Configuring HTTPS in Ingress
Open iT Ingress is configured to use secure browsing (HTTPS) by default, with an SSL Certificate and Key. If you need further configuration for the HTTPS setup, please review the relevant section for detailed instructions.
Configure HTTPS with Windows Certificate Store
Open iT Ingress can use secure browsing (HTTPS) using SSL certificates installed in the Windows Certificate Store.
-
Go to the Open iT Ingress configuration directory, which is
C:\Program Files\OpeniT\Ingress\configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, input the necessary details.
Fields Description SchemeUse this to specify the https protocol. HostUse this to specify the hostname or domain name.
:icon-alert: Warning: Hostnames or domain names cannot contain underscores_since this is an invalid character according to the DNS specifications and RFC standards.PortUse this to specify the port number. You can use the default port for HTTPS, 443. StoreUse this to specify the Certificate Store where your SSL certificate is stored. LocationUse this to specify the appropriate store location. Required Fields for SSL Configuration in the Override File
The Store field accepts only predefined certificate store values. These stores indicate where the SSL certificate is stored on the system. Refer to the table below for supported values and their usage:
Stores Description MyUse this to specify the Personal store, commonly used for client certificates or private keys. RootUse this to specify the Trusted Root Certification Authorities. AuthRootUse this to specify the Third-party Root Certification Authorities. TrustedPeopleUse this to specify the certificates of the trusted people. TrustedPublisherUse this to specify the trusted publishers, typically used for code signing. CAorCertificate AuthorityUse this to specify the intermediate Certification Authorities. AddressBookUse this to specify other users that are used for email encryption certificates. DisallowedUse this to specify revoked and explicitly untrusted certificates. Supported Certificate Stores for SSL Configuration
The Location field determines where the certificate store is located. Choose one of the supported values below depending on whether the certificate applies to the current user, all users, or specific services:
Store Location Description CurrentUserUse this to specify certificates that are available only to the currently logged-in user. LocalMachineUse this to specify certificates that are available system-wide for all users. ServiceUse this to specify certificates used by specific Windows services (e.g., IIS, SQL Server). GroupPolicyUse this to specify certificates deployed via Group Policy, which can apply either to a user or a machine. Supported Store Locations for SSL Configuration
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "https",
"Host": "customer.openit.com",
"Port": "443",
"Certificate": {
"Store": "My",
"Location": "LocalMachine"
}
}
]
} -
Save the file.
-
Open the Task Manager.
-
Go to the Services tab.
-
Restart the OpeniTIngress service.
Configure HTTPS with an SSL Certificate and Key
Open iT Ingress can use secure browsing (HTTPS) using an SSL certificate and key.
- Windows
- Unix
-
Go to the Open iT Ingress configuration directory, which is
C:\Program Files\OpeniT\Ingress\configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, input the necessary details.
Fields Description SchemeUse this to specify the https protocol. HostUse this to specify the hostname or domain name.
Warning: Hostnames or domain names cannot contain underscores_since this is an invalid character according to the DNS specifications and RFC standards.PortUse this to specify the port number. You can use the default port for HTTPS, 443. CertUse this to specify the path to