0139.html 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. <!DOCTYPE html>
  2. <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
  3. <head>
  4. <title>Creating and Applying SSL Certificate to Apache Guacamole</title>
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  6. <meta charset="UTF-8">
  7. <meta name="keywords" content="Apache Tomcat,SSL,PKI,Configuration,Web Server,Guacamole,Web Based Tools,Debian,i12bretro,How To,Tutorial,Apache,Web Based RDP,Web Based VNC,Web Based SSH,System Administration">
  8. <meta name="author" content="i12bretro">
  9. <meta name="description" content="Creating and Applying SSL Certificate to Apache Guacamole">
  10. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  11. <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
  12. <script type="text/javascript">
  13. $(function(){
  14. $('textarea').each(function(i,e){
  15. theTextarea = $(this);
  16. theTextarea.height((theTextarea[0].scrollHeight-5) +'px');
  17. });
  18. $('li').each(function(i,e){
  19. if(!$(this).hasClass('noCheckbox')){
  20. var uuid = 'li_' + Math.floor(Math.random() * Math.floor(1000000)).toString() + '_' + i.toString();
  21. $(this).contents().wrap('<span id="'+ uuid +'"><label for="cb_'+ uuid +'"></label></span>');
  22. $(this).prepend('<input type="checkbox" class="completeBox" id="cb_' + uuid +'" rel="'+ uuid +'" />')
  23. }
  24. });
  25. $('code,div.codeBlock,textarea.codeBlock').each(function(i,e){
  26. theElement = $(this);
  27. var lines = theElement.html().split("\n");
  28. theElement.empty();
  29. for(l=0;l<lines.length;l++){
  30. if($.trim(lines[l]) != '' && $.trim(lines[l]).substr(0,1) != '#' && $.trim(lines[l]).indexOf(' #') == -1 && lines[l].substr(0, 4).toUpperCase() != 'REM '){
  31. theElement.append('<input type="image" src="images/clipboard.png" value="" class="copy-text" rel="copy_'+ i +'_'+ l +'" data-clipboard-text="'+ $.trim(lines[l].replace(/"/g, '&quot;')) +'" /><span id="copy_'+ i +'_'+ l +'">'+ lines[l] +'</span>');
  32. } else {
  33. theElement.append(lines[l]);
  34. }
  35. }
  36. });
  37. $(document).on('click','input.copy-text',function(){
  38. theButton = $(this);
  39. $('input.copy-text').attr('src','images/clipboard.png');
  40. $('span.copy-animation,span.copy-animation-ps').removeClass('copy-animation copy-animation-ps');
  41. try {
  42. if($('#'+ theButton.attr('rel')).parent('div').hasClass('PS')){
  43. $('#'+ theButton.attr('rel')).addClass('copy-animation-ps');
  44. } else if($('#'+ theButton.attr('rel')).parent('div').hasClass('CMD')){
  45. $('#'+ theButton.attr('rel')).addClass('copy-animation-cmd');
  46. } else {
  47. $('#'+ theButton.attr('rel')).addClass('copy-animation');
  48. }
  49. navigator.clipboard.writeText(theButton.data('clipboard-text').replace(/<[^>]*>?/gm, ''));
  50. theButton.attr('src','images/clipboard_active.png');
  51. } catch(err) {
  52. }
  53. return false;
  54. });
  55. $(document).on('click','input.completeBox',function(){
  56. theBox = $(this);
  57. $('#'+ theBox.attr('rel')).addClass('strikethrough');
  58. theBox.prop('disabled',true);
  59. theBox.parent('li').prevAll().each(function(i,e){
  60. theLI = $(this);
  61. if(theLI.find('input[type=checkbox]').not(':checked')){
  62. $('#'+ theLI.find('input[type=checkbox]').attr('rel')).addClass('strikethrough');
  63. theLI.find('input[type=checkbox]').prop('checked',true).prop('disabled',true);
  64. }
  65. });
  66. });
  67. if(window.self !== window.top){
  68. window.parent.$('iframe.stepsFrame').height((this['scrollingElement']['scrollHeight']+20) +'px');
  69. }
  70. });
  71. </script>
  72. <link href="css/steps.css" rel="stylesheet" type="text/css" />
  73. </head>
  74. <body>
  75. <div id="gridContainer">
  76. <div class="topMargin"></div>
  77. <div id="listName" class="topMargin">
  78. <h1>Creating and Applying SSL Certificate to Apache Guacamole</h1>
  79. </div>
  80. <div></div>
  81. <div id="content">
  82. <h2>Create Your SSL Certificate</h2>
  83. <ol>
  84. <li>Launch XCA</li>
  85. <li>Open the PKI database if it is not already (File &gt; Open DataBase), enter password</li>
  86. <li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
  87. <li>Select New</li>
  88. <li>On the Source tab, make sure Use this Certificate for signing is selected</li>
  89. <li>Verify your Intermediate CA certificate is selected from the drop down</li>
  90. <li>Click the Subject tab</li>
  91. <li>Complete the Distinguished Name section
  92. <p>internalName: Guacamole SSL<br />
  93. countryName: US<br />
  94. stateOrProvinceName: Virginia<br />
  95. localityName: Northern<br />
  96. organizationName: i12bretro<br />
