PSD1079 – ISAPI redirector for Micrsoft IIS


There are some scenarios where you might like to have an Microsoft IIS in front of your Apache Tomcat (IM)

  • Hide your Tomcat (IM) from the browser clients
  • Add a SSL certificate on another instance than your Tomcat
  • Single Sign-On. This can be done in two ways:
    • IWA. On the IIS you enable Windows Authentication to support Integrated Windows Authentication (IWA). If you already logged in to a Windows domain client you will automatically be logged in to IM.
    • SAML SP. You choose on the IIS to add a SSL certificate and Anonymous as authentication. IIS will just be used to handle HTTPS traffic from the client and then redirect the communication to the Tomcat.
      To have IM act as an SAML Service Provider is not covered in this document.

System Requirements

  • PhenixID Identity Manager 5.4.1 or later. (since GhostCat vulnerability was discovered and IM 5.4.1 ships with a fixed Tomcat version we only recommend IM 5.4.1 or later for AJP integrations. IM 5.4.1 includes Apache Tomcat 8.5.53)
  • Microsoft Windows Server 2019/2016/2012R2/2008R2 running IIS
  • IIS installed with the following roles and features:
    • IIS Management Console
    • ISAPI Extensions
    • ISAPI Filters
    • CGI
    • Windows Authentication (optional)
  • For Windows Authentication/Integrated Windows Authentication (IWA) the windows clients needs to be member of the same AD domain as the IIS server.


Download Tomcat Connector for IM

Click the link to download Tomcat Connector for IIS and AJP.
Note: This document is only supported and tested for Apache Tomcat 8.5.53 or later.

PhenixID strongly recommend not to use any earlier version of Tomcat than 8.5.53.

Configure Microsoft IIS

Add Microsoft IIS  with the following features before

  • Windows Authentication
  • ISAPI Extensions
  • ISAPI Filters
  • CGI

See screenshots below for IIS configuration

Add role and feature1

Add role and feature2

Add role and feature3

Install Apache Tomcat Connector

Installation and configure IIS permissions

  1. Extract the previous downloaded file,, to C:\Program Files. Result should look like below.
  2. Add write permissions to the Apache Tomcat Connector for IIS log directory by running the following command as an administrator:
    Important! Run the CMD as administrator!set rights
icacls.exe "c:\Program Files\TomcatConnectorIIS\log" /grant "IIS APPPOOL\DefaultAppPool":(OI)(CI)(RX,W)

Configure IIS Manager

Add the Apache Tomcat Connector for IIS as an ISAPI Filter

  1. Start the Internet Information Services (IIS) Manager
  2. Select “Default Web Site” and double click on “ISAPI Filters”
    IIS - Add tomcat connector
  3. Click “Add…”
  4. Type “TomcatConnectorIIS” as the Filter name
  5. Select the isapi_redirect.dll C:\Program Files\TomcatConnectorIIS\bin\isapi_redirect.dll
    Add ISAPI filter
  6. Click OK

Add the Apache Tomcat Connector for IIS as a Virtual Directory

  1. Right click “Default Web Site” and select “Add Virtual Directory”
  2. Type “tomcatconnectoriis” as Alias (Make sure to type the name is lower case)
  3. Select C:\Program Files\TomcatConnectorIIS\bin as the Physical path.
  4. Click OK
    Add virtual directory

Enable the ISAPI filter and set restrictions

  1. Select the server running IIS and open the feature “ISAPI and CGI Restrictions”
    Enable ISAPI filter
  2. Click “Add…”
  3. Select C:\Program Files\TomcatConnectorIIS\bin\isapi_redirect.dll as the ISAPI or CGI path
  4. Type “TomcatConnectorIIS” as Description.
  5. Tick the checkbox “Allow extension path to execute”
    Enable ISAPI filter 2
  6. Click OK

Enable ISAPI to execute

  1. Select the server running IIS and open the feature “Handler Mappings”
    Handle Mapping
  2. Select ISAPI-dll, right-click and select “Edit Feature Permissions…”
    Edit Feature Permission
  3. Select “Execute”
  4. Click OK

Enable IWA for SSO with IM

IWA = Integrated Windows Authentication
This step is optional. If you keep “Anonymous Authentication” enabled, IIS will only be used as reverse proxy. In some scenarios you like to have the browser communicate HTTPS with the IIS and then IIS tunnel the communication to IM (Tomcat).
The following steps helps you configure support for IWA with IM.

  1. Select the server running IIS and open the feature “Authentication”
  2. Select “Anonymous Authentication” and click “Disable”
  3. Select “Windows Authentication” and click “Enable”
  4. Restart the IIS, Run “iisreset” or restart the IIS Windows Service “World Wide Web Publishing Service”.

