To clone the proxy host
On the new proxy host either:
or
Deploy a load balancer in front of the two Cloud Access Manager proxy hosts to distribute the traffic between the two hosts. This should be a layer 4 load balancer to allow Cloud Access Manager to handle the Secure Sockets Layer (SSL) connections from the users. Using a layer 7 load balancer, for example, would require the SSL connections to be terminated on the load balancer itself rather than on the Cloud Access Manager proxy hosts.
Update the network configuration to route traffic destined for the external fully qualified domain names used by the Cloud Access Manager proxy hosts to the VIP address of the load balancer, rather than the primary proxy host as before.
|
NOTE: The load balancer must have sticky IP enabled to ensure users always use the same proxy host unless in a failover situation. |
|
NOTE: If you use a reverse proxy server or load balancer in front of One Identity Cloud Access Manager, you must ensure that all headers required by Cloud Access Manager are maintained at all times. For instance, Cloud Access Manager injects JavaScript into app pages to manage session idle timeout and at the same time sets no cache headers on the response. It is essential to maintain the no cache headers at all times for Cloud Access Manager to function as designed. Removing or changing the no cache headers may cause session management issues, for example when a user uses the Back button on their browser. |
To verify that the new proxy host is working correctly
Open the Cloud Access Manager proxy log on the new proxy host, CloudAccessManagerProxy.log Search the log for entries containing the userid used to verify access to the portal. This will confirm the user was using the new proxy host. Also verify that the log entry contains the user’s IP address, typically their public IP address. If the IP address is that of the load balancer, the load balancer configuration may need to be updated to preserve the original client IP address rather than using its own.
|
NOTE: The private IP address for internal users is only visible if you have configured your internal DNS to resolve the proxy’s hostname to the private IP address of the proxy load balancer. |
© 2025 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center