You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Since version 1.9.8.2.4-2 your DMS can be configured to be accessible only via the https protocol (secure http). In this case, all communication between client computers and the DMS will be secured by encryption.

You can use encryption certificates that are issued by a suitable certificate issuer (eg. https://www.thawte.de, https://www.geotrust.com, https://letsencrypt.org, etc.), or you can use self signed certificates. Note that self signed certificates are generally considered less secure and may require to be trusted by the browsers used to access the DMS server. Please find a short guide how to create a self signed certificate here.

Note: If you wish to update an older version of the DMS (pre 1.9.8.2.4-2) to a version supporting https, please contact Patrix of Practice Insight before you run the update to make sure that all relevant modifications to the configuration files of your client specific git repository have been made.

Setup DMS

In order to configure your DMS to use secured communication, the following steps must be followed:

  1. Create a directory that will hold the certificate- and key-files ('<certificateName>.cer' and '<certificateName>.key'). For example you can run

    mkdir /storage/nginx/
  2. Obtain a certificate- and key-file from one a certificate issuer or create a self signed certificate- and key-file and move them to the directory that was just created.
  3. Update your deploy scripts (Auto-deploy script section "Script Updates").
  4. Edit the dms.conf file in the client specific git repository in the section 'HTTPS parameters'; uncomment and supplement the relevant settings. In addition, make sure the NUXEO_URL in this file does not specify a port number.
  5. In the PAT_DMS_SETTINGS table, set the key https.enabled to true (if this key is not present, add it).
  6. Run the deploy command for all containers.

Client side setup when self signed certificates are used

When self signed certificates are used, these certificates will require to be expressly trusted by the client computers. These steps are not necessary when certificates are used that are issued by a certificate issuer. 

  1. In order to trusting self signed certificates in InternetExplorer and other windows services, please follow the steps described here: https://www.ibm.com/support/knowledgecenter/en/SSYQBZ_9.6.1/com.ibm.rational.dwa.install.doc/topics/t_configureIEforSSL.html

Other required setup

  1. If you access CaseBrowser directly through a web browser, such as Google Chrome, make sure that your URLs for accessing CaseBrowser do not include and ports, ie. the URL for casebrowser must be https://<dms-server>/casebrowser/ and the URL for accessing the nuxeo console must be https://<dms-server>/nuxeo/
  2. Similarly, the address defined in Patricia Maintenance to access the DMS must be modified in the same manner. See Patricia Maintenance and Nuxeo Configuration, section "Configure DMS Links in Patricia Maintenance".
  3. In Patricia Maintenance, Basic Configuration value 315 must not specify a port.
  • No labels