Configuring an HTTP Proxy

You can configure a different HTTP proxy to communicate with your cloud account.

By default, if an HTTP proxy is configured for the CommServe computer, that HTTP proxy is used by all clients in the CommCell group.

Note

Starting Feature Release 11.26, when an HTTP proxy is set for Azure access nodes, the Azure storage account URLs are automatically bypassed. If your proxy is in a restrictive environment, verify that the proxy has access to the Azure storage account used in the environment.

Procedure

  1. From the navigation pane, go to Manage > Server groups.

    The Server groups page appears.

  2. Click the server group.

    The server group properties page appears.

  3. On the Configuration tab, in the HTTP proxy section, move the Use HTTP proxy toggle key to the right.

    The HTTP proxy dialog box appears.

  4. Enter the proxy server name and proxy port.

  5. To specify authentication, do the following:

    1. Move the Use authentication toggle key to the right.

    2. For Credentials, select existing credentials or create new credentials.

      Steps to create credentials
      1. Click the add button add/plus button - gray - no border.

        The Add credential dialog box appears.

      2. In Credential name, enter a descriptive name for the credentials.

      3. In Tenant ID, enter the tenant ID for the Azure account.

      4. In Application ID, enter the application ID for the tenant.

      5. In Application secret, enter the secret key for the application.

      6. From the Environment list, select the Azure environment to use the credential for.

      7. To modify the endpoint URLs, move the Show endpoints toggle key to the right, and then modify the URLs.

      8. In Description, enter a description for the credential.

  6. To use the HTTP proxy with network topologies, move the Use with network topologies toggle key to the right.

    If you select this setting, the network daemon service uses this HTTP proxy for the outgoing connections that are set up in the network topology for the server group.

Loading...