具有基本身份验证的Apache反向代理

时间:2011-02-16 00:21:53

标签: apache authentication proxy reverse reverse-proxy

在将流量转发到我的后端服务器之前,尝试使用基本身份验证配置我的反向代理。任何人都可以给我一个解决方案。

此处示例:

用户(互联网) - >反向代理/虚拟服务器(需要在此处添加基本身份验证) - >后端服务器(未经过身份验证)

3 个答案:

答案 0 :(得分:66)

您可以按照此处的说明操作:Authentication, AuthorizationAccess Control。反向代理的主要区别在于,您希望将auth内容放在Location块中,即使文档说它们只允许在Directory块中使用:

<Location />
    AuthType Basic
    ...
</Location>

在Location块之外,您可以输入代理命令,例如:

ProxyPass / http://localhost:8080/

答案 1 :(得分:17)

这是我用来通过https对数据库完成基本身份验证的配置。我的后端服务器正在运行Tomcat,我使用AJP连接到它。有趣的端口号(4443)是因为已经使用了标准端口(443),我不想在同一端口上配置多个https服务。

<IfModule mod_ssl.c>
NameVirtualHost *:4443
<VirtualHost *:4443>
        ServerAdmin webmaster@localhost
        ServerName ws.myserver.se
        ServerAlias ws.myserveralias.se
        ErrorLog /var/log/apache2/ajpProxy.error.log

        # Possible values include: debug, info, notice, warn, error, crit,
        # alert, emerg.
        LogLevel info

        CustomLog /var/log/apache2/ajpProxy.log combined

        DBDriver mysql
        DBDParams "host=127.0.0.1 port=3306 user=proxyAuthUser pass=yourDbPasswordHere dbname=yourDbName"
        DBDMin  4
        DBDKeep 8
        DBDMax  20
        DBDExptime 300        

        <Proxy *>
              # core authentication and mod_auth_basic configuration
              # for mod_authn_dbd
              AuthType Basic
              AuthName "Backend auth name"
              AuthBasicProvider dbd

             # core authorization configuration
              Require valid-user

              # mod_authn_dbd SQL query to authenticate a user
              AuthDBDUserPWQuery \
                "SELECT password FROM user WHERE emailAddress = %s"

              AddDefaultCharset Off
              Order deny,allow
              Allow from all
        </Proxy>

        ProxyPass / ajp://localhost:8009/
        ProxyPassReverse / ajp://localhost:8009/

        #   SSL Engine Switch:
        #   Enable/Disable SSL for this virtual host.
        SSLEngine on

        #   A self-signed (snakeoil) certificate can be created by installing
        #   the ssl-cert package. See
        #   /usr/share/doc/apache2.2-common/README.Debian.gz for more info.
        #   If both key and certificate are stored in the same file, only the
        #   SSLCertificateFile directive is needed.
        SSLCertificateFile    /etc/apache2/ssl/yourCertificateFile.crt
        SSLCertificateKeyFile /etc/apache2/ssl/yourPrivateKeyFile.key
        <FilesMatch "\.(cgi|shtml|phtml|php)$">
                SSLOptions +StdEnvVars
        </FilesMatch>
        <Directory /usr/lib/cgi-bin>
                SSLOptions +StdEnvVars
        </Directory>

        BrowserMatch "MSIE [2-6]" \
                nokeepalive ssl-unclean-shutdown \
                downgrade-1.0 force-response-1.0
        # MSIE 7 and newer should be able to use keepalive
        BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown
</VirtualHost>
</IfModule>

答案 2 :(得分:11)

首先,检查您的apache2是否具有utils包

sudo apt-get install apache2-utils

然后,设置用户名和密码。

sudo htpasswd -c /etc/apache2/.htpasswd <username>

之后,编辑您的反向代理以使用身份验证

<VirtualHost *:80>
    ProxyPreserveHost On

    ProxyPass / http://someaddress:1234/
    ProxyPassReverse / http://someaddress:1234/

    Timeout 5400
    ProxyTimeout 5400

    ServerName dev.mydomain.com
    ServerAlias *.dev.mydomain.com

    <Proxy *>
        Order deny,allow
        Allow from all
        Authtype Basic
        Authname "Password Required"
        AuthUserFile /etc/apache2/.htpasswd
        Require valid-user
    </Proxy>
</virtualhost>

至少,更新你的apache

sudo service apache2 reload
相关问题