There are a number of Forefront Unified Access Gateway (UAG) configuration tasks that are not available in the user interface, and can only be completed by configuring registry keys. This topic summarizes some of these tasks.
Registry location | Key | Exists by default | Details |
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\UrlFilter\FullAuthPassthru |
DWORD VALUE (1 or 0) |
Yes |
Set to 1 to use pass Integrated Windows authentication credentials through to the backend published server. This setting ensures that the 401 request issued by the backend application reaches the client without being modified. The client may then authenticate using NTLM, Negotiate, or Basic authentication. The registry key is global and affects all trunks regardless of whether Integrated Windows authentication is configured on the trunk. This setting ensures that browsers automatically reply to a 401 request and perform authentication directly with the backend server. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Common\Conf\IgnoreTMGStore |
DWORD VALUE (1 or 0) |
Yes |
Set to 1 to use emergency file system recovery. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Configuration\ImportFromOtherVersion |
DWORD VALUE (1 or 0) |
Yes |
Set to 1 to import or export from earlier versions of Forefront UAG. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\UserMGR\TranslateUPN |
DWORD VALUE (1 or 0) |
Yes |
Set to 1 to enable client authentication using a user principal name (UPN) in a Forefront UAG portal. Enabling UPN consists of the following steps:
|
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\URLFilter\KCDUseUPN |
DWORD VALUE (1 or 0) |
No |
To perform Kerberos authentication using UPN, set to 1. To perform using the format DOMAIN\UserName, set to 0. If no value is set, DOMAIN\UserName will be used. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\URLFilter\PreLoginTimeOutSec |
DWORD VALUE (seconds) |
No |
The default session timeout for clients that connect to a portal but have not yet logged in is four minutes. To change this default, specify an alternative value in seconds. The minimum value is 60. After modifying this value, IIS must be restarted. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\SessionMgr\MonitorFullSessionsList |
DWORD VALUE (0 or 1) |
Yes |
Set to 1 to display RPC sessions in Web Monitor. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Configuration\MaxFileSize |
DWORD VALUE (Mb) |
Yes |
Use to set the size of the configuration log file. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\URLFilter\MaxBodyBufferSize |
DWORD VALUE (Bytes) |
Yes |
This key defines the number of bytes the URL filter can accumulate for responses. The default value is 10 Mb (1024*1000*10). All responses that needed to be accumulated and parsed and are greater than 10 Mb will be rejected, if the registry key does not define a larger size. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\URLFilter\Comm\PortScalabilityIPs |
String - comma separated list of IP that the administrator what to use to connect to the back end servers. For example: “172.23.41.25,172.23.41.26,172.23.41.27”. White spaces are allowed |
Yes |
By default, Forefront UAG binds sockets to the backend server with a single local IP. With this behavior, there is a limitation of 60,000 sockets, which can be bound. When port scalability feature is enabled, round robin is used on a list of local IPs from the registry and bind socket each time with the different IP. This feature is especially useful for RPCoverHTTP setups. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\URLFilter\Comm\SSL |
DWORD VALUE (0 or 1) |
Yes |
By default Forefront UAG validates both the certificate and the revocation list of each SSL backend server during the TLS handshake procedure. In the event where the certificate or the CRL are not valid, backend users are denied access to that given backend server. If a Forefront UAG administrator wishes to disable those validation tests, set the ValidateRwsCert and ValidateRwsCertCRL key values to 0, and then restart the IIS service on the Forefront UAG server. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\URLFilter\Send200OKEchoResponseToRPCClient |
DWORD VALUE (0 or 1) |
Yes |
By default Forefront UAG replies with a 200 OK echo response for RPC client if received a proxy discovery request. In order to disable this reply, set this key to '0'. In this case, Authorization WFE will continue its flow to the Filter extension, which will send the proxy discovery request to the RWS. The RWS will then answer by its own echo response back to the client. This feature (which enabled by default) was implemented for performance enhancement because a request/response from Filter to BE server is prevented. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\URLFilter\LogPoolStatistics |
DWORD VALUE (0 or 1) |
Yes |
Includes the statistics for various object pools used by WhlFilter and its extensions in WhlFilter core traces. Among others, includes the statistics for CExtECBs and CExtPFCs pools. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Von\UrlFilter\MaxAllHeadersLen |
DWORD VALUE (maximum default header length is 8192 bytes). |
No |
Create this key to modify the maximum default header length of all HTTP request headers accepted by the URL filter. After modifying this value, IIS must be restarted. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\Configuration\WFLB\InitialNodeStateAsStopped |
DWORD VALUE (0 or 1) |
No |
Create this key to specify that servers are added to a farm in a stopped state. This ensures that you can add servers without immediately placing them in a live state and directing traffic to them. |
HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\\von\MonitorMgr\MaxLogSizeMB |
DWORD VALUE (megabytes) |
Yes |
Specifies the maximum size of the log file. The default size is 2.5 gigabytes |
HKEY_LOCAL_MACHINE\Software\WhaleCom\e-Gap\Von\Configuration\NlbStickiness |
DWORD VALUE (between 0 and 30 minutes) |
No |
In an array configuration, the IP affinity stickiness setting specifies for how long an endpoint source IP address uses the same array member, even if other array members are available. Use this key to modify the timeout and set it between 0 and 30 minutes. If this key does not exist or no number is specified a default of 30 minutes is used. |
HKEY_LOCAL_MACHINE\SOFTWARE\Whalecom\e-Gap\von\Monitor\MessagesTimeout |
DWORD VALUE (in milliseconds) |
Yes |
Defines the timeout (in milliseconds) for Web Monitor requests for event messages (from the Web Monitor Event Viewer). |
HKEY_LOCAL_MACHINE\SOFTWARE\Whalecom\e-Gap\von\Monitor\NLBTimeout |
DWORD VALUE (in milliseconds) |
Yes |
Defines the timeout (in milliseconds) for Web Monitor requests for NLB status (from the Array Monitor). |
HKEY_LOCAL_MACHINE\SOFTWARE\Whalecom\e-Gap\von\Monitor\WFLBTimeout |
DWORD VALUE (in milliseconds) |
Yes |
Defines the timeout (in milliseconds) for Web Monitor requests for changing Web farm load balanced server states (from the Web Farm Monitor). |
When installing Forefront UAG SP1 on Forefront UAG servers, the HKEY_LOCAL_MACHINE\SOFTWARE\WhaleCom\e-Gap\von\MonitorMgr\sql-builtin-log registry key is treated as follows:
Forefront UAG RTM or Update 1 key value | Forefront UAG SP1 key value |
---|---|
Not present |
1 |
01 |
0 |
1 |
1 |
Note: |
---|
1 If the key was set to 0 before performing the installation, this key value is preserved. In this case, the new Forefront UAG DirectAccess monitoring functionality is not available because it requires SQL logging. |