SlideShare a Scribd company logo
Using AD360 as a
reverse proxy server
www.manageengine.com/active-directory-360/
Table of Contents
Document summary
What is a reverse proxy?
Configuring AD360 as a reverse proxy
Enabling a context-based reverse proxy
Enabling a port-based reverse proxy
1
1
2
3
4
Document summary
ManageEngine AD360 is an integrated solution comprised of multiple products including ADManager
Plus, ADAudit Plus, and ADSelfService Plus.
The purpose of this document is to guide you through the process of using AD360 as a reverse proxy
server for the products integrated with it.
What is a reverse proxy?
Before jumping into the configuration steps, let's talk about what a reverse proxy is. A reverse proxy is a
server that’s used as a strategic point in the network. It enforces web application security by hiding the
location and identity of a server when remote users access an application over the internet.
The reverse proxy server receives requests from external clients and forwards them to the target web
application servers, which are usually located inside the LAN and are not directly accessible from
outside. It also receives the response from the servers and forwards it to the client. Throughout this
whole process, the client assumes that the reverse proxy is the web application server.
Figure 1. A reverse proxy setup
1
For example, let's say the reverse proxy server is installed in the DMZ, and the application server is in the
LAN, as shown in the figure above. In this case, requests from clients (users) are received by the reverse
proxy server in the DMZ. The reverse proxy server then forwards those requests to the application server
in the LAN.
Your firewall will only permit the reverse proxy server to access the application server. External machines
never connect directly to the server running the web application.
Configuring AD360 as a reverse proxy
You can use AD360 to act a reverse proxy server for the products that you’ve integrated with it. AD360
lets you enable a context-based reverse proxy, a port-based reverse proxy, or both.
In a context-based reverse proxy, a unique context path is used to redirect requests to the individual
products. In this case, a unique context path should be set for each of the integrated products. AD360's
hostname will be assigned to the products and you can assign any unused port number—these two
details will remain the same for all integrated products.
Whenever a user requests access, the request is forwarded to the respective server based on the context
path in the URL. End users will not know the details of the servers from which they are accessing the
individual products.
2
In a port-based reverse proxy, a unique port number and protocol are used to redirect requests to
individual products. In this case, you should assign a unique port number for each server; specifying a
unique protocol is optional. The hostname of AD360 is assigned to all the individual products.
Whenever a user requests access, the request is forwarded to the respective server based on the port
number in the URL.
Note: The hostname of the AD360 server will serve as the hostname for the integrated products when a
reverse proxy is enabled.
We recommend that you apply an SSL certificate and enable HTTPS connection to AD360 to secure the
communication between clients and the reverse proxy server.
Enabling a context-based reverse proxy
3
Follow the steps below to enable a context-based reverse proxy:
1. Log in to the AD360 web console as an administrator.
2. Navigate to Admin > Administration > Reverse Proxy.
3. Click the Context-Based tab, and check the Enable Context-Based Reverse Proxy box.
4. Select the required protocol and port number from the Protocol and Port drop-down fields.
Please ensure that the port number is not being used by another application.
5. Enter a context path under the Context column for AD360 and each of its integrated products.
The context path must be unique to each product.
Enabling a port-based reverse proxy
4
Follow the steps below to enable a port-based reverse proxy:
1. Log in to the AD360 web console as an administrator.
2. Navigate to Admin > Administration > Reverse Proxy.
3. Click the Port-Based tab, and check the Enable Port-Based Reverse Proxy box.
4. Select a protocol for AD360 and the integrated products from the Protocol drop-down.
5. Enter a port number for AD360 and its products in the Port field.
Please ensure the port number is not being used by another application.
6. Copy the Target URLs for AD360 and each of the integrated products.
Users can utilize these URLs to access the necessary products.
7. Click Save Settings.
AD360 is an identity and access management (IAM) solution for managing user identities, governing access to
resources, enforcing security, and ensuring compliance. AD360 provides all these functionalities for Windows
Active Directory, Exchange Server, and Office 365. With AD360, you can choose the modules you need and start
addressing IAM challenges across on-premises, cloud, and hybrid environments—all from a single console. For
more information about AD360, please visit www.manageengine.com/ad360.
About ManageEngine AD360
You can disable reverse proxies for certain integrated products if you wish. Under the Actions column,
click the green check icon [ ] to disable a reverse proxy.
If you have any questions, please contact ad360support@manageengine.com. One of our product
experts will be happy to help you.
Disabling reverse proxies
6. Copy the Target URLs for AD360 and each of the integrated products.
Users can utilize these URLs to access the necessary products.
7. Click Save Settings.

