Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Setup miniOrange Access Gateway


A step-by-step guide to installing and configuring miniOrange Access Gateway (MAG) for secure access and authentication.

System Requirements

miniOrange access Gateway server has the following system requirements.

  • Operating System: Linux or Windows operating system that runs minimum Java 11
  • CPU Core: 4 Core
  • RAM: 16GB and above
  • HDD: 20GB or above
  • JAVA Environment: jdk11
  • Server Access Policies: Port 80 (HTTP Port), Port 443 (HTTPS PORT), Port 8181 for MAG dashboard
  • Database: PostgreSQL, MSSQL, and MongoDB

Install miniOrange Access Gateway

Follow the steps to deploy the miniOrange Access gateway server on your operating system:


Pre-requisites:

Download Required Files:

  • miniOrangeAccessGatewaySetup.exe
    • Double-click on the downloaded .exe file.
    • Follow the installation instructions.
    • After successful installation, proceed to the next steps.

Pre-requisites:

Download Required Files:

  • mag_install.sh
  • Installation:
    • Make the script executable: chmod +x /opt/miniOrangeAccessGateway/mag_install.sh
    • Run the installation script: sh mag_install.sh
    • After successful installation, proceed to the next steps.

Follow the Step-by-Step Guide given below for miniOrange Access Gateway Setup

1. Setup Database

  • Edit the application.properties
  • For Windows: C:\Program Files (x86)\miniOrange Access Gateway\conf\application.properties
  • For Linux: /opt/miniOrangeAccessGateway/conf/application.properties
  • Property Values
    database Type of database to use:
    • PostgreSQL: postgres
    • MongoDB: mongo
    • Microsoft SQL Server: mssql
    db_host IP address or hostname of the machine where your database is running
    db_name Name of the database to connect to.

    Note: For PostgreSQL and SQL Server, make sure the database is already created.

    db_port Default Port:
    • PostgreSQL: 5432
    • MongoDB: 27017
    • Microsoft SQL Server: 1433
    username Username used to authenticate with the database.
    password Password used to authenticate with the database.

2. Restart the miniOrangeAccessGateway Service

  • For Windows, locate the “miniOrange Access Gateway” service & restart it
  • miniOrange Access Gateway Login Page

  • For Linux, use the following command: systemctl restart mo-access-gateway

3. Sign up with miniOrange Access Gateway

  • Click here to log into your miniOrange account.

    (Don’t have an account? No worries! Click here to create a new account.)

  • Open your browser and access the URL: http://localhost:8181/login
  • On your first login attempt, you will be presented with the following MAG login page:
  • miniOrange Access Gateway Login Page

    Field Values
    Username Enter the Username you use to sign in to miniOrange Cloud / Onpremise.
    Password Enter the Password you use to sign in to miniOrange Cloud / Onpremise.
    miniOrange IAM Branding Enter your miniOrange IAM Branding URL -
    db_port Default Port:
    • PostgreSQL: 5432
    • MongoDB: 27017
    • Microsoft SQL Server: 1433
    username Username used to authenticate with the database.
    password Password used to authenticate with the database.
  • After your first login, this will be the page displayed on subsequent logins.
  • miniOrange Access Gateway Login Page

  • After successful authentication, you will see the dashboard.
  • Setup miniOrange Access Gateway : Successful authentication, you can see dashboard

4. Configure Upstream Servers

Note: Upstream Group contains the details of servers on which your application is deployed.


  • Enter the Upstream Group Name.
  • Click on the Add Server button.
  • Enter the Server Details.
  • Click on Save.

    Upstream Group Details:

    Group Name Enter a unique name for the Group of Upstream Servers.
    Load Balancing
    • Disabled by default.
    • Can be enabled only if more than one active (enabled) server is present in the group.
    • Select Load Balancing Policy from the dropdown.
  • Click on Add Upstream Server Group button.
  • Setup miniOrange Access Gateway : Add Upstream

    Setup miniOrange Access Gateway : Click Add Upstream Server Group

  • Enter any Group Name.
  • Click on Add Server to add the application's IP address to your upstream group.
  • Setup miniOrange Access Gateway : Click Add Server

  • Fill in the Server Details.

