About using an HTTP proxy

Trust Protection Foundation uses HTTP to communicate with several other systems, including certain certificate authorities, certificate revocation list distribution points, and online certificate status protocol responders. Trust Protection Foundation supports communication through one or more HTTP proxies if they are required to access HTTP resources.

An HTTP proxy can be configured at the root of the Platforms tree, where it will apply to all Trust Protection Foundation engines, or it can be applied to an individual Trust Protection Foundation engine.

  • Trust Protection Foundation respects a system proxy configured in Internet Explorer, which should be set for the user account under which the service is running.

  • If an HTTP proxy is configured on an individual Trust Protection Foundation engine, that setting will override the setting at the root of the Platforms tree.
  • If HTTP proxy settings are locked at the root of the Platforms tree, they cannot be overridden on individual Trust Protection Foundation engines.

TIP  If your organization has multiple proxy servers with a different addresses and access to different resources, use partitioning and the proxy settings on individual Trust Protection Foundation engines to communicate with specific proxies. At the root of the Platforms tree, configure the proxy that will be used by most of the Trust Protection Foundation engines but do not lock the proxy settings at the root. Configure one or more Trust Protection Foundation engines to use a different proxy. Ensure that the CA Template objects that require access to the different proxies are in the portion of the policy tree that is serviced by these Trust Protection Foundation engines.

JWT Mappings operate in tandem with the central proxy configurations set at the root of the Platforms tree. See About JWT Mappings.

For information about configuring an HTTP proxy, see Configuring an HTTP proxy.