To force all TeamForge traffic to use SSL
encryption (HTTPS), state that preference in your configuration file.
-
Open the site-options.conf file, the master configuration
file that controls your TeamForge site.
- vi
/opt/collabnet/teamforge-installer/8.2.0.0/conf/site-options.conf
Note: vi is an example. Any *nix text editor will work.
-
Set the options to enable SSL for the site.
-
Set the SSL variable to on.
-
Set the SSL_CERT_FILE variable to the location of
the file that contains your site's SSL certificates.
-
SSL_CERT_FILE=www.example.com.crt
-
Set the SSL_KEY_FILE variable to the location of the
file that contains your site's RSA private keys.
-
SSL_KEY_FILE=www.example.com.key
Important: Select a location for your cert file and your key
file that is permanent across restarts. Don't use a temp directory
that can be wiped out.
-
In the site-options.conf file, make sure the value of the
DOMAIN_localhost variable matches that of your SSL
certificate.
-
Rename the /etc/httpd/conf.d/ssl.conf file to
/etc/httpd/conf.d/ssl.conf.old, if it
exists.
-
Stop TeamForge.
- /etc/init.d/httpd
stop
-
/etc/init.d/collabnet stop
-
Run the installer.
- cd
/opt/collabnet/teamforge-installer/8.2.0.0
- ./install.sh -r -I -V
-
If you are converting an existing site to use SSL (that is, if your site
already has had users accessing it via HTTP and not HTTPS), you must update your
site's publishing repository to use the new SSL settings.
To do this, ask your CollabNet support representative for the
fix-publishing-repos-to-ssl.py
script.
-
Rename the /etc/httpd/conf/httpd.conf.cn_new file to
httpd.conf, if it exists.
-
Start TeamForge.
-
/etc/init.d/httpd start
-
/etc/init.d/postgresql-9.3 start
-
/etc/init.d/collabnet start
A new Apache configuration file is created with the information you provided in the
site-options.conf file. The new file is named
httpd.conf.cn_new. It contains
VirtualHost
sections for port 80 and port 443. All port 80 requests are redirected to port
443.
When you point your browser at CollabNet
TeamForge, it should now automatically
redirect to HTTPS.