Configuration of PhenixID Identity Manager

Configure server.xml

  1. Access to PhenixID Identity Manager:
    1. If all access to Identity Manager should be handled by IIS, remark the http connector part by putting <!– in front and –> at the end.
    2. Make sure a unique port is used for Tomcat by modifying the http connector if access to Identity Manager should be possible both by IIS and by Tomcat.
  2. Open server.xml (drive:\Program Files\PhenixID\IM\server\conf)
  3. Find the line <!–  <Connector port=”8009″ protocol=”AJP/1.3″ redirectPort=”8443″ secret=”changePasswordreadPSD1097″/> –>
    By default AJP is disabled. To enable AJP, remove <!– in front and –> at the end.
    Result should look like:
    <Connector port=”8009″ protocol=”AJP/1.3″ redirectPort=”8443″ secret=”changePasswordreadPSD1097″/>
  4. If you configure to support IWA then MUST also add tomcatAuthentication=”false” to the AJP configuration.
    Result should look like:
    <Connector port=”8009″ protocol=”AJP/1.3″ redirectPort=”8443″ secret=”changePasswordreadPSD1097″ tomcatAuthentication=”false” /> 

Change password for the AJP connector

To make sure that only Tomcat answer the correct connector we use shared secret. By default for an IM installation the shared secret is changePasswordreadPSD1097You should change this password to something unique for your installation.

Change password in

  1. Open in C:\Program Files\TomcatConnectorIIS\conf
  2. Change worker.ajp13w.secret=changePasswordreadPSD1097 to a password of your choice.
  3. Restart the IIS service

Change password in server.xml

  1. Open server.xml in C:\Program Files\PhenixID\IM\server\conf
  2. Find the AJP connector configuration
  3. Change secret=”changePasswordreadPSD1097″ to the same password as you chose in the
  4. Restart the PhenixID Identity Manager service

Configure to support IWA

This step is optional. This step apply if you like IM to support IWA.

  1. Open (drive:\Program Files\PhenixID\IM\customer\config)
  2. Add the SERVLET_AUTHENTICATION_FILTER in the upper part of the file to support windows authentication.


Restart PhenixID Identity Manager service

Restart PhenixID Identity Manager service to make sure the new configuration is read from the configuration files.

Configure Single Sign-On with a separate IIS server

If the Microsoft IIS server is installed on a different machine than PhenixID Identity Manager, the redirect settings in the Apache Tomcat Connector for IIS ISAPI filter has to be changed to the PhenixID Identity Manager server.

  1. Edit the C:\Program Files\TomcatConnectorIIS\bin\conf\ file and change the line:
    Use the IP/DNS address from the PhenixID Identity Manager server instead of localhost.
    Update line might look like:
  2. Restart the IIS, Run “iisreset” or restart the IIS Windows Service “World Wide Web Publishing Service”

Test the Apache redirector

  1. Login to a domain member windows client other than the IIS server as the user to test PhenixID Identity Manager as.
  2. Add the IPaddress/hostname from the IIS server running the “Local intranet” security zone in Internet Explorer
    Local intranet
  3. Go to http://DNSNAME_OF_IIS_SERVER/phenixid
  4. Make sure the user is authenticated to PhenixID Identity Manager


1. Verify that SAN for the web address to be used is included

If you get an https error message in your browser stating that the certificate is not issued to the desired URL  then verify that the URL is also included in the SAN and not just the server name address. In this example the user will be using the URL to reach the IM server using https.

2. Request Entity too large error with IIS integration

One or more users see a page displaying an error message similar to: “the page was not displayed because the request entity is too large”.

Relevant to
This article is relevant if you use IIS, the ISAPI filter and the Tomcat AJP1.3 connector.


Increase the max packet size as follows:
Open drive:\..\PhenixID\IM\server\conf/conf/server.xml and find the AJP 1.3 connector element. This will look something like this:
<Connector port=”8009″ protocol=”AJP/1.3″ redirectPort=”8443″ tomcatAuthentication=”false” />

Add an attribute called packetSize with a value larger than 8192 (the default) but never larger than 65536. For example:

<Connector port="8009" protocol="AJP/1.3" redirectPort="8443" tomcatAuthentication="false" packetSize="65536"/>

Open the file: (drive:\..\TomcatConnectorIIS\conf)

Add the following line at the end of the file:


The file should now appear like this:


PhenixID Identity Manager and IIS needs to be restarted after changes.

Information provided in this document is for your information only. PhenixID makes no explicit or implied claims to the validity of this information. Any trademarks referenced in this document are the property of their respective owners.

The origin of this information may be internal or external to PhenixID. PhenixID makes all reasonable efforts to verify this information.

PhenixID -