<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: alfresco 5.2.f SSL Problem in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118538#M32692</link>
    <description>&lt;P&gt;Do you want to enable TLS when communicating with Alfresco applications?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://localhost/alfresco" target="_blank" rel="nofollow noopener noreferrer"&gt;https://localhost/alfresco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://localhos/share" target="_blank" rel="nofollow noopener noreferrer"&gt;https://localhos/share&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If that is the case, I suggest to add a Web Proxy in front so you can use your wildcard certificate.&lt;/P&gt;
&lt;P&gt;That configuration (keystore and truststore) is related with internal communication between SOLR and Alfresco services.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Dec 2021 08:25:55 GMT</pubDate>
    <dc:creator>angelborroy</dc:creator>
    <dc:date>2021-12-22T08:25:55Z</dc:date>
    <item>
      <title>alfresco 5.2.f SSL Problem</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118537#M32691</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our company just got a wildcard domain certificate, and we want to enable Alfresco's SSL. No methods work by far.&lt;/P&gt;&lt;P&gt;I tried methods here(&lt;A href="https://angelborroy.wordpress.com/2016/06/15/configuring-alfresco-ssl-certificates/" target="_blank" rel="noopener nofollow noreferrer"&gt;https://angelborroy.wordpress.com/2016/06/15/configuring-alfresco-ssl-certificates/&lt;/A&gt;). I imported the CA certificate and&amp;nbsp; files (&lt;SPAN&gt;ssl.keystore,&amp;nbsp;ssl.truststore,&amp;nbsp;ssl.repo.client.keystore, ssl.repo.client.truststore) generated by alfresco-ssl-generator(&lt;A href="https://github.com/Alfresco/alfresco-ssl-generator" target="_blank" rel="noopener nofollow noreferrer"&gt;https://github.com/Alfresco/alfresco-ssl-generator&lt;/A&gt;).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is my generate_keystore.sh file, and I got the following reuslt. I am sure dir.keystore's setting is correct, but SSL is still not enabled when I login into ALfresco.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please help, thank you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;#! /bin/sh
# Please edit the variables below to suit your installation
# Note: for an installation created by the Alfresco installer, you only need to edit ALFRESCO_HOME

# Alfresco installation directory
ALFRESCO_HOME=/opt/alfresco-5.2.f
# The directory containing the alfresco keystores, as referenced by keystoreFile and truststoreFile attributes in tomcat/conf/server.xml
ALFRESCO_KEYSTORE_HOME=$ALFRESCO_HOME/alf_data/keystore
# SOLR installation directory
SOLR_HOME=$ALFRESCO_HOME/solr4
# Java installation directory
JAVA_HOME=$ALFRESCO_HOME/java
# Location in which new keystore files will be generated
CERTIFICATE_HOME=$HOME
# The repository server certificate subject name, as specified in tomcat/conf/tomcat-users.xml with roles="repository"
REPO_CERT_DNAME="CN=Alfresco Repository, OU=Unknown, O=Alfresco Software Ltd., L=Maidenhead, ST=UK, C=GB"
# The SOLR client certificate subject name, as specified in tomcat/conf/tomcat-users.xml with roles="repoclient"
SOLR_CLIENT_CERT_DNAME="CN=Alfresco Repository Client, OU=Unknown, O=Alfresco Software Ltd., L=Maidenhead, ST=UK, C=GB"
# The number of days before the certificate expires
CERTIFICATE_VALIDITY=36525

# Stop alfresco
"$ALFRESCO_HOME/alfresco.sh" stop

# Ensure certificate output dir exists
mkdir -p "$CERTIFICATE_HOME"

# Remove old output files (note they are backed up elsewhere)
# if [ -f "$CERTIFICATE_HOME/ssl.keystore" ]; then rm "$CERTIFICATE_HOME/ssl.keystore"; fi
# if [ -f "$CERTIFICATE_HOME/ssl.truststore" ]; then rm "$CERTIFICATE_HOME/ssl.truststore"; fi
# if [ -f "$CERTIFICATE_HOME/browser.p12" ]; then rm "$CERTIFICATE_HOME/browser.p12"; fi
# if [ -f "$CERTIFICATE_HOME/ssl.repo.client.keystore" ]; then rm "$CERTIFICATE_HOME/ssl.repo.client.keystore"; fi
# if [ -f "$CERTIFICATE_HOME/ssl.repo.client.truststore" ]; then rm "$CERTIFICATE_HOME/ssl.repo.client.truststore"; fi

