Accessing myFileGateway 2.0 using Sterling Secure Proxy
You can access myFileGateway 2.0, either deployed on ASI server with base port or on HTTP Server adapter running on ASI or AC pods, using Sterling Secure Proxy.
You can follow the standard process of creating the adapters on Sterling Secure Proxy, but you must take extra care when you create HTTP Netmap Nodes for myFileGateway 2.0 adapter. Depending on where you deploy myFileGateway 2.0 in Sterling B2B Integrator, you must provide either ASI or AC front end service IP address or Name and the Port number opened on that service, which directs to the correct internal destination port as a part of Outbound nodes.
For more information, see IBM® Sterling Secure Proxy V6.0.2 documentation.
Annotating myFileGateway 2.0 routes (v188.8.131.52 and later versions)
When installing Sterling Secure Proxy outside of the Red Hat OpenShift cluster, where Sterling B2B Integrator is running, Sterling Secure Proxy must forward the incoming requests to the necessary routes created for myFileGateway 2.0. In this case, you must disable the cookies generated by the OpenShift routes, and suitably annotate them.
haproxy.router.openshift.io/disable_cookies true haproxy.router.openshift.io/balance source
oc annotate route <name of route> --overwrite haproxy.router.openshift.io/disable_cookies=true oc annotate route <name of route> --overwrite haproxy.router.openshift.io/balance=source
Alternatively, you can use the OpenShift console UI to modify the annotations. Go to Networking > Routes. Open the routes created to access myFileGateway 2.0 and modify the annotations, as required.