Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Scenario
  • Prerequisite
  • Configure a Apache Web server virtual host
  1. Misc
  2. Reverse proxy

Add a Fortified ID virtual host

Configure a Apache Web server virtual host for Fortified ID product.

PreviousAdd SSL certificate and enable httpsNextSet AuthnContextClassRef

Last updated 1 year ago

Scenario

When Apache Web server is installed and you have added a certificate file you need to configure what to reverse proxy. This is an example for all Fortified ID product reversed proxied.

Prerequisite

  • Windows server 2019 or later

  • Make sure you completed use case

Configure a Apache Web server virtual host

  1. Open file c:\Apache24\conf\httpd-ssl.conf

  2. Scroll to bottom of the file.

  3. The file ends with the ending of the default virtual host

    </VirtualHost>
  4. Put the curser right above the VirtualHost ending.

  5. Paste the following section to add the reverse proxy parameters for the Fortified ID products

  6. Paste the following section to add the reverse proxy parameters for the Fortified ID products

    
    # Enable Proxy
    ProxyPreserveHost On
    # Incoming. Example host and port, http://FID_SERVER:PORT/
    # Only enable below what you like to be accessed from outside
    
    # Enable Fortified ID Portal
    ProxyPass "/portal" "http://localhost:8090/portal"
    
    # Enable Fortified ID Web/IdP
    ProxyPass "/saml/" "http://localhost:8080/saml/"
    
    # Enable Fortified ID Password Reset
    ProxyPass "/pwdreset" "http://localhost:8091/pwdreset"
    
    # Enable Fortified ID Enrollment (OATH_SW, OATH_HW, Passkeys, MobileID)
    ProxyPass "/enrollment/" "http://localhost:9090/enrollment/"
    
    # Enable Fortified ID MobileID - MOS server
    ProxyPass "/mos" "http://localhost:9097/mos"
    
    # Enable Fortified ID MobileID - MOS client
    ProxyPass "/mosclient/" "http://localhost:9096/mosclient/"
    
  7. In the example above you might need to adjust the URL to the different services to map your environment. If you have any other service that you want proxypass, just add it accordingly in the file.

  8. Locate the line ServerName www.example.com:443. Update the line with example below. Change dev.fortifiedid.se to the server name you use.

    ServerName dev.fortifiedid.se:443
  9. Save file

  10. Start service Apache HTTP Server

  11. Test your configuration from a browser outside the server

  12. If things does not work:

    1. Check any firewall that might prevent communication

    2. Check Apache Web Server log-files in C:\Apache24\logs

Add SSL certificate