# Generate new self-signed certificates for the repository and solr
# "$JAVA_HOME/bin/keytool" -genkeypair -keyalg RSA -dname "$REPO_CERT_DNAME" -validity $CERTIFICATE_VALIDITY -alias ssl.repo -keypass kT9X6oe68t -keystore "$CERTIFICATE_HOME/ssl.keystore" -storetype JCEKS -storepass kT9X6oe68t
# "$JAVA_HOME/bin/keytool" -exportcert -alias ssl.repo -file "$CERTIFICATE_HOME/ssl.repo.crt" -keystore "$CERTIFICATE_HOME/ssl.keystore" -storetype JCEKS -storepass kT9X6oe68t
# "$JAVA_HOME/bin/keytool" -genkeypair -keyalg RSA -dname "$SOLR_CLIENT_CERT_DNAME" -validity $CERTIFICATE_VALIDITY -alias ssl.repo.client -keypass kT9X6oe68t -keystore "$CERTIFICATE_HOME/ssl.repo.client.keystore" -storetype JCEKS -storepass kT9X6oe68t
# "$JAVA_HOME/bin/keytool" -exportcert -alias ssl.repo.client -file "$CERTIFICATE_HOME/ssl.repo.client.crt" -keystore "$CERTIFICATE_HOME/ssl.repo.client.keystore" -storetype JCEKS -storepass kT9X6oe68t

# # Create trust relationship between repository and solr
# "$JAVA_HOME/bin/keytool" -importcert -noprompt -alias ssl.repo.client -file "$CERTIFICATE_HOME/ssl.repo.client.crt" -keystore "$CERTIFICATE_HOME/ssl.truststore" -storetype JCEKS -storepass kT9X6oe68t
# # Create trust relationship between repository and itself - used for searches
# "$JAVA_HOME/bin/keytool" -importcert -noprompt -alias ssl.repo -file "$CERTIFICATE_HOME/ssl.repo.crt" -keystore "$CERTIFICATE_HOME/ssl.truststore" -storetype JCEKS -storepass kT9X6oe68t
# # Create trust relationship between solr and repository
# "$JAVA_HOME/bin/keytool" -importcert -noprompt -alias ssl.repo -file "$CERTIFICATE_HOME/ssl.repo.crt" -keystore "$CERTIFICATE_HOME/ssl.repo.client.truststore" -storetype JCEKS -storepass kT9X6oe68t
# # Export repository keystore to pkcs12 format for browser compatibility
# "$JAVA_HOME/bin/keytool" -importkeystore -srckeystore "$CERTIFICATE_HOME/ssl.keystore" -srcstorepass kT9X6oe68t -srcstoretype JCEKS -srcalias ssl.repo -srckeypass kT9X6oe68t -destkeystore "$CERTIFICATE_HOME/browser.p12" -deststoretype pkcs12 -deststorepass alfresco -destalias ssl.repo -destkeypass alfresco

# Ensure keystore dir actually exists
mkdir -p "$ALFRESCO_KEYSTORE_HOME"

# Back up old files
cp "$ALFRESCO_KEYSTORE_HOME/ssl.keystore" "$ALFRESCO_KEYSTORE_HOME/ssl.keystore.old"
cp "$ALFRESCO_KEYSTORE_HOME/ssl.truststore" "$ALFRESCO_KEYSTORE_HOME/ssl.truststore.old"
cp "$ALFRESCO_KEYSTORE_HOME/browser.p12" "$ALFRESCO_KEYSTORE_HOME/browser.p12.old"
cp "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.keystore" "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.keystore.old"
cp "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.truststore" "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.truststore.old"
cp "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.keystore" "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.keystore.old"
cp "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.truststore" "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.truststore.old"
# cp "$SOLR_HOME/templates/test/conf/ssl.repo.client.keystore" "$SOLR_HOME/templates/test/conf/ssl.repo.client.keystore.old"
# cp "$SOLR_HOME/templates/test/conf/ssl.repo.client.truststore" "$SOLR_HOME/templates/test/conf/ssl.repo.client.truststore.old"
# cp "$SOLR_HOME/templates/store/conf/ssl.repo.client.keystore" "$SOLR_HOME/templates/store/conf/ssl.repo.client.keystore.old"
# cp "$SOLR_HOME/templates/store/conf/ssl.repo.client.truststore" "$SOLR_HOME/templates/store/conf/ssl.repo.client.truststore.old"

