- Import a valid SSL certificate
It is strongly recommended to use a certificate signed by a trusted Certification Authority (CA). The certificate needs to be imported into a Java Key Store (JKS file).
Using openssl for example on a Linux server:
openssl pkcs12 -export -chain -CAfile gd_bundle-g2-g1.crt -in 8f27f367f76229a2.crt -inkey demo.evolphin.com.key
-out demo.evolphin.com.jks -name <alias of your domain> -passout pass:<password>
Import a root or intermediate CA certificate to an existing Java keystore using Java keytool:
keytool -import -trustcacerts -alias root -file Thawte.crt -keystore demo.evolphin.com.jks
Import a signed primary certificate to an existing Java keystore using Java keytool:
keytool -import -trustcacerts -alias mydomain -file mydomain.crt -keystore demo.evolphin.com.jks
The above commands are just for illustration, please consult the standard Java documentation on importing your certificate format into a JKS.
- Configuring Zoom to use the generated SSL certificate in your Java Key Store (JKS) file
Add the following properties to wrapper.conf & preview-server.conf located under <ZoomInstallDir>/conf (Linux) or <ZoomInstallDir>\DAM\conf (Windows) directory.
-Dzoom.ssl.keystore.path=conf/demo.evolphin.com.jks # this is relative to the zoom install directory
The first property specifies the path of your Java key store file, and the second supplies the password used while generating the private key used to encrypt the certificate. You can use the same ssl certificate for both Web Administration Server and Preview Server or generate separate.
- Verify the imported certificate:
Run this command and verify the results in result.txt
keytool -list -v -keystore demo.evolphin.com.jks > result.txt
- Stop all the Zoom services. Enable SSL through the server.xml in
<zoomInstallDir>/confmodifying the sections highlighted below.
- Curator-Zoom Server SSL connection:
- Zoom-Preview Server SSL connection:
- Web APIs and Web Administration Server SSL connection:
- Save the changes made in server.xml
- Start the Zoom Server, Curator/Solr Server and Preview Server services
- Block non-SSL ports (8443, 8873, 8983) and open the SSL ports (9443, 8973, 8984) in the firewall. Save changes and restart the firewall service.
Example: sudo iptables -A INPUT -m state –state NEW -m tcp -p tcp –dport 8443 -j REJECT
- Try connecting to the Web Management Console through a browser using “https://zm-server:9443/”. If your SSL certificate is self-signed, then you will be prompted with a security alert. Accept and proceed with the connection.
Zoom’s Web Administration Server and Preview Server support communication using TLS/SSL. Typically, Zoom users access these servers through the following:
– Browsers, to view the Web Management console or to open Zoom Web Client Apps
– Desktop Visual Asset Browser, Zoom Client Proxy, Zoom Preview Server, to execute Web APIs
The steps to setup SSL support for Web Apps are as below. Please refer to the article here for enabling SSL support for desktop apps: