...
Create a directory that will hold the certificate- and key-files ('<certificateName>.cer' and '<certificateName>.key'). For example you can run
Code Block language bash mkdir /storage/nginx/
- Obtain a certificate- and key-file from one a certificate issuer or create a self signed certificate- and key-file and move them to the directory that was just created.
- Update your deploy scripts (Auto-deploy script section "Script Updates").
- Edit the
dms.conf
file in the client specific git repository in the section 'HTTPS parameters'; uncomment and supplement the relevant settings. In addition, make sure the NUXEO_URL in this file does not specify a port number. - In the PAT_DMS_SETTINGS table, set the key https.enabled to true (if this key is not present, add it).
- Run the deploy command for all containers.
Client side
...
setup when self signed certificates are used
When self signed certificates are used, these certificates will require to be expressly trusted by the client computers. This step is These steps are not necessary when certificates are used that are issued by a certificate issuer.
- In order to trusting self signed certificates in InternetExplorer and other windows services, please follow the steps described here: https://www.ibm.com/support/knowledgecenter/en/SSYQBZ_9.6.1/com.ibm.rational.dwa.install.doc/topics/t_configureIEforSSL.html
Other required setup
- If you access CaseBrowser directly through a web browser, such as Google Chrome, make sure that your URLs for accessing CaseBrowser do not include and ports, ie. the URL for casebrowser must be https://<dms-server>/casebrowser/ and the URL for accessing the nuxeo console must be https://<dms-server>/nuxeo/
- Similarly, the address defined in Patricia Maintenance to access the DMS must be modified in the same manner. See Patricia Maintenance and Nuxeo Configuration, section "Configure DMS Links in Patricia Maintenance".
- In Patricia Maintenance, Basic Configuration value 315 must not specify a port.