# Install the new files
cp "$CERTIFICATE_HOME/ssl.keystore" "$ALFRESCO_KEYSTORE_HOME/ssl.keystore"
cp "$CERTIFICATE_HOME/ssl.truststore" "$ALFRESCO_KEYSTORE_HOME/ssl.truststore"
cp "$CERTIFICATE_HOME/browser.p12" "$ALFRESCO_KEYSTORE_HOME/browser.p12"
cp "$CERTIFICATE_HOME/ssl.repo.client.keystore" "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.keystore"
cp "$CERTIFICATE_HOME/ssl.repo.client.truststore" "$SOLR_HOME/workspace-SpacesStore/conf/ssl.repo.client.truststore"
cp "$CERTIFICATE_HOME/ssl.repo.client.keystore" "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.keystore"
cp "$CERTIFICATE_HOME/ssl.repo.client.truststore" "$SOLR_HOME/archive-SpacesStore/conf/ssl.repo.client.truststore"
# cp "$CERTIFICATE_HOME/ssl.repo.client.keystore" "$SOLR_HOME/templates/test/conf/ssl.repo.client.keystore"
# cp "$CERTIFICATE_HOME/ssl.repo.client.truststore" "$SOLR_HOME/templates/test/conf/ssl.repo.client.truststore"
# cp "$CERTIFICATE_HOME/ssl.repo.client.keystore" "$SOLR_HOME/templates/store/conf/ssl.repo.client.keystore"
# cp "$CERTIFICATE_HOME/ssl.repo.client.truststore" "$SOLR_HOME/templates/store/conf/ssl.repo.client.truststore"

echo "Certificate update complete"
echo "Please ensure that you set dir.keystore=$ALFRESCO_KEYSTORE_HOME in alfresco-global.properties"&lt;/PRE&gt;&lt;PRE&gt;[root@alfresco keystore]#  ./generate_keystores.sh
/opt/alfresco-5.2.f/alfresco.sh: line 4: [: !=: unary operator expected
/opt/alfresco/tomcat/scripts/ctl.sh : tomcat not running
Certificate update complete
Please ensure that you set dir.keystore=/opt/alfresco-5.2.f/alf_data/keystore in alfresco-global.properties&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Dec 2021 03:58:12 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118537#M32691</guid>
      <dc:creator>blakeyang</dc:creator>
      <dc:date>2021-12-22T03:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: alfresco 5.2.f SSL Problem</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118538#M32692</link>
      <description>&lt;P&gt;Do you want to enable TLS when communicating with Alfresco applications?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://localhost/alfresco" target="_blank" rel="nofollow noopener noreferrer"&gt;https://localhost/alfresco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://localhos/share" target="_blank" rel="nofollow noopener noreferrer"&gt;https://localhos/share&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If that is the case, I suggest to add a Web Proxy in front so you can use your wildcard certificate.&lt;/P&gt;
&lt;P&gt;That configuration (keystore and truststore) is related with internal communication between SOLR and Alfresco services.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 08:25:55 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118538#M32692</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2021-12-22T08:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: alfresco 5.2.f SSL Problem</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118539#M32693</link>
      <description>&lt;P&gt;You may review also this blog post in order to understand TLS configuration for Alfresco:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://hub.alfresco.com/t5/alfresco-content-services-blog/securing-alfresco-with-5-simple-steps/ba-p/310775" target="_blank" rel="nofollow noopener noreferrer"&gt;https://hub.alfresco.com/t5/alfresco-content-services-blog/securing-alfresco-with-5-simple-steps/ba-p/310775&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 08:26:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-5-2-f-ssl-problem/m-p/118539#M32693</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2021-12-22T08:26:47Z</dc:date>
    </item>
  </channel>
</rss>

