MAIL
Using an HTTP-proxy servlet protects the hosting Web server against malicious code by preventing other servers from attacking the requesting server, because the requests are going to the HTTP-proxy servlet, not the Web server. For security reasons it is important that you limit the sites that can be accessed through your proxy. An open proxy that passes on connections to any Web site leaves the Web server vulnerable to abuse.
You configure the proxy servlet by editing the file proxy-config.properties located in the Domino\data\properties directory. To specify which servers are allowed, use the following set of properties:
The url attribute is the target of the proxy. So, in the above example, this policy will be enforced if the GoogleProxy tries to access http://www.google.com/.
These can be GET,POST,PUT,DELETE. The most frequently used are GET and POST.
Note Cookies with specified names will always be proxied to this site. In addition, any incoming (Set-Cookie response headers) received from the site will also be remembered and eventually sent back on subsequent requests to this site.
Note Cookies are not handled as a standard header. Putting the entry "cookie" in the headers list will have no effect.
policy1.context=/proxy/QuickrProxy/
Example:
# Test properties for proxy policies
enabled=true
connectTimeout=200
policy0.url=http://www.google.com/
policy0.context=/xsp/proxy/GoogleProxy/
policy0.actions=GET,POST
policy0.cookies=
policy0.headers=*
policy0.mime-types=*
policy1.url=https://www.google.com/
policy1.context=/xsp/proxy/GoogleProxy/
policy1.actions=GET,POST
policy1.cookies=
policy1.headers=*
policy1.mime-types=*
# policy2.url=http://your_quickr_server:10038/
# policy2.context=/xsp/proxy/QuickrProxy/
# policy2.actions=GET,POST
# policy2.cookies=LtpaToken
# policy2.headers=*
# policy2.mime-types=*
Related topics