Şu sürüme ilişkin yardım içeriğini görüntülüyorsunuz:

 

Enable HTTP over SSL to employ more secure connections to your servers. Configure the following items in your environment according to the connections that you wish to secure:

  • Author instance: Secure client connections to the author instance.
  • Publish instance: Secure client connections to the publish instance.
  • Replication agents on author: Secure connections from the author instance to the publish. instance.
  • Web server that hosts Dispatcher: Secure client connections to the web server (and, indirectly, to the publish instance)
For information about connecting replication agents to the publish instance using MSSL, see Replicating Using Mutual SSL.

Obtain or Create the Credential

Create or obtain the credential that the server uses to sign HTTP messages:

  • For development environments, a self-signed certificate is adequate. When self-signed certificates are used for SSL, the web browser requires you to manually trust the certificate when opening a web page.
  • For production environments, use a certificate that is signed by a certificate authority (CA). When the public certificate of the CA is imported in the web browser, your certificate is automatically trusted.

Create a Credential for Development

Use the Java keytool to create a self-signed credential and to store it in a keystore file. The following procedure uses a single command that includes all of the information needed to create the keystore. For complete information about the command, see the Oracle Java SE Documentation.

  1. Create a directory named ssl in the directory where the quickstart JAR file is located.

  2. In the command prompt, type the following command to create the credential and keystore:

    keytool -genkeypair -keyalg RSA -validity 3650 -alias cqse -keystore [quickstart_dir]/ssl/keystorename.keystore  -keypass key_password -storepass  storepassword -dname "CN=Host Name, OU=Group Name, O=Company Name,L=City Name, S=State, C=Country_ Code"

The following example generates a private/public key pair with the following properties:

  • alias: cqse
  • keystore file: cqkeystore.keystore
  • key password: password
  • keystore password: password
keytool -genkeypair -keyalg RSA -validity 3650 -alias cqse -keystore ~/Applications/cq5.5/author/ssl/cqkeystore.keystore -keypass password -storepass password -dname "CN=sbroders-w7, OU=CQ, O=Adobe, L=Ottawa, S=Ontario, C=CA"

Obtain a Credential for Use in Production

In production environments you should use a certificate that is signed from a trusted certificate authority (CA). Use the Java keytool to generate a certificate signing request, and when obtained import it to your keystore.

Generate a Certificate Signing Request (CSR)

  1. Use keytool to generate the public/private key pair and add it to a keystore (See Create a Credential for Development).

  2. Type the following command to generate a certificate request:

    keytool -certreq -alias "LC Cert" -keystorekeystorename.keystore -file LCcertRequest.csr
  3. When you recieve the signed certificate from the CA, complete the next procedure.

Use a Credential Obtained from a CA to Enable SSL

  1. In a command prompt, type the following command to import the trusted certificate of the CA into your keystore:

    keytool -importcert -trustcacerts -file rootcert.pem -keystorekeystorename.keystore -alias root

    You must configure the project and path.

  2. Type the following command to import your signed credential into the keystore:

    keytool -importcert -trustcacerts -file CACertificateName.crt -keystore keystorename.keystore

    Not:

    In version 6 of Java SE, the -import command is renamed to -importcert

Enable SSL on the Author Instance

Configure the Apache Felix Jetty-based HTTP service to use SSL, employing your certificate.

  1. Open CRXDE Lite and select the /apps folder. Click Create > Create Folder to create a folder named system (http://localhost:4502/crx/de).

  2. Below the system folder create a folder named config.author.

  3. Select the /apps/system/config.author node.

  4. Click Create > Create Node and enter the following properties:

    • Name: org.apache.felix.http
    • Type: sling:OsgiConfig
  5. Add properties to the node according to the following table:

    Name Type Value
    org.apache.felix.https.enable Boolean true
    org.osgi.service.http.port.secure Long 5433
    org.apache.felix.https.nio Boolean true
    org.apache.felix.https.keystore String [quickstart_dir]/ssl/cqkeystore.keystore
    org.apache.felix.https.keystore.password String The password.
    org.apache.felix.https.keystore.key String alias e.g. cqse
    org.apache.felix.https.keystore.key.password String The password.
    org.apache.felix.https.truststore String Path to truststore
    org.apache.felix.https.truststore.password String Truststore password.
    (Optional) org.apache.felix.https.clientcertificate String Defaults to none
  6. Click Save All.