    Server Details:

    Scheme Select the scheme/protocol used to access your Application Server. This field can only have one value either HTTP or HTTPS.
    Host The FQDN or IP Address of your Application Server.
    Port The Port on which the your Application Server is listening.
  • To configure multiple Upstream servers, click Add Server again and enter the Server Details.
  • Setup miniOrange Access Gateway : Configure Multiple Upstream Servers

  • Enable the Load Balancing toggle and select the load-balancing algorithm from the Policy Name dropdown.

    Note: Load Balancing can only be enabled if at least 2 servers are enabled.


    Setup miniOrange Access Gateway : Enable Load Balancing

  • Click on the Save button.

5. Add Authentication

Note: Authentication Providers contain IDP configurations used for user authentication.


  • Enter a unique Provider Name.
  • Click on Save.
  • Enter a unique Authentication Providers section.
  • Click the Add Authentication Provider button.
  • Setup miniOrange Access Gateway : Go to Authentication Providers

  • Select the protocol your IDP supports.
  • Setup miniOrange Access Gateway : Select IDP


If SAML is Selected:

  • Enter the Identity Provider name and click Save.

    Note: miniOrange Access Gateway metadata will be provided per application.


  • Setup miniOrange Access Gateway : Emter Identity Provider Name

  • In Upload IDP Metadata, upload the file provided by miniOrange.
  • Setup miniOrange Access Gateway : Upload IDP Metadata, click Save

  • Click Save.

If OAuth is Selected:

  • Fill in the details as provided by IDP.
  • Setup miniOrange Access Gateway : Enter OAuth details

  • Click Save.

6. Configure Interceptor

  • Go to Interceptors and click on Add Interceptor.
  • Setup miniOrange Access Gateway : Navigate to Interceptors, and click Add Interceptor

    Note: Interceptors are components which act like filters, that process incoming requests before they are forwarded to the Upstream Server.


    Setup miniOrange Access Gateway : Select Interceptor Type


a. Header Interceptor

The Header Interceptor adds or modifies request headers before forwarding them to the upstream application.

  • If SAML or OAuth is configured, it uses the NameID (SAML) or sub (OAuth) as the header value.
  • You can forward SAML attributes as headers.
  • You can also define custom headers with fixed values.

This is useful for sending identity details or additional metadata to backend services, without requiring changes to the upstream application.

Setup miniOrange Access Gateway : Header Interceptor details

Interceptor Type Function
Interceptor Name Name to Identify under all interceptors the Header Interceptor.
Header Name
  • Name of Header which will contain the NameId attribute value if used with SAML / sub attribute value if used with OAuth.
  • E.g., : If the Header Name is TEST_HEADER, then it will be sent as following in the request headers:

TEST_HEADER: (nameId / sub value from IdP)

Header Value Prefix Prefix Value that must be added to the Header’s Value
Header Value Fixed Value of Header.
Send SAML Headers Enable this Toggle to send all SAML Attributes as Headers.
Add Header Button Click to add Custom Header.
Custom Header Fields Define fixed header names and their corresponding values.

b. Redirect Interceptor

The Redirect Interceptor sends a redirect response to the client instead of forwarding the request to the upstream application.

  • You can configure the exact URL to redirect to.
  • Useful for routing users to login pages, external sites, or custom error pages.

This happens before the request reaches the upstream application.

Setup miniOrange Access Gateway : Redirect Interceptor details

Field Values
Interceptor Name Name to Identity the Redirect Interceptor.
Redirect URL Provide the URL to redirect to.

c. Request Verification Interceptor

The Request Verification Interceptor evaluates incoming requests against configured verifiers (e.g., headers, query params, IP address, etc.).

  • If the request meets the specified conditions, it performs a defined action such as pass, block, redirect, modify, inject, delay, or log.
  • Verifiers can be combined using logical expressions for flexible control.

This is useful for enforcing custom security rules, filtering requests, or dynamically modifying behavior based on request content.

