Starting version 1.9.8.2.4-1 (April 2019 build) your DMS can be configured to be accessible only via the https protocol (secure http). In this case, all communication between client computers and the DMS will be secured by encryption.
You can use encryption certificates that are issued by a suitable certificate issuer (eg. https://www.thawte.de, https://www.geotrust.com, https://letsencrypt.org, etc.), or you can use self signed certificates. Note that self signed certificates are generally considered less secure and may require to be trusted by the browsers used to access the DMS server. Please find a short guide how to create a self signed certificate here.
In order to configure your DMS to use secured communication, the following steps must be followed:
Create a directory that will hold the certificate- and key-files ('<certificateName>.cer' and '<certificateName>.key'). For example you can run
mkdir /storage/nginx/ |
dms.conf
file in the client specific git repository in the section 'HTTPS parameters'; uncomment and supplement the relevant settings. In addition, make sure the NUXEO_URL in this file does not specify a port number.If it's existing repository, be sure that nginx-related strings exist in commands.conf:
elif [ ${1} = "NGINX" ] then add_port 80 add_port 443 add_volume "${HTTPS_CERTIFICATE}" /etc/ssl/pi/certificate.crt:ro add_volume "${HTTPS_CERTIFICATE_KEY}" /etc/ssl/pi/certificate.crt.key:ro if [ -n "HTTPS_CERTIFICATE_PASSWORD" ]; then add_volume "${DATADIR}/nginx/https_key_password" /etc/ssl/pi/https_key_password:ro fi fi |
before this line:
if [[ ${3} = true ]] |
When self signed certificates are used, these certificates will require to be expressly trusted by the client computers. This step is not necessary when certificates are used that are issued by a certificate issuer.
In order to make InternetExplorer and other windows services trust self signed certificates, please follow the steps described here.