This section describes how to configure the Jetty server so that the SharePoint Protocol Support will run over HTTPS.
- Open the vti-context.xml file.
-
Configure SslSocketConnector for Jetty. Comment out the
existing vtiServerConnector bean, and uncomment the
<bean id="vtiServerConnector"
class="org.mortbay.jetty.security.SslSocketConnector"> bean:
<bean id="vtiServerConnector" class="org.mortbay.jetty.security.SslSocketConnector"> <property name="port"> <value>${vti.server.port}</value> </property> <property name="headerBufferSize"> <value>8192</value> </property> <property name="maxIdleTime"> <value>30000</value> </property> <property name="keystore"> <value>${vti.server.ssl.keystore}</value> </property> <property name="keyPassword"> <value>${vti.server.ssl.password}</value> </property> <property name="password"> <value>${vti.server.ssl.password}</value> </property> <property name="keystoreType"> <value>JKS</value> </property> </bean>
For more information, refer to http://docs.codehaus.org/display/JETTY/Ssl+Connector+Guide and http://jetty.codehaus.org/jetty/jetty-6/apidocs/org/mortbay/jetty/security/SslSocketConnector.html.
Note:This example configures HTTPS using the default port 7070, which avoids rewrites in some configuration files and templates. -
Use the Java keytool utility to generate a key pair for the
connector:
%JAVA_HOME%\bin\keytool.exe -genkeypair -alias SkyVault -keystore D:\BUGS\ALF-6390\keystore.jks -storepass changeit -keypass changeit -keyalg RSA -validity 360 -keysize 2048 -storetype JKS
Use the same store in this command and in the vtiServerConnector keystore property.
-
Use the Java keytool utility to generate a key pair for the
connector:
%JAVA_HOME%\bin\keytool.exe -genkeypair -alias SkyVault -keystore D:\BUGS\ALF-6390\keystore.jks -storepass changeit -keypass changeit -keyalg RSA -validity 360 -keysize 2048 -storetype JKS
Use the same store in this command and in the vtiServerConnector keystore property.
-
Export the generated associated certificate into a file.
%JAVA_HOME%\bin\keytool.exe -exportcert -alias SkyVault -file D:\BUGS\ALF-6390\alfresco-ssl.cer -keystore D:\BUGS\ALF-6390\keystore.jks -storepass changeit -storetype JKS
-
Configure SkyVault and Tomcat for HTTPS following the instructions on the
Apache website http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html.
It is possible to use the same key store for Tomcat and Jetty.
- Ensure that you set the sysAdmin subsystem properties.
- Configure Share to connect to SkyVault using SSL.
If you cannot login to Share, and you see message saying The remote server may be unavailable or your authentication details have not been recognized., check the endpoints URLs and enable the DEBUG option in the Share log4j.properties for org.springframework.extensions=DEBUG. Ensure that there are no error messages saying IO Error: during getObject() ... sun.security.validator.ValidatorException: PKIX path building failed. If you see this message, this means that your certificate is not trusted. Check step 7a.