Setup miniOrange Access Gateway : Request Verification Interceptor


Under Basic tab, provide the following details:

Field Values
Interceptor Name Name to identify the Request Verification Interceptor.
Verifier Type

Select the part of the request to verify -

  • Header
  • Query Param
  • Path Param
  • Cookie Name
  • IP Address
  • Request Body

Custom Verifier Name Logical label for this verifier; used in the condition expression.
Parameter Name
/ Path to Verify
/ Cookie Name

Enter the exact name of the field to verify -

  • Header
  • Query Param
  • Path Param
  • Request Body Parameter
  • Cookie Name

Match Type

Choose how the value should be matched -

  • Equals
  • Contains
  • Regex

Parameter Value Enter the expected value to match against.
Verifier Condition Use logical expressions to combine verifiers.
Verifier Type: IP Address
Protocol Type

Select Protocol Type -

  • IPv4
  • IPv6
  • IPv4
  • CIDR

Start IP / End IP Define IP range to match incoming requests.

In Action Details, provide the following details:

Request Type

Select the HTTP method to which the action should apply -

  • GET
  • POST
  • PUT
  • DELETE

Action Type Choose the action to perform when the request matches the verifier condition.
See below for Action Options.
Strict Verification Mode Enable this to block request if verification fails.
Add Action Parameters Allows configuration of additional request-specific modifications.
Add Rule Adds the configured rule to the interceptor.

Action Type Options

Action Type Description
pass Forwards the request without any modifications.
block Stops the request and returns a blocked response.
redirect Sends a redirect response to a specified URL.
modify

Modifies request components -

  • Header
  • Query Param
  • Path Param
  • Request Body

inject

Injects new components into the request -

  • Header
  • Query Param
  • Path Param
  • Request Body

delay Adds a delay to the response before responding.
log Logs request details for monitoring or debugging purposes.

d. JWT Interceptor

The JWT Interceptor generates a JWT token after successful authentication and appends it to the URL path.

  • Must be used after a SAML or OAuth Authentication Interceptor.
  • The token contains user identity and attribute details from the authentication response.

Useful for integrating with applications that expect JWTs in the request path for access or session validation.

Setup miniOrange Access Gateway : JWT Interceptor details

Field Values
Interceptor Name Name to identify the JWT Interceptor.
Query Param Name The query parameter name where the JWT will be appended in the URL. Defaults to access_token if left blank.
Attribute Name JWT claim that holds the NameId (SAML) / sub (OAuth) value. Defaults to sub if left blank.
Attribute Value A fixed value to be used in place of the username. If specified, the NameId (SAML) / sub (OAuth) value is ignored.
JWT Value Prefix A prefix added before the attribute value or NameId (SAML) / sub (OAuth) value in the JWT. Applied only if the corresponding value is present.
Send SAML Attributes If enabled, all SAML attributes are included as claims in the JWT.
Add Custom Attribute Allows adding custom fixed key-value pairs to the JWT.
Custom Attribute Name Name of the custom JWT claim to be added.
Custom Attribute Value Value assigned to the corresponding custom claim.

e. Response Rewrite Interceptor

The Response Rewrite Interceptor is used to inspect and modify the response returned from the upstream (end-user) application before it reaches the client. It allows you to update elements such as headers, cookies, or even parts of the response body (HTML, JSON, etc.). This is useful for:

  • Adjusting links, scripts, or content in HTML responses.
  • Replacing or removing sensitive data from JSON/XML.
  • Modifying response headers for security or behavior control

Changes are applied dynamically and transparently, without requiring any changes in the upstream application itself.

