Configuration de HTTPS/SSL dans JMap / Configuring HTTPS/SSL on JMap
Produit concerné / Related product | JMap | Versions | 5.0, 6.0, 6.5, 7.0 |
---|
Il est très simple de configurer JMap pour utiliser des connexions HTTP encryptées (HTTPS/SSL).
Cette configuration nécessite un certificat compatible en format JKS ou PFX (PKCS12 keystore). Si vous ne possédez pas de certificat, il est possible de créer un certificat non-authentifié avec les outils du JDK ou OpenSSL.
Pour convertir un certificat RSA de format PEM en format JKS, veuillez utiliser la procédure décrite dans ce site : https://docs.oracle.com/cd/E35976_01/server.740/es_admin/src/tadm_ssl_convert_pem_to_jks.html
Pour faire la conversion d'un certificat du format PFX (PKCS12 keystores) au format JKS, utilisez la commande suivante (nécessite JDK 1.6+) :
keytool -importkeystore -srckeystore mypfxfile.pfx -srcstoretype pkcs12 -destkeystore clientcert.jks -deststoretype JKS
Guide étape par étape
1. Création d'un certificat non authentifié (auto-signé)
Format JKS
Le programme keytool est situé dans le répertoire bin de votre JDK. La commande à utiliser pour générer le certificat est :
keytool -genkey -keyalg RSA -keystore /chemin/vers/jmap/conf/certificat.keystore
(certificat.keystore est le nom du fichier qui sera généré)
Lors de la création du certificat, le nom de domaine visé par HTTPS doit être entré dans: 'What is your first and last name?'.
Seule cette resource sera sécurisée et donc tout accès via un autre nom (ex: localhost, 127.0.0.1, etc.,) retournera une erreur de sécurité.
Enter keystore password: javacaps
What is your first and last name?
[Unknown]: development.sun.com
What is the name of your organizational unit?
[Unknown]: Development
what is the name of your organization?
[Unknown]: Sun
What is the name of your City or Locality?
[Unknown]: Monrovia
What is the name of your State or Province?
[Unknown]: California
What is the two-letter country code for this unit?
[Unknown]: US
Is<CN=development.sun.com, OU=Development, O=Sun, L=Monrovia, ST=California,
C=US> correct?
[no]: yes
Format PFX (PKCS12 keystore)
Installer OpenSSL.
2. Créer le private key : openssl genrsa 2048 > private.pem
3. Créer le self signed certificate : openssl req -x509 -days 1000 -new -key private.pem -out public.pem
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:
State or Province Name (full name) [Some-State]:
Locality Name (eg, city) []:
Organization Name (eg, company) [Internet Widgits Pty Ltd]:
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []:
Email Address []:
4. Créer le PFX : openssl pkcs12 -export -in public.pem -inkey private.pem -out mycert.pfx
Enter Export Password:
Verifying - Enter Export Password:
2. Configuration du certificat
Une fois le certificat créé, changez les paramètres suivants dans /chemin/vers/jmap/conf/jmapserver.properties
Le certificat créé :
server.https.keystore.file=/chemin/vers/jmap/conf/certificat.keystore (Exemples : server.https.keystore.file=../conf/star_jmaponline_net.jks ou server.https.keystore.file=../conf/star_jmaponline_net.pfx)La valeur 'encrypted' indique si le mot de passe est encrypté, donc lorsque vous le configurez pour la première fois, vous devrez utiliser la fonction password(). Lorsque JMap Server sera démarré pour la première fois, votre mot de passe devrait être encrypté :
server.https.keystore.password=password(put_your_keystore_password_here)
server.https.keystore.password.encrypted=trueLe port à utiliser pour HTTPS (443 par défaut) :
server.https.port=443
Une fois ces étapes effectuées, redémarrez JMap Server et lancez JMap Admin en HTTPS: https://xxx.xxx.xxx.xxx:443/jmapadmin.
