Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Apache - SSL

Posted on 2011-03-16
3
Medium Priority
?
377 Views
Last Modified: 2012-08-13
I have recently enabled SSL security for my Apache web server. I am using weblogic as my app server. I didnt install any ssl certificate on my app server. Whenever I access my application, the following changes happen.

1) I hit the https URL. It reaches webserver.  - As a sign of encryption, the background of the url changes to pale yellow.
2) After login webserver handsover the request to the app server.  - Here the background changes to default white. Does it mean that the encrytion is topping when the request reaching the application server?

I am in an assumption that if web server is https enabled, all the requests/responses flowing through it will be encrypted nomatter how many application-servers or database-servers or content servers involved in the transaction.
Am I right or wrong? Plesae clarify!!!!
0
Comment
Question by:Raz
  • 2
3 Comments
 
LVL 57

Expert Comment

by:giltjr
ID: 35153245
Does the URL change to http?  Or does it stay https?

Are all of your href's relative or absolute?
0
 

Author Comment

by:Raz
ID: 35153326
all the urls have been changed to https. Everything is working fine here. The url remains https even after the request reaches app server. But the background color of the url changes back to white. Thats what concerns me.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 2000 total points
ID: 35153470
As long as the URL says https and all of your hrefs are relative your SSL'ed.

Your browser should also show you if it is encrypted (SSL'ed) or not by showing a lock.

Now some browsers (like Firefox) may show a warning along with the lock if there is mixed contents (SSL'ed and non-SSL'ed).  This means some of the content on the page was retrieved without SSL.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question