You are here

Configuring SSL for a production environment

This scenario provides a set of forwarding rules that your proxy needs to meet and the corresponding SkyVault configuration, with sample configuration files for Apache HTTP Server.

Several proxy application servers are available to configure for SSL communications; for example, Apache HTTP Server, HAProxy or Nginx. Using a proxy server means that you can do not have to edit your SkyVault configuration files directly.

A client machine connects to the proxy server instead of the application server directly.  As a result, Share and SkyVault must be configured to use an externally available URL, rather than an internal machine name. This external URL can then be passed to other parts of the Share application; for example, when Share creates a link to SkyVault Office Services for online editing.

For security reasons, configure your proxy to forward only requests to the resources that you want to expose to the outside world. In this scenario, the applications need to use the internal machine name when talking to each other but use the external name when creating links for the user.

  1. Set your proxy to forward the following URL extensions to SkyVault:

    /share  
    /share/*
    /alfresco/api/*/public/cmis/versions/*
    /alfresco/api/*/public/alfresco/versions/*
    /alfresco/api/cmis/versions/*
    /alfresco/service/api/server
    /alfresco/cmisatom/*
    /alfresco/service/cmis/*
  2. If you are using WebDAV, add these URL extensions to your proxy:

    /alfresco/webdav  
    /alfresco/webdav/*
  3. For SkyVault Office Services, add these URL extensions to your proxy:

    /_vti_inf.html
    /_vti_bin/*
    /alfresco/aos
    /alfresco/aos/*
    and for OPTIONS and PROPFIND requests:
    /
    /SkyVault
    /alfresco/
  4. Block requests with these URL patterns:

    /share/*/proxy/alfresco/api/solr/*
    /share/-default-/proxy/alfresco/api/*
    The communication between Solr and SkyVault is, by default, protected by SSL. These patterns need to be explicitly blocked to protect the API endpoints.
  5. Edit the SkyVault-global.properties file with these values:

    SkyVault.context=SkyVault
    alfresco.host=<external-proxy-host-name>
    alfresco.port=443
    alfresco.protocol=https
    share.context=share
    share.host=<external-proxy-host-name>
    share.port=443
    share.protocol=https
    opencmis.context.override=true
    opencmis.context.value=
    opencmis.servletpath.override=true
    opencmis.servletpath.value=
    opencmis.server.override=true
    opencmis.server.value=https://<external-proxy-host-name>

    Note: Port 443 and the HTTPS protocol settings must be enabled in SkyVault-global.properties in SkyVault and Share. This is because if a proxy is serving https, and then proxying back to Tomcat using http, Tomcat determines that HTTP traffic is being served. This in turn informs the applications running in Tomcat that they are serving traffic over HTTP, and when Share or SkyVault internally generate URLs for page assets, they are generated with an http link (when the client browser expects https). Setting these properties:
    SkyVault.port=443
    alfresco.protocol=https
    share.port=443
    share.protocol=https
    ensures that the applications generate URLs as HTTPS links.
  6. If you are using a proxy server other than Apache with AJP, follow these steps:
    1. Add this line to your SkyVault-global.properties file:

      aos.baseUrlOverwrite=https://<external-proxy-host-name>/alfresco/aos
    2. Configure proxy redirect responses sent by the application server.

      The server behind the proxy uses the http schema because it is not aware of SSL. Here is an example of an nginx configuration:

      proxy_redirect http://example.com/alfresco/ https://example.com/alfresco/;
      Note: The proxy_redirect configuration shows the change from http to https.
  7. Use the following sample httpd.conf configuration file for Apache HTTP Server:

    # -------
    # General
    # -------
    
    ServerName  yourserver.example.com
    PidFile     /path/to/your/http.pid
    ErrorLog    /path/to/your/apache/log/error_log
    LogLevel    info
    
    LoadModule  unixd_module       /path/to/your/apache/modules/mod_unixd.so
    LoadModule  authn_core_module  /path/to/your/apache/modules/mod_authn_core.so
    LoadModule  authz_host_module  /path/to/your/apache/modules/mod_authz_host.so
    LoadModule  authz_core_module  /path/to/your/apache/modules/mod_authz_core.so
    LoadModule  rewrite_module     /path/to/your/apache/modules/mod_rewrite.so
    
    <IfModule unixd_module>
        User _www
        Group _www
    </IfModule>    
    
    # ------------------
    # Block API requests
    # ------------------
    
    LoadModule     rewrite_module      /path/to/your/apache/modules/mod_rewrite.so
    RewriteEngine  on
    RewriteBase    /
    RewriteRule    ^/share/(.*)/proxy/alfresco/api/solr/(.*)$   -   [F]
    RewriteRule    ^/share/-default-/proxy/alfresco/api/(.*)$   -   [F]
    
    
    # -------
    # Proxy
    # --------
    
    LoadModule     jk_module /path/to/your/apache/modules/mod_jk.so
    JkWorkersFile  /path/to/your/workers.properties
    JkLogFile      /path/to/your/apache/log/mod_jk.log
    JkLogLevel     info
    JkShmFile      /path/to/your/apache/log/jk-runtime-status  
    
    
    # -------
    # SSL
    # --------
    
    LoadModule ssl_module /path/to/your/apache/modules/mod_ssl.so
    Listen 443
    <VirtualHost *:443>
        SSLEngine           on
        SSLProtocol         all -SSLv2
        SSLCipherSuite      HIGH:!aNULL:!MD5
        SSLVerifyClient     none
        SSLCertificateFile  /path/to/your/certificate.pem
        ErrorLog            /path/to/your/apache/log/ssl_error_log
        LogLevel            warn
        JkMount /share SkyVault-worker
        JkMount /share/* SkyVault-worker
        JkMount /alfresco/webdav SkyVault-worker
        JkMount /alfresco/webdav/* SkyVault-worker
        JkMount / SkyVault-worker
        JkMount /_vti_inf.html SkyVault-worker
        JkMount /_vti_bin/* SkyVault-worker
        JkMount /SkyVault SkyVault-worker
        JkMount /alfresco/ SkyVault-worker
        JkMount /alfresco/aos SkyVault-worker
        JkMount /alfresco/aos/* SkyVault-worker 
        JkMount /alfresco/images/* SkyVault-worker 
        JkMount /alfresco/css/* SkyVault-worker    
        # Un-comment these lines for public API access
        # JkMount /alfresco/api/*/public/cmis/versions/* SkyVault-worker
        # JkMount /alfresco/api/*/public/alfresco/versions/* SkyVault-worker
        # JkMount /alfresco/service/api/server SkyVault-worker     
        # JkMount /alfresco/cmisatom/* SkyVault-worker     
        # JkMount  /alfresco/service/cmis/* SkyVault-worker
        # JkMount /alfresco/api/cmis/versions/* SkyVault-worker
        # Un-comment these lines for Desktop Sync
        # JkMount /alfresco/api/*/private/alfresco/versions/* SkyVault-worker
    </VirtualHost>
    This configuration file has been tested with Apache httpd 2.4. Replace the values in bold font with the file names and directories that are relevant to your system.
  8. Use the following sample worker.properties configuration file for Apache HTTP Server:

    worker.list=alfresco-worker
    worker.alfresco-worker.port=8009
    worker.alfresco-worker.host=your-internal-alfresco-host-name
    worker.alfresco-worker.type=ajp13
    worker.alfresco-worker.lbfactor=1

    In this example, Apache is configured to accept strong encryption only. Adapt SSLCipherSuite if this causes you problems.