Enportal/5.4/admin/ssl configuration

Revision as of 15:17, 19 December 2013 by imported>Jason.nicholls (1 revision)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)


For security reasons it's recommended to run enPortal over SSL (Secure Socket Layer). This will ensure all communications between clients (browsers) and the enPortal server are encrypted.

By default enPortal is configured with SSL disabled, but it does ship with a self-signed server certificate and can easily be enabled. In production environments this certificate should be replaced with one issued by a known Certificate Authority (CA) or one signed by a trusted root certificate within the organization.

Configuring enPortal for SSL

To enable HTTPS (HTTP over SSL) mode use the HTTP_SSL runtime option and set it to true. In addition you may want to also change:

  • HTTP_PORT: HTTPS is typically served on port 443
  • KEYSTORE_FILE: if using your own certificate
  • KEYSTORE_PASS: if using your own certificate
  • KEYSTORE_TYPE: if using your own certificate

See the Runtime Options page for more information on these settings and how to configure them. After making any changes then restart the enPortal service.

Template-warning.png
Do not configure SSL by editing the enPortal server.xml file as this is a system file and replaced on upgrade. The correct way is to edit the runtime options.

Creating a Certificate

The basic process is:

  1. Pick a Certificate Authority. This may be in-house if the organization has a Standard Operating Environment with their own root certificate installed on all systems. Otherwise this would be a commercial CA such as VeriSign, Thawte, or Go Daddy.
  2. Create a Certificate Signing Request (CSR)
  3. Have the CA sign the request
  4. Download the signed certificate on the enPortal server. Depending on the CA there should be instructions and options for the format of the signed certificate; ensure an appropriate format is downloaded for use with Tomcat. It's then necessary to import this certificate into a keystore file, replace the one shipped with enPortal, and update the keystore pass and type options.

Another option is to generate a self-signed certificate to replace the self-signed certificate Edge ships with enPortal. However, to end-users they will still be presented with certificate errors and warnings.

As an example, VeriSign have documented the process for Tomcat as follows:

  1. creating a CSR and submitting for signing.
  2. importing the signed certificate into a JKS keystore. NOTE: as mentioned previously do not edit server.xml directly. Use the runtime options as documented above.

Additionally, a legacy enPortal's SSL certificate will need to be converted into Tomcat's certificate format to be used in enPortal 5. See the link below:

  1. Convert an OpenSSL (Apache) SSL Certificate to a PKCS12 (Tomcat)