Exemples
Exemple de configuration format JKS
server.https.keystore.file=../conf/certificat.jks
server.https.keystore.password=password(votreMotDePasse)
server.https.keystore.password.encrypted=true
server.https.keystore.type=JKS
server.https.port=443
server.https.redirectEnabled=true
Exemple de configuration format PFX (PKCS12 keystore)
server.https.keystore.file=../conf/certificat.pfx
server.https.keystore.password=password(votreMotDePasse)
server.https.keystore.password.encrypted=true
server.https.keystore.type=PKCS12
server.https.port=443
server.https.redirectEnabled=true
L’option keystore.type doit être modifié en fonction du format
L'option redirectEnabled forcera HTTPS en redirigeant automatiquement HTTP vers HTTPS si mise à 'true'.
Si HTTPS ne répond pas, consultez les logs (jmap_log et le dernier fichier *.err ). Il est possible que le certificat ne soit pas reconnu par Java et qu'il doit être ajouté au keystore: https://k2geospatial.atlassian.net/wiki/x/AoA1Eg
English version
It is very easy to configure JMap to use encrypted HTTP connections (HTTPS/SSL).
This configuration requires a compatible certificate in JKS or PFX format (PKCS12 keystore). If you do not have a certificate, it is possible to create an unauthenticated certificate with the JDK or OpenSSL tools.
To convert an RSA certificate from PEM format to JKS format, please use the procedure described in this site: https://docs.oracle.com/cd/E35976_01/server.740/es_admin/src/tadm_ssl_convert_pem_to_jks.html
To convert a certificate from PFX format (PKCS12 keystores) to JKS format, use the following command (requires JDK 1.6+):
keytool -importkeystore -srckeystore mypfxfile.pfx -srcstoretype pkcs12 -destkeystore clientcert.jks -deststoretype JKS
Step-by-step guide
1. Creating a self-signed certificate
JKS format
The keytool program is located in the bin directory of your JDK. The command to use to generate the certificate is:
keytool -genkey -keyalg RSA -keystore /chemin/vers/jmap/conf/certificat.keystore
(certificat.keystore is the name of the file that will be generated)
When generating the certificate, the domain name targeted by HTTPS must be entered in: 'What is your first and last name?'.
Only through this name will you be able to securely access JMap via HTTPS, any other URL (ex: localhost, 127.0.0.1, etc.) will return a security error.
PFX format (PKCS12 keystore)
Install OpenSSL.
2. Create the private key : openssl genrsa 2048 > private.pem
3. Create the self-signed certificate: openssl req -x509 -days 1000 -new -key private.pem -out public.pem
4. Create the PFX : openssl pkcs12 -export -in public.pem -inkey private.pem -out mycert.pfx
2. Configuring the Certificate
Once the certificate is created, change the following parameters in: /chemin/vers/jmap/conf/jmapserver.properties
The certificate created:
server.https.keystore.file=/chemin/vers/jmap/conf/certificat.keystore (Examples : server.https.keystore.file=../conf/star_jmaponline_net.jks ou server.https.keystore.file=../conf/star_jmaponline_net.pfx)The 'encrypted' value indicates whether the password is encrypted, so when you first set it up you will need to use the password() function. When JMap Server is started for the first time, your password should be encrypted:
server.https.keystore.password=password(put_your_keystore_password_here)
server.https.keystore.password.encrypted=trueThe port to use for HTTPS (443 by default):
server.https.port=443
Once these steps have been completed, restart JMap Server and launch JMap Admin in HTTPS: https://xxx.xxx.xxx.xxx:443/jmapadmin.
Examples
Example of JKS format configuration
server.https.keystore.file=../conf/certificat.jks
server.https.keystore.password=password(votreMotDePasse)
server.https.keystore.password.encrypted=true
server.https.keystore.type=JKS
server.https.port=443
server.https.redirectEnabled=true
Example of PFX format (PKCS12 keystore) configuration
server.https.keystore.file=../conf/certificat.pfx
server.https.keystore.password=password(yourPassword)
server.https.keystore.password.encrypted=true
server.https.keystore.type=PKCS12
server.https.port=443
server.https.redirectEnabled=true
The redirectEnabled option will force HTTPS by automatically redirecting HTTP to HTTPS if set to 'true'.
The keystore.type option must be modified according to the format