More Related Content

PPTX
Spsnl18 exploring identity management options in office 365
PPTX
OpenID Connect and Single Sign-On for Beginners
PDF
Autodiscover flow in an exchange on premises environment non-active director...
PPTX
OpenAM Survival Tips
PPTX
1. Day 1 - Office 365 Trainning
PDF
OpenAM as Flexible Integration Component
PDF
Federation in Practice
PPTX
Introduction to Azure AD and Azure AD B2C
Spsnl18 exploring identity management options in office 365
OpenID Connect and Single Sign-On for Beginners
Autodiscover flow in an exchange on premises environment non-active director...
OpenAM Survival Tips
1. Day 1 - Office 365 Trainning
OpenAM as Flexible Integration Component
Federation in Practice
Introduction to Azure AD and Azure AD B2C

What's hot (20)

PPTX
Box connector
PPTX
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
PDF
OBIE Directory Integration - A Technical Deep Dive
PPT
Open Identity Stack Roadmap
PDF
O365con14 - information protection and control in office 365
PDF
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
PPTX
OpenAM - An Introduction
PDF
Shoot Me a Token: OpenAM as an OAuth2 Provider
PDF
Strong Customer Authentication - All Your Questions Answered
PDF
Gravitee.io
PPTX
Securing Insecure
PDF
Enterprise Security Requirements
PDF
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
PDF
Securing Single-Page Applications with OAuth 2.0
PPTX
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group Update
PDF
Token vs Cookies (DevoxxMA 2015)
PDF
OpenAM Best Practices - Corelio Media Case Study
PDF
Single sign on using WSO2 identity server
PPTX
CIS 2012 - Going Mobile with PingFederate and OAuth 2
Box connector
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OBIE Directory Integration - A Technical Deep Dive
Open Identity Stack Roadmap
O365con14 - information protection and control in office 365
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenAM - An Introduction
Shoot Me a Token: OpenAM as an OAuth2 Provider
Strong Customer Authentication - All Your Questions Answered
Gravitee.io
Securing Insecure
Enterprise Security Requirements
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
Securing Single-Page Applications with OAuth 2.0
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group Update
Token vs Cookies (DevoxxMA 2015)
OpenAM Best Practices - Corelio Media Case Study
Single sign on using WSO2 identity server
CIS 2012 - Going Mobile with PingFederate and OAuth 2
Ad

Similar to Ad360 reverse proxy (20)

PDF
Sp 29 two_factor_auth_guide
PDF
Developing applications with a microservice architecture (SVforum, microservi...
PDF
Developing applications with a microservice architecture (svcc)
PPTX
CA API Gateway: Web API and Application Security
PDF
O365con14 - moving from on-premises to online, the road to follow
PDF
#JaxLondon keynote: Developing applications with a microservice architecture
PDF
Developing Applications with a Micro Service Architecture - Chris Richardson
PPTX
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
PDF
Amigopod and ArubaOS Integration
PDF
i4Trust IAM Components
PPTX
What's new in Azure Active Directory and what's coming new ?
PDF
New Products Overview: Use Cases and Demos
PDF
New Products Overview: Use Cases and Demos
PDF
Session 3 - i4Trust components for Identity Management and Access Control i4T...
PPSX
Principales consejos para migrar su solucion a_saas
PPTX
Community call: Develop multi tenant apps with the Microsoft identity platform
PPTX
Azure from scratch part 2 By Girish Kalamati
PDF
SSL VPN Evaluation Guide
PPTX
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Sp 29 two_factor_auth_guide
Developing applications with a microservice architecture (SVforum, microservi...
Developing applications with a microservice architecture (svcc)
CA API Gateway: Web API and Application Security
O365con14 - moving from on-premises to online, the road to follow
#JaxLondon keynote: Developing applications with a microservice architecture
Developing Applications with a Micro Service Architecture - Chris Richardson
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
Amigopod and ArubaOS Integration
i4Trust IAM Components
What's new in Azure Active Directory and what's coming new ?
New Products Overview: Use Cases and Demos
New Products Overview: Use Cases and Demos
Session 3 - i4Trust components for Identity Management and Access Control i4T...
Principales consejos para migrar su solucion a_saas
Community call: Develop multi tenant apps with the Microsoft identity platform
Azure from scratch part 2 By Girish Kalamati
SSL VPN Evaluation Guide
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology

