Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

JADE YADE can establish connections that are routed over proxies.

However the type of authentication allowed and the protocol used for the 'main' connection have to be considered when selecting a proxy.

File Transfer Protocols and Proxy Protocols

The following proxy protocols are available:

...

  • HTTP proxies can be used with the FTP, HTTP, HTTPS and WebDAV protocols.
  • SOCKS4 proxies can be used with FTP, FTPS and SFTP protocols.
  • SOCKS5 proxies can be used with FTP, FTPS and SFTP protocols.
  • See the YADE Parameter Reference - Reusable Elements - Proxy for more detailed information.

Local or remote Proxy Connection and Authentication

A proxy can be installed on any host in the network and is identified by its connection parameters.

...

Proxies connections are all configured using BasicConnection and BasicAuthentication elements - SSHAuthentication is not possible.

Specifying Proxy Connections

Connections to source hosts, jump hosts or target systems can be routed by a proxy.

  • Proxies are defined for file transfer protocols and connections:
    • In the JADE YADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
      • the ProxyForSFTP element is a child of the SFTPFragment
      • two separate ProtocolFragments would need to be configured if it was required to define a direct connection to a server and a connection over a proxy.
  • A proxy configuration consists of:
    • a connection to the host where the proxy is located, which is specified with a BasicConnection element and
    • credentials for authentication (optional), specified using a BasicAuthentication element

...