Table of Contents |
---|
Introduction
YADE can establish connections that are routed over proxies, also when connections pass through a demilitarized zone.
However the type of authentication allowed and the protocol used for the 'main' connection have to be considered when selecting a proxy.
File Transfer Protocols and Proxy Protocols
The following proxy protocols are available:
Different Proxy protocols can be used for different file transfer protocols. For example:
- HTTP proxies can be used with the FTP, HTTP, HTTPS and WebDAV protocols.
- SOCKS4 proxies can be used with FTP, FTPS and SFTP protocols.
- SOCKS5 proxies can be used with FTP, FTPS and SFTP protocols.
- See the YADE Parameter Reference - Reusable Elements - Proxy for more detailed information.
Local or remote Proxy Connection and Authentication
A proxy can be installed on any host in the network and is identified by its connection parameters.
Some Proxy protocols - e.g. SOCKS5 - allow authentication credentials to be specified.
Proxies connections are all configured using BasicConnection and BasicAuthentication elements - SSHAuthentication is not possible.
Specifying Proxy Connections
Connections to source hosts, jump hosts or target systems can be routed by a Proxyproxy.
- Proxies are defined for file transfer protocols and connections:
- In the JADE YADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- the ProxyForSFTP element is a child of the SFTPFragment
- two separate ProtocolFragments would need to be configured if it was required to define a direct connection to a server and a connection over a proxy.
- In the JADE YADE XML configuration schema proxy elements are children of ProtocolFragments. For example,
- A proxy A Proxy configuration consists of:
- a connection to the host where the Proxy proxy is located
- and optionally credentials for authentication
File Transfer Protocols and Proxy Protocols
Different file transfer protocols, such as FTP, SFTP etc., make use of different Proxy protocols. For example:
- FTP can be used with all Proxy protocols.
- SFTP can be used with SOCKS4 and SOCKS5 Proxy protocols.
- Evidence for applicable Proxy protocols is stated with the file transfer protocols in the JADE - Reference Documentation - Parameter Reference
Status colour Yellow title meaning !clear
The following proxy protocols are available:
Local or remote Proxy Connection
A proxy can be installed on any host in the network and is identified by its connection parameters.
...
Proxy Authentication
Some Proxy protocols allow to specify credentials for authentication, e.g. SOCKS5.
...
- , which is specified with a BasicConnection element and
- credentials for authentication (optional), specified using a BasicAuthentication element
The XML element hierarchy used to specify a proxy for - here - an SFTP connection are:
- ProtocolFragments
- SFTPFragment
- BasicConnection
- SSHAuthentication
- ProxyForSFTP (optional)
- SOCKS4Proxy
- BasicConnection
- Hostname
- Port
- BasicConnection
- SOCKS5Proxy
- BasicConnection
- Hostname
- Port (optional)
- BasicAuthentication
- Account
- Password (optional)
- BasicConnection
- SOCKS4Proxy
- other optional elements
- SFTPFragment
Specifying Proxy Connections for Jump Hosts / Demilitarized Zones
Jira | ||||||||
---|---|---|---|---|---|---|---|---|
|
HTTP Proxy elements can be specified for JumpFragment elements.
The XML element hierarchy used to specify a proxy for - here - an SFTP connection for a jump host / demilitarized zone are:
- ProtocolFragments
- JumpFragment
- ProxyForSFTP
- HTTPProxy
- BasicConnection
- Hostname
- Port (optional)
- BasicAuthentication
- Account
- Password (optional)
- BasicConnection
- SOCKS4Proxy
- BasicConnection
- Hostname
- Port
- BasicConnection
- SOCKS5Proxy
- BasicConnection
- Hostname
- Port (optional)
- BasicAuthentication
- Account
- Password (optional)
- BasicConnection
- HTTPProxy
- ProxyForSFTP
- JumpFragment
Change Management References
Jira | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|