Connect to VTScada – Adding a Web Application
The following guide outlines the steps for creating a VTSCada web application in the Agilicus platform. These instructions are intended for SSL configured VTScada deployments on windows, linux, and android devices.
If you require assistance for Safari and iOS device or if your VTScada is not configured for SSL, contact us.
Step 1: Create the Application
From the left sidebar, expand Applications and select New:
Select “a new application”.
Click on Next to be taken to the “Define application” tab:
Within the “Define application” section, populate the:
- application name
- a description of the application
- create a category name that fits the application in question
Click on Next to get to the “Hostname Aliases” section:
Select the first option of “I access via NAME-OF-APP.subdomain.domain.name” and click on next.
First under “My application is accessed” select “from my site via an onsite connector”
- Within “Set up web application firewall” select “My application expects to receive requests using its internal hostname”
Click on “Select connector”:
From the “Select a connector” drop down, pick the connector that you had previously created.
Click on “Data Path Processing”:
Select “End to End Transparent TLS” and click on “Enter upstream service”:
Within the “Enter the hostname” field, type in the hostname of the server that is hosting your VTScada web portal.
Within the “Enter the port” field, type in the port number that the VTScada web portal is listening on.
- For example if TLS is used, the port number would likely be 443.
For TLS enabled services, you would also want to select “My service is accessed via TLS”.
Click on Next to be taken to the “Authentication section”:
Select “is authentication by a proxy” and type in “/logout” (without the double quotes) into the “Enter the logout url” field.
Click on “Authenticate users”:
Select “has named users with a single role (I will assign users later)” and click on Next:
Select the APPLY button to finish off this section of the setup.
Step 2: Configure the Application
Click on “Overview” within the Applications section and select the Actions icon in the very far right hand side of the screen for the VTScada application that we just created:
After clicking on “Configure Application”, select the Proxy section
Within the Proxy section select the “Include Users Context Headers” checkbox.
Within the same section, scroll down to the “Rewrite Rules” heading and click on “ADD OTHER MAPPING”:
Populate the Internal name with your internal hostname that is hosting VTScada and the External name with the hostname Agilicus generated for external access.
Step 3: Add Permissions
We have now completed setting up your VTScada resource within the Agilicus platform. At this point you would want to create the appropriate Role Based Access Control permissions per the steps below:
- Select Access
- select Users
- select ADD USER
- Select Groups
- select ADD GROUP
- Select Resource Permissions, select ADD RESOURCE PERMISSION
- enter the group that you created beforehand and select owner
Return to Product Configuration
- Agilicus AnyX Frequently Asked Questions
- VNC Desktop
- Agilicus Connector – Container/Docker
- Agilicus Connector – NanoPI R5S
- Agilicus AnyX Product Updates
- Agilicus Connector – Export Certificate
- Agilicus Connector – Microsoft Windows
- Sign-In Errors
- Time Synchronisation
- Locked-Down Networks Certificate Revocation
- Signup: Firewall Configuration
- Geo-Location-Based Access Control
- Resources – Overview, Concepts
- Connect to VTScada – Adding a Web Application
- Web Application Security
- Administrative Users
- Define Application: Proxy
- Authorisation rules
- Real VNC & Raspberry Pi
- Connector Install: Raspberry Pi
- Kubernetes Connector Install
- Linux, FreeBSD, Embedded Connector Install
- Connector Install: Ubiquiti EdgeRouter X
- Audit Destinations
- Agilicus Connector Install: MikroTik RouterOS
- Connector Install: Netgate SG-1100 pfSense
- Identity Group Mapping
- Auto-Create Users From Specific Domain With Google Workplace
- Authentication Audit
- Authentication Issuer – Onsite Identity
- Authentication Issuer – Custom Identity
- Sign Up
- Microsoft ClickOnce
- Agilicus Connector Windows Cluster
- Usage Metrics
- Service Accounts
- Identity & Authentication Methods
- Content Security Policy
- Sign-In Theming
- Sign in With Apple
- Azure Active Directory
- Sign in With Microsoft
- Agilicus Launcher (Desktop)
- Agilicus Connector
- Zero-Trust SSH Access
- Theory of Operation: CNAME + DOMAIN
- Zero-Trust Desktop Access
- Hosted Applications
- Command Line API Access
- Multi-Factor Authentication
- Authentication Rules
- Application Request Access
- OpenWRT Connector Install
- Moxa UC-8200 Zero-Trust Connector Install
- Cisco IOx Zero Trust Connector Install
- Synology Connector Install
- Authentication Clients
- Resource Groups
- Legacy Active Directory