Configuring SSL-to-SSL Bridging for Secured Websites


As previously mentioned, ISA Server 2004 allows for end-to-end SSL encryption to take place between client and ISA and ISA and Exchange and back. This ensures the integrity of the transaction, and keeps the data secure and encrypted across the entire path.

To set up a scenario like this, however, a Public Key Infrastructure (PKI) must either be in place locally, or a third-party company such as Verisign or Thawte can be used to create the certificates infrastructure.

Working with Third-Party Certificate Authorities

A good number of organizations rely on third-party certificate authorities (CAs) to issue their certificates. A large advantage to this is that these third-party CAs are generally trusted on the vast majority of client machines on the Internet. This means that the connection to a web server is automatically switched to HTTPS, without any error messages popping up on the client workstation.

Installing a Local Certificate Authority and Using Certificates

For those organizations that choose to manage and handle their own certificate structure, Windows includes a Certificate Server component that can be installed directly on a domain controller. If a private CA is created, issuing certificates is a breeze and costs much less.

On the flip side, client workstations do not, by default, trust an internal CA, so it must be added into their Trusted Sites list. If it is not added, an error message always appears for them when they try to connect to that website.

To install and configure a PKI environment in Windows, create the CERT on the SharePoint Server, and transfer the certificate to ISA, follow the procedure in Chapter 10, "Extending ISA Server 2004 to Branch Offices with Site-to-Site VPNs," of this book, in the section titled "Configuring a PKI Infrastructure for PKI-Based Certificate Encryption."

Modifying a Rule to Allow for End-to-End SSL Bridging

If SSL support is to be added to an existing web publishing rule, the Listener must be modified and extended to include the information on the website's particular certificate. For example, if a web server on the Internal network named www.companyabc.com is set up and a certificate is associated with that site, the certificate must be exported out to a PFX file, imported into the ISA Server, and then used to modify the Listener via the following procedure:

1.

In the ISA Management Console, click on the Firewall Policy node.

2.

In the Details pane, double-click on the web publishing rule that is to be modified.

3.

Go to the Listener tab.

4.

Under the Listener for the website, click Properties.

5.

Select the Preferences tab, and check the box for Enable SSL.

6.

Under Certificate, click the Select button to select a certificate to apply (a certificate must be installed on ISA for this to work).

7.

Click on the certificate that was exported and click OK.

8.

Click OK, OK, Apply, and OK to save the changes.



    Microsoft Internet Security and Acceleration ISA Server 2004 Unleashed
    Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
    ISBN: 067232718X
    EAN: 2147483647
    Year: 2005
    Pages: 216
    Authors: Michael Noel

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net