LTPA considerations when SafeLinx doesn't function as a boundary server

If SafeLinx is installed within a corporate network and doesn't function as a boundary server, you can configure it to accept LTPA cookies from other servers in the network.

A SafeLinx proxy server typically functions as a boundary firewall server that manages all incoming requests. As such, for security reasons it accepts only LTPA cookies that it generates.

Sometimes SafeLinx doesn't function as a boundary server. For example, in the case of HCL Nomad for web browsers, you set up SafeLinx within the corporate network where it functions as a proxy for accessing Domino databases.

When SafeLinx doesn't function as a boundary server, you can configure it to accept LTPA cookies from other servers in the network. Doing so avoids the need for users to authenticate again through SafeLinx after previously authenticating through another server. For example, if users log into HCL Verse or HCL Connections, they can open Nomad for web browsers without authenticating through SafeLinx.

To configure SafeLinx to accept LTPA cookies from other servers in the network, enter the following command:
chwg -s <objectclass> -l <keyvalue> -a ibm-wlAllowLtpa=TRUE

where <objectclass> is the object class for the configured resource and <keyvalue> is the keyvalue for the resource.

A Nomad for web browsers example:
chwg -s hcl-wlNomad -l nomad-web-proxy0 -a ibm-wlAllowLtpa=TRUE