  97. organizationUnitName: i12bretro Certificate Authority<br />
  98. commonName: remote.i12bretro.local</p>
  99. </li>
  100. <li>Click the Generate a New Key button</li>
  101. <li>Enter a name and set the key size to at least 2048</li>
  102. <li>Click Create</li>
  103. <li>Click on the Extensions tab</li>
  104. <li>Select End Entity from the type list</li>
  105. <li>Click Edit next to Subject Alternative Name</li>
  106. <li>Add any DNS or IP addresses that the certificate will identify</li>
  107. <li>Update the validity dates to fit your needs</li>
  108. <li>Click the Key Usage tab</li>
  109. <li>Under Key Usage select Digital Signature, Key Enchiperment</li>
  110. <li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
  111. <li>Click the Netscape tab</li>
  112. <li>Select SSL Server</li>
  113. <li>Click OK to create the certificate</li>
  114. </ol>
  115. <h2>Exporting Required Files</h2>
  116. <ol>
  117. <li>In XCA, click on the Certificates tab</li>
  118. <li>Right click the Intermediate CA certificate &gt; Export &gt; File</li>
  119. <li>Set the file name with a .crt extension and verify the export format is PEM chain (*.pem)</li>
  120. <li>Click OK</li>
  121. <li>Right click the SSL certificate &gt; Export &gt; File</li>
  122. <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
  123. <li>Click OK</li>
  124. <li>Click the Private Keys tab</li>
  125. <li>Right click the private key generated for the SSL certificate &gt; Export &gt; File</li>
  126. <li>Set the file name with a .key extension and verify the export format is PEM private (*.pem)</li>
  127. <li>Click OK</li>
  128. </ol>
  129. <h2>Applying the Certificates</h2>
  130. <ol>
  131. <li>Download WinSCP <a href="https://winscp.net/eng/downloads.php" target="_blank">Download</a></li>
  132. <li>Extract WinSCP and run the executable</li>
  133. <li>Connect to the Apache Guacamole server via WinSCP</li>
  134. <li>Copy the created .crt, .key and .pem files to ~/</li>
  135. <li>On the Guacamole server, run the following command in a terminal
  136. <div class="codeBlock">sudo cp ~/remote.i12bretro.local.crt /var/lib/tomcat9/<br />
  137. sudo cp ~/remote.i12bretro.local.key /var/lib/tomcat9/<br />
  138. sudo cp ~/CA-Chain.pem /var/lib/tomcat9/<br />
  139. sudo chown :tomcat /var/lib/tomcat9/remote.i12bretro.local.crt<br />
  140. sudo chown :tomcat /var/lib/tomcat9/remote.i12bretro.local.key<br />
  141. sudo chown :tomcat /var/lib/tomcat9/CA-Chain.pem<br />
  142. sudo cp /var/lib/tomcat9/conf/server.xml /var/lib/tomcat9/conf/server.xml.bkup<br />
  143. sudo nano /var/lib/tomcat9/conf/server.xml</div>
  144. </li>
  145. <li>Edit the server.xml file adding the following connector block
  146. <p>&lt;connector port=&quot;8443&quot;<br />
  147. protocol=&quot;org.apache.coyote.http11.Http11NioProtocol&quot;<br />
  148. maxThreads=&quot;150&quot;<br />
  149. SSLEnabled=&quot;true&quot;<br />
  150. SSLProtocol=&quot;TLS&quot;<br />
  151. clientAuth=&quot;false&quot;<br />
  152. secure=&quot;true&quot;<br />
  153. scheme=&quot;https&quot;<br />
  154. SSLCertificateFile=&quot;/var/lib/tomcat9/remote.i12bretro.local.crt&quot;<br />
  155. SSLCertificateKeyFile=&quot;/var/lib/tomcat9/remote.key&quot;<br />
  156. SSLCertificateChainFile=&quot;/var/lib/tomcat9/CA-Chain.pem&quot;<br />
  157. keyAlias=&quot;remote.i12bretro.local&quot;<br />
  158. sslEnabledProtocols=&quot;TLSv1.1+TLSv1.2&quot;&gt;&lt;/connector&gt;</p>
  159. </li>
  160. <li>Press CTRL+O, Enter, CTRL+X</li>
  161. <li>Run the following command in terminal to restart the Gaucamole Tomcat server
  162. <div class="codeBlock">sudo systemctl restart tomcat9</div>
  163. </li>
  164. <li>Open a web browser and navigate to Apache Guacamole via https://</li>
  165. </ol>
  166. <h2>Optional Steps</h2>
  167. <ol>
  168. <li>To redirect all http traffic to communicate securely with https, run the following in a terminal
  169. <div class="codeBlock">sudo nano /var/lib/tomcat9/conf/web.xml</div>
  170. </li>
  171. <li>At the bottom of the file above the closing tag for web-app paste the following
  172. <p>&lt;security-constraint&gt;<br />
  173. &lt;web-resource-collection&gt;<br />
  174. &lt;web-resource-name&gt;Protected Context&lt;/web-resource-name&gt;<br />
  175. &lt;url-pattern&gt;/*&lt;/url-pattern&gt;<br />
  176. &lt;/web-resource-collection&gt;<br />
  177. &lt;user-data-constraint&gt;<br />
  178. &lt;transport-guarantee&gt;CONFIDENTIAL&lt;/transport-guarantee&gt;<br />
  179. &lt;/user-data-constraint&gt;<br />
  180. &lt;/security-constraint&gt;</p>
  181. </li>
  182. </ol>
  183. </div>
  184. </div>
  185. </body>
  186. </html>