Ad360 reverse proxy

  • 1. Using AD360 as a reverse proxy server www.manageengine.com/active-directory-360/
  • 2. Table of Contents Document summary What is a reverse proxy? Configuring AD360 as a reverse proxy Enabling a context-based reverse proxy Enabling a port-based reverse proxy 1 1 2 3 4
  • 3. Document summary ManageEngine AD360 is an integrated solution comprised of multiple products including ADManager Plus, ADAudit Plus, and ADSelfService Plus. The purpose of this document is to guide you through the process of using AD360 as a reverse proxy server for the products integrated with it. What is a reverse proxy? Before jumping into the configuration steps, let's talk about what a reverse proxy is. A reverse proxy is a server that’s used as a strategic point in the network. It enforces web application security by hiding the location and identity of a server when remote users access an application over the internet. The reverse proxy server receives requests from external clients and forwards them to the target web application servers, which are usually located inside the LAN and are not directly accessible from outside. It also receives the response from the servers and forwards it to the client. Throughout this whole process, the client assumes that the reverse proxy is the web application server. Figure 1. A reverse proxy setup 1
  • 4. For example, let's say the reverse proxy server is installed in the DMZ, and the application server is in the LAN, as shown in the figure above. In this case, requests from clients (users) are received by the reverse proxy server in the DMZ. The reverse proxy server then forwards those requests to the application server in the LAN. Your firewall will only permit the reverse proxy server to access the application server. External machines never connect directly to the server running the web application. Configuring AD360 as a reverse proxy You can use AD360 to act a reverse proxy server for the products that you’ve integrated with it. AD360 lets you enable a context-based reverse proxy, a port-based reverse proxy, or both. In a context-based reverse proxy, a unique context path is used to redirect requests to the individual products. In this case, a unique context path should be set for each of the integrated products. AD360's hostname will be assigned to the products and you can assign any unused port number—these two details will remain the same for all integrated products. Whenever a user requests access, the request is forwarded to the respective server based on the context path in the URL. End users will not know the details of the servers from which they are accessing the individual products. 2
  • 5. In a port-based reverse proxy, a unique port number and protocol are used to redirect requests to individual products. In this case, you should assign a unique port number for each server; specifying a unique protocol is optional. The hostname of AD360 is assigned to all the individual products. Whenever a user requests access, the request is forwarded to the respective server based on the port number in the URL. Note: The hostname of the AD360 server will serve as the hostname for the integrated products when a reverse proxy is enabled. We recommend that you apply an SSL certificate and enable HTTPS connection to AD360 to secure the communication between clients and the reverse proxy server. Enabling a context-based reverse proxy 3 Follow the steps below to enable a context-based reverse proxy: 1. Log in to the AD360 web console as an administrator. 2. Navigate to Admin > Administration > Reverse Proxy. 3. Click the Context-Based tab, and check the Enable Context-Based Reverse Proxy box. 4. Select the required protocol and port number from the Protocol and Port drop-down fields. Please ensure that the port number is not being used by another application. 5. Enter a context path under the Context column for AD360 and each of its integrated products. The context path must be unique to each product.
  • 6. Enabling a port-based reverse proxy 4 Follow the steps below to enable a port-based reverse proxy: 1. Log in to the AD360 web console as an administrator. 2. Navigate to Admin > Administration > Reverse Proxy. 3. Click the Port-Based tab, and check the Enable Port-Based Reverse Proxy box. 4. Select a protocol for AD360 and the integrated products from the Protocol drop-down. 5. Enter a port number for AD360 and its products in the Port field. Please ensure the port number is not being used by another application. 6. Copy the Target URLs for AD360 and each of the integrated products. Users can utilize these URLs to access the necessary products. 7. Click Save Settings.
  • 7. AD360 is an identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. AD360 provides all these functionalities for Windows Active Directory, Exchange Server, and Office 365. With AD360, you can choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments—all from a single console. For more information about AD360, please visit www.manageengine.com/ad360. About ManageEngine AD360 You can disable reverse proxies for certain integrated products if you wish. Under the Actions column, click the green check icon [ ] to disable a reverse proxy. If you have any questions, please contact ad360support@manageengine.com. One of our product experts will be happy to help you. Disabling reverse proxies 6. Copy the Target URLs for AD360 and each of the integrated products. Users can utilize these URLs to access the necessary products. 7. Click Save Settings.