Setup miniOrange Access Gateway : Response Rewrite Interceptor


7. Configure Server

  • Go to Servers and click on Add Server.
  • Setup miniOrange Access Gateway : Navigate to Servers, and click Add Server

  • Fill in the Server Details:
  • Setup miniOrange Access Gateway : Fill out Server details

    Field Values
    HTTP Enable this button if you want to allow Access Gateway to run on HTTP.
    Port Enter the Port number that the Access Gateway will listen on for HTTP Requests.
    HTTPS Enable this button if you want to allow Access Gateway to run on HTTPS.
    SSL Port Enter the SSL Port number that the Access Gateway will listen on for HTTPS Requests.
    Keystore Type Type of keystore used to SSL Certificates ( JKS, PKCS12, PEM ).
    Upload Keystore If Keystore Type is JKS / PKCS12, then upload keystore files with extensions .jks, .p12, .pfx.
    Upload PEM Certificate If Keystore Type is PEM, then upload file with .pem extension
    Upload Private Key If Keystore Type is PEM, then upload private key with .pem extension
    Add Domain Specify the domains that this server should handle. Enter the domain & click on +Add.
    Domains Configured Domains for the current server.
  • Click on Save to save the configurations.
  • Note: After creating a server, go to the Applications section, click Edit on the desired application, and select the server where the application should be deployed.


8. Add Application

  • In the Apps section, click Add Application.
  • Setup miniOrange Access Gateway : Go to Apps, and click Add Application

  • Choose the appropriate Application Type from the list.
  • If your application isn't listed, select Custom Application to configure it manually.
  • Setup miniOrange Access Gateway : Select Application


Enter the Basic details:

Field Values
Application Name Enter a unique name to identify Application.
Server Select the Access Gateway Server from the dropdown where you want to deploy the application.
Domain Choose the domain to be used for this application from the list of domains configured on the server.
Routing Type

Subdomain-based Routing: Routes requests based on subdomains (e.g., app1.example.com, app2.example.com). Each subdomain maps to a different internal application.

Path-based Routing: Routes requests based on URL paths (e.g., example.com/app1, example.com/app2). Different paths under the same domain point to different internal applications. The Context Path value must always start with a / (forward slash).

Sub-Domain / Context Path Enter the Sub-Domain or Context Path.
Assign Groups

Assign user groups to the application (synced in real-time with MiniOrange IAM).

After selecting a group, click +Add to assign it.

Note: If groups are assigned, the application must have authentication interceptors (SAMLAuth/OAuth) on all routes. The authentication provider must also send the following attribute:

  • Attribute Name: MAG_USER_GROUPS
  • Attribute Value: USER GROUPS
Enable Request Caching Enable or disable Request Caching. If enabled, specify the URL paths for which responses should be cached on the browser side.
Setup miniOrange Access Gateway : Enter Basic details

Note:

The Hostname entered above must have a DNS entry pointing to the server on which miniOrange Access Gateway is deployed.

Group Assignment will only work if SAML / OAuth is configured for the application and an attribute MAG_USER_GROUPS is being sent by the IdP.

Switch to Add Routes tab and enter the following details:

Field Value
Path Defines the request URL pattern (e.g. /jde/owhtml, /*) that this route will handle. Supports exact paths or wildcards.
Interceptors A list of interceptors that process the request before it's forwarded. You can add, remove, or reorder them.
Authentication Provider Name Select the name from the list of configured Authentication Providers . This option will be enabled only if SAML / OAuth Interceptor is present.
Upstream Group Select the name from the list of configured Upstream Groups where the request should be forwarded.
Setup miniOrange Access Gateway : Enter Route details

Predefined-Interceptor Type Function
SAML Forces SAML Authentication before forwarding the request to upstream server.
OAuth Forces OAuth Authentication before forwarding the request to upstream server.
Catch Cookies Fetch cookies from the request and add these to the corresponding response from upstream server.
Session Logout Destroys the session of the user in Access Gateway.
Clear Cache Disable Caching


Dashboard

On the Admin Dashboard, you can view configuration summaries, monitor server health status, and inspect live request traffic.

Setup miniOrange Access Gateway : on the Admin Dashboard

License Upgrade

  • Click on Upgrade License.
  • Setup miniOrange Access Gateway : Click Upgrade License

  • Choose the License file provided by miniOrange and click on Upload.
  • Setup miniOrange Access Gateway : Select License file

Note: Initially, a trial license valid for 15 days is provided. To upgrade the license, please Contact Us.


Accessing the Gateway

  • Open a browser.
  • Enter the gateway URL: https://custom.xecurify.com/login. Ensure the following step if performed.

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products