Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Configuring MettleCI Workbench to use HTTPS with an existing certificate

In Configuring MettleCI Workbench to use HTTPS we describe how to create and install a self signed certificate. However, some organizations prefer use of a certificate that has been signed by a CA (or can trace signatures to a root certificate signed by a CA). There are many ways to create or obtain such a certificate, and discussion of those ways is out of scope for this documentation. Consulting the OpenSSL documentation may be helpful if you are tasked with doing it yourself. Consulting with system administrators, network administrators, or the security team may be required to determine your organizational process for requesting a certificate signed by a CA.

Some key points about certificates

  • Certificates come in many formats, which may or may not be interconvertible with the tools available to you. If you are requesting or creating one, using the PKCS#12 format will be convenient, as that is what is used in the enabling HTTPS examples. The file may be supplied or generated with a .pfx or .p12 file suffix, either will work.

  • You will need the keystore password for the certificate. This is stored in the config.ymlfile, either directly, or via indirection to a secrets repository

  • Checking the certificate to ensure it’s been signed, or that it is chained to a CA signed root before trying to use it may help you avoid problems. You can examine created or provided certificates by using keytoolwhich will be available with your OpenJDK installation. Consult the keytool manpage documentation for details.

Once you have created or had one provided to you, and it is on the server where MettleCI Workbench will be running, the installation process is similar to that given in the referenced page, with some differences as noted

Once you have changed your configuration to use the new certificate, and you have restarted workbench successfully (if it doesn’t start, check your mci.log for errors) you can test the certificate by pointing your browser to the https URL you’ve established, and then click on the left “padlock” icon. For a valid certificate it looks something like this: (Windows using Chrome, uses a grey closed padlock, but other OS and browser combinations may present information differently) rather than the “not secure” appearance show in the Trusting your Certificate section.

To see more details, click on “connection is secure” and you should see something analogous to this

With these tips in mind you can continue the process outlined in the Configuring MettleCI Workbench to use HTTPS documentation section.

Attachments:

03990583-9607-4b9a-ad18-12021b3e4e87#media-blob-url=true&id=fc70225a-51d5-448a-901e-c5c0f00a58a5&contextId=43751&collection= (image/png)
b06033ed-279b-4893-afaf-3725316da5f1#media-blob-url=true&id=90f4f3e1-d99d-4eed-8ebb-536a191787fb&contextId=43751&collection= (image/png)


Back to top

Copyright © 2017-2024 Data Migrators Pty Ltd.