J42™ for Secure Access - Client Gateway


training

Purpose

Web technology allows you to efficiently and effectively provide Internet based solutions for your B2B needs but you need to feel that the information passing over these links is secure. J42 for Secure Access provides a simple and hence effective solution to secure access across the Internet.

J42 for Secure Access has been designed to allow both connection level security as well as transaction level security in any generic client-to-host scenario regardless of the technology in use. And by using SSL technology, J42 for Secure Access provides a standard interoperable secure solution.

Site-specific security rules may require that individual users are not able to access the Internet except through a controlled gateway. The J42 for Secure Access Client Gateway provides an effective way for these sites to allow their users an SSL encrypted connection to a remote host. Users connect to a predefined port on their locally installed Client Gateway which then connects through the firewall and across the Internet to the J42 for Secure Access SSL Server running on a predefined remote host and port. This approach dramatically reduces Internet security risks.

The Client Gateway is based on the flexible J42 for Secure Access SSL server which can communicate with any client using the standard SSL protocol. Just install J42 for Secure Access Client Gateway behind the firewall at the user's site and it will support client communication with any specified J42 for Secure Access protected host. The host connection can use any protocol such as Web server, e-mail server and legacy host systems including IBM mainframe, mid-range machines and HP NonStop servers. The result is a secured client-to-gateway-to-host J42 for Secure Access SSL encrypted session which transparently supports communication with the existing host system.

The Client Gateway is just one component of the J42 for Secure Access solution. J42 for Secure Access is based on an extensive set of APIs and built into the architecture of the product is the ability to monitor the client-host communication, allowing for the full control of information flowing between the client and host. Combined with J42 for Application Access, J42 for Secure Access provides a unique instant secured GUI solution for web-to-host access.

J42 for Secure Access Client Gateway provides remote HTTPS based administration with multiple server support allowing a flexible scaleable effective solution with easy-to-use control. Each server process is fully parameterized and has a multilevel tracing facility.

Based purely on Java technology, J42 for Secure Access can be run on any platform which supports Java including HP NonStop, IBM AIX, Linux and Windows NT/2000.

J42 for Secure Access Client Gateway is provided with full documentation for the product.

J42 for Secure Access Client Gateway Architectural overview

Features

  • J42 for Secure Access is 100% Java
  • Runs on any platform: runs as a Java application on any Java compliant platform.
  • Full Security Package: with support for
    • Confidentiality: using standard SSL technology
    • Authentication: through client and server authentication
    • Non-Repudiation: via support for logging of communication and digitally signed transactions
  • Flexible Packaging: basic module gives you server authentication and confidentiality using SSL, more advanced options give you user authentication and transaction non-repudiation.
  • Strong SSL Encryption: full strength encryption to ensure confidentiality
  • Authentication through Smart Cards or other devices: authenticate the user through Smart Cards or biometric devices
  • Digitally Signed Transactions: automatically detect the host screens containing security critical transactions and use digital signing to create non-repudiateable records of the transaction
  • Interfaces to HSMs: APIs for interfacing to Hardware Security Modules using the industry standard PCKS#11 specification. An HSM gives you security for your private keys and hardware acceleration for the encryption routines.
  • Interfaces to authentication servers: APIs for interfacing to your chosen authentication server which provides up-to-the-minute authentication of certificates used for digital signatures.
  • Extensive tracing facilities: to identify problem connections or clients
  • Logging facilities: Logging API to allow you to store signed transactions in files, in a database and/or on a WORM drive.
  • On-line monitoring and control: the system administrator has web browser access to details of all sessions plus the ability to cancel them
  • Startup and shutdown control: start as a service with force and quiesce shutdown options
  • Interoperability: full support for interoperability with other Web solutions

Technical information

J42 for Secure Access is developed using Java technology and requires a minimum of Java v1.4.2. J42 for Secure Access uses industry standard encryption technology and techniques including SSL, Diffie-Hellman, MD5, SHA, RSA, DES and triple-DES.

Request a free evaluation copy of J42 for Secure Access

Back to top