About using an HTTP proxy

Trust Protection Platform uses HTTP to communicate with several other systems, including certain certificate authorities, certificate revocation list distribution points, and online certificate status protocol responders. Trust Protection Platform supports communication through one or more HTTP proxies if they are required to access HTTP resources.

An HTTP proxy can be configured at the root of the Platforms tree, where it will apply to all Trust Protection Platform engines, or it can be applied to an individual Trust Protection Platform engine.

  • If an HTTP proxy is configured on an individual Trust Protection Platform engine, that setting will override the setting at the root of the Platforms tree.
  • If HTTP proxy settings are locked at the root of the Platforms tree, they cannot be overridden on individual Trust Protection Platform engines.

TIP  If your organization has multiple proxy servers with a different addresses and access to different resources, use partitioning and the proxy settings on individual Trust Protection Platform engines to communicate with specific proxies. At the root of the Platforms tree, configure the proxy that will be used by most of the Trust Protection Platform engines but do not lock the proxy settings at the root. Configure one or more Trust Protection Platform engines to use a different proxy. Ensure that the CA Template objects that require access to the different proxies are in the portion of the policy tree that is serviced by these Trust Protection Platform engines.

JWT Mappings operate in tandem with the central proxy configurations set at the root of the Platforms tree. See About JWT Mappings.

For information about configuring an HTTP proxy, see Configuring an HTTP proxy.