123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142 |
- <!DOCTYPE html>
- <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
- <head>
- <title>Creating and Applying SSL Certificate to Apache Guacamole</title>
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
- <meta charset="UTF-8">
- <meta name="keywords" content="Apache Tomcat,SSL,PKI,Configuration,Web Server,Guacamole,Web Based Tools,Debian,Apache,Web Based RDP,Web Based VNC,Web Based SSH,System Administration,Linux,Raspberry Pi,SBC,Home Lab,Home Lab Ideas,Browser Based,Web Based,Self-Hosted,Apache Guacamole,Apache Guacamole SSL Setup,RDP,SSH,VNC,Terminal,Browser Based Administration,Browser Based RDP,Browser Based VNC,Free Software,Freeware,System Administrator,How To,Tutorial,i12bretro">
- <meta name="author" content="i12bretro">
- <meta name="description" content="Creating and Applying SSL Certificate to Apache Guacamole">
- <meta name="viewport" content="width=device-width, initial-scale=1.0">
- <meta name="revised" content="10/24/2022 10:18:32 AM" />
- <link rel="icon" type="image/x-icon" href="includes/favicon.ico">
- <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
- <script type="text/javascript" src="includes/js/steps.js"></script>
- <link href="css/steps.css" rel="stylesheet" type="text/css" />
- </head>
- <body>
- <div id="gridContainer">
- <div class="topMargin"></div>
- <div id="listName" class="topMargin">
- <h1>Creating and Applying SSL Certificate to Apache Guacamole</h1>
- </div>
- <div></div>
- <div id="content">
- <h2>Prerequisites</h2>
- <ul>
- <li class="noCheckbox">A XCA PKI database <a href="https://youtu.be/ezzj3x207lQ" target="_blank">https://youtu.be/ezzj3x207lQ</a></li>
- </ul>
- <h2>Create Your SSL Certificate</h2>
- <ol>
- <li>Launch XCA</li>
- <li>Open the PKI database if it is not already (File > Open DataBase), enter password</li>
- <li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
- <li>Select New</li>
- <li>On the Source tab, make sure Use this Certificate for signing is selected</li>
- <li>Verify your Intermediate CA certificate is selected from the drop down</li>
- <li>Click the Subject tab</li>
- <li>Complete the Distinguished Name section
- <p>internalName: Guacamole SSL<br />
- countryName: US<br />
- stateOrProvinceName: Virginia<br />
- localityName: Northern<br />
- organizationName: i12bretro<br />
- organizationUnitName: i12bretro Certificate Authority<br />
- commonName: remote.i12bretro.local</p>
- </li>
- <li>Click the Generate a New Key button</li>
- <li>Enter a name and set the key size to at least 2048</li>
- <li>Click Create</li>
- <li>Click on the Extensions tab</li>
- <li>Select End Entity from the type list</li>
- <li>Click Edit next to Subject Alternative Name</li>
- <li>Add any DNS or IP addresses that the certificate will identify</li>
- <li>Update the validity dates to fit your needs</li>
- <li>Click the Key Usage tab</li>
- <li>Under Key Usage select Digital Signature, Key Encipherment</li>
- <li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
- <li>Click the Netscape tab</li>
- <li>Select SSL Server</li>
- <li>Click OK to create the certificate</li>
- </ol>
- <h2>Exporting Required Files</h2>
- <ol>
- <li>In XCA, click on the Certificates tab</li>
- <li>Right click the Intermediate CA certificate > Export > File</li>
- <li>Set the file name with a .crt extension and verify the export format is PEM chain (*.pem)</li>
- <li>Click OK</li>
- <li>Right click the SSL certificate > Export > File</li>
- <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
- <li>Click OK</li>
- <li>Click the Private Keys tab</li>
- <li>Right click the private key generated for the SSL certificate > Export > File</li>
- <li>Set the file name with a .key extension and verify the export format is PEM private (*.pem)</li>
- <li>Click OK</li>
- </ol>
- <h2>Applying the Certificates</h2>
- <ol>
- <li>Download WinSCP <a href="https://winscp.net/eng/downloads.php" target="_blank">Download</a></li>
- <li>Extract WinSCP and run the executable</li>
- <li>Connect to the Apache Guacamole server via WinSCP</li>
- <li>Copy the created .crt, .key and .pem files to ~/</li>
- <li>On the Guacamole server, run the following command in a terminal
- <div class="codeBlock">sudo cp ~/remote.i12bretro.local.crt /var/lib/tomcat9/<br />
- sudo cp ~/remote.i12bretro.local.key /var/lib/tomcat9/<br />
- sudo cp ~/CA-Chain.pem /var/lib/tomcat9/<br />
- sudo chown :tomcat /var/lib/tomcat9/remote.i12bretro.local.crt<br />
- sudo chown :tomcat /var/lib/tomcat9/remote.i12bretro.local.key<br />
- sudo chown :tomcat /var/lib/tomcat9/CA-Chain.pem<br />
- sudo cp /var/lib/tomcat9/conf/server.xml /var/lib/tomcat9/conf/server.xml.bkup<br />
- sudo nano /var/lib/tomcat9/conf/server.xml</div>
- </li>
- <li>Edit the server.xml file adding the following connector block
- <p><connector port="8443"<br />
- protocol="org.apache.coyote.http11.Http11NioProtocol"<br />
- maxThreads="150"<br />
- SSLEnabled="true"<br />
- SSLProtocol="TLS"<br />
- clientAuth="false"<br />
- secure="true"<br />
- scheme="https"<br />
- SSLCertificateFile="/var/lib/tomcat9/remote.i12bretro.local.crt"<br />
- SSLCertificateKeyFile="/var/lib/tomcat9/remote.key"<br />
- SSLCertificateChainFile="/var/lib/tomcat9/CA-Chain.pem"<br />
- keyAlias="remote.i12bretro.local"<br />
- sslEnabledProtocols="TLSv1.1+TLSv1.2"></connector></p>
- </li>
- <li>Press CTRL+O, Enter, CTRL+X</li>
- <li>Run the following command in terminal to restart the Gaucamole Tomcat server
- <div class="codeBlock">sudo systemctl restart tomcat9</div>
- </li>
- <li>Open a web browser and navigate to Apache Guacamole via https://</li>
- </ol>
- <h2>Optional Steps</h2>
- <ol>
- <li>To redirect all http traffic to communicate securely with https, run the following in a terminal
- <div class="codeBlock">sudo nano /var/lib/tomcat9/conf/web.xml</div>
- </li>
- <li>At the bottom of the file above the closing tag for web-app paste the following
- <p><security-constraint><br />
- <web-resource-collection><br />
- <web-resource-name>Protected Context</web-resource-name><br />
- <url-pattern>/*</url-pattern><br />
- </web-resource-collection><br />
- <user-data-constraint><br />
- <transport-guarantee>CONFIDENTIAL</transport-guarantee><br />
- </user-data-constraint><br />
- </security-constraint></p>
- </li>
- </ol> </div>
- </div>
- </body>
- </html>
-
|