Enable SSL on the Publish Instance

Enable HTTP over SSL on the publsih instance to secure connections with web clients and with replication agents. (Secure connections with replication agents also require changes to the agent configurations, which is described in the next section.)

Follow the same procedure as for configuring the author instance, with the following differences:

  • Create the org.apache.felix.http node below /apps/system/config.publish on the publish instance (http://localhost:4503/crx/de).
  • If your author and publish instances are on the same computer, use a different port for the org.osgi.service.http.port.secure property.

Configure Replication Agents to Use Secure URLs

If you want content replication to occur using HTTP over SSL, configure replication agents to use the HTTPS protocol and the port that the publish instance uses for SSL.

The following procedure configures the publish agent on the author instance. Perform the procedure for all replication agents that you want to communicate over SSL.

  1. Open the Tools page (http://localhost:4502/miscadmin).

  2. Click the Tools/Replication/Agents on author folder.

  3. In the right-hand frame, right-click Default Agent and click Open.

  4. Click Edit (below the Test Connection link) and then click the Transport tab.

  5. In the URI box, change the URL so that it uses the HTTPS protocol and the port that you configured for SSL on the publish instance.

  6. If you used a self-signed certificate to enable SSL on publish, select Enable Relaxed SSL.

  7. Click OK.

  8. Click Test Connection.

Forcing the Use of the SSL Port

If you want all users to connect over SSL, redirect traffic to the URL that uses HTTP over SSL.

Not:

The steps presented below do not force the use of the SSL port for HTTP requests to CRXDE Lite, Package Manager or Content Explorer. The requests going to these administrative consoles do not go through the Sling request pipeline. For these scenarios, you should utilize Dispatcher to redirect the requests by using the Apache Web Server. For further details, see the Dispatcher and the official Apache documentation.

The following example redirects traffic to localhost:4502 to https://localhost:5433. To configure the redirect, create a sling:mapping node. Use a node name that matches requested URL. Add a sling:redirect property to specify the URL for redirection.

  1. Open CRXDE Lite in your web browser (http://localhost:4502/crx/de).

  2. Click the /etc/map/http folder and click Create > Create Node:

    • Namelocalhost.4502
    • Typesling:mapping
  3. Create the following property for this node:

    • Name: sling:redirect
    • Type: String
    • Value: https://localhost:5433
  4. Click Save All.

Alternatively, you can specify the text for matching the requested URL as a sling:match property (See Mappings for Resource Resolution in the Apache Sling documentation).

Configuring SSL When Using a Dispatcher

When client requests target a dispatcher before reaching an author or publish instance, decide which requests are transmitted over SSL:

  • From users to the web server.
  • From the author instance to the dispatcher via the flush replication agent.

This section assumes that you have already installed and configured Dispatcher on your web server (See Dispatcher).

For information about configuring Dispatcher to use SSL connections with the publish instance, see Using SSL with Dispatcher.

Configure the Web Server

Configure the web server to use SSL to secure connections between web clients and the web server. For information about enabling SSL for the web server, see the documentation for your web server.

Enabling separate caches for secure and unsecure connection types is beyond the scope of this article. However, you could investigate the following strategies:

  • Route all SSL connections to a separate Apache web server and Dispatcher on a different subdomain.
  • Use URL redirection rules (for example mod_rewrite directives on Apache) to cache content to different locations below DocumentRoot.

Send Flush Requests over SSL

If you want to send flush requests to the dispatcher over SSL, configure the Dispatcher Flush replication agent.

Follow the procedure in Configure Replication Agents, using the SSL port that is confgured for the web server (typically 443).

Bu çalışma Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License kapsamında lisanslanmıştır  Creative Commons şartları, Twitter™ ve Facebook sitelerinde paylaşılanları kapsamaz.

Yasal Uyarılar   |   Çevrimiçi Gizlilik İlkesi