud Directory.
-
In Users click Add New User (+).
-
Enter email, first name, and last name.
-
Click Send Invite. New users receive an email to create a password and complete their account authorization.
-
Click Save User Changes (✓).
New users are now added to the Enterprise Application Access NAME>> default directory, EAA Cloud directory.
Next, create an Akamai Identity provider (IdP).
Create an Akamai Identity provider (IdP), associate the cloud directory, and deploy the IdP
Identity providers (IdPs) manage user identity information and provide single sign-on (SSO) and multi-factor authentication (MFA).
Associate IdP to the previously created directory to allow users to authenticate to your web application.
-
Log in to Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Identity & Users > Identity Providers.
-
Click Add Identity provider (+).
-
Enter a name, description, and select the provider type as Akamai, for example,
IDP2
. -
Click Continue.
-
In Settings > General > Identity server enter a URL. Leave all other settings as defaults.
-
Click Save.
-
In Directories click Associate (+).
-
Select the Cloud Directory and click Associate.
The cloud directory appears under Directories. -
Leave the default settings in the Login portal and click Save.
Hover over the Status of the identity provider, if there are no errors, Ready for deployment appears.
-
Click Deploy IDP.
Pending Changes appears. All the pending deployment changes are shown. Make sure thatIDP2
is selected. If you select any other IdPs, they are simultaneously deployed.
You can click modified, to check the changes done with the previous version.
-
Click Deploy and add a Deploy Confirmation message in the dialog box and click Deploy.
The deployment may take several minutes to complete. When it's ready, the completed deployment flow and IdP is Deployed appear.
The cloud directory is now associated with the new identity provider. Users from to the directory can access applications associated with the identity provider.
Next, configure your web application.
Configure a web application
-
Log in to Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Applications > Applications.
-
Click Add Application (+).
-
Enter the application name and description, and select New Access App in Type.
-
Click Add Application.
Your application opens. -
In App Settings for Akamai Cloud Zone select a cloud zone located closest to the datacenter where your application resides.
-
In External Host enter the external host name for the application where the users can access the application. You can use your own domain or enter a Akamai domain:
-
If you select Use Akamai domain, enter a URL, for example,
https://sample-web-app.go.akamai-access.com
.
If you use the Akamai domain, you don't need to configure a certificate. -
If you select Use your domain, enter your own domain.
If you use your own domain, you need to add a certificate and associate the certificate for your own domain and set up a CNAME redirect for the application.
-
-
To add connectors to service your application, go to Connectors.
-
Click Associate connector and select one or more connectors. Click Associate.
To remove a connector click Disassociate next to it.
The associated connector appears under the Connectors.
Note: The connector must be running to serve the application
More than one connector is recommended for high availability and load balancing.
- In the Server Settings, configure the following:
-
Verify Origin Server Certificate (off-by-default). Allows you to do the origin server certificate validation (recommended). Also, select a root CA certificate.
-
ROOT CA Certificate. Choose the root CA certificate with the full bundle you uploaded into Enterprise Center after uploading a certificate in Certificates > Certificates.
-
Application Server IP/FQDN. In Protocol select https (default) for secure web traffic or http for http traffic. In Host: Port enter a valid internal IP address for the server or the fully qualified domain name (FQDN) that you use to access this web server when inside your company's network. Also, enter an IP port number.
If no port is specified, port
443
is the default port. Check the preview to make sure it's okay.
-
To configure multiple applications servers for load balancing go to Server load balancing, click Add New Server (+). Enterprise Application Access supports various load balancing techniques including round-robin, session or cookie stickiness, and source IP hash in Advanced settings.
-
To configure access control rules of who can access your application, go to Access tab, enable Access.
-
To create a new rule, click Add Rule (+).
To edit an existing rule, click Edit Rule.
A modal window appears. -
In Rule Name enter a name for the rule and click Add.
-
In Type select Time.
-
In Operator select either
is
oris not
. -
In Value enter the value if applicable, or select the value for the access control type.
-
Click Time to configure the time-based settings:
a. In Start Time and End Time enter a time in hh:mm, AM-PM format.
b. Select time zone.
c. Select the days of the week for when you want to deny access.
- Click Save Rule.
- You can optionally configure the following settings for your web application:
-
Services. Add any services like compression, URL rewrite rules, ICAP, and URL path-based policies.
-
Advanced. You can configure more advanced settings.
-
If Application-facing authentication mechanism is SAML 2.0., also configure SAML Settings.
-
If Application-facing authentication mechanism is WS-Federation, also configure WS-Federation Settings.
-
If Application-facing authentication mechanism is Open ID Connect 1.0., also configure OpenID.
Next, configure the authentication source and deploy your web application.
Configure the authentication source, and deploy the application
Assign the previously deployed identity provider (IdP) and directory to the web application and deploy your application.
-
Log in to Enterprise Center.
-
In the Enterprise Center navigation menu, select Application Access > Applications > Applications.
-
Select your application to open it.
-
In the Authentication add the authentication for your application:
-
Enable Authentication.
-
Select Identity provider from the list.
-
Click Assign Directory and select one or more directories from the list.
-
Click Associate.
The directory appears under the Assigned Directories.
-
-
Leave History in the Application with the default configuration and click Safe.
Hover over the Deployment symbol, if all configurations are correct, Ready for Deployment appears.
-
To deploy the application click Deploy Application.
Pending Changes appears. All the pending deployment changes are shown. Make sure you selected your application. If you select any others, they are simultaneously deployed. -
Click Deploy and add a Deploy Confirmation message in the dialog box and click Deploy.
The deployment may take several minutes to complete. When it's ready, the completed deployment flow and App Deployed appears.
Next, verify if you can access the application.
Verify you can access the web application from the EAA Login Portal
-
Open a new tab and enter the external host name URL you created for the web application in the previous steps.
For example,https://sample-web-app.go.akamai-access.com
. -
Log in with your username and password you created and added to the cloud directory.
You should be able to securely access the web application within the non-restricted access time.
Note
HTTP/2 is not supported in EAA. So, you must use a HTTP/1 protocol version of HTTPs (Web) applications in EAA when you use an AWS load balancer in front of the application.
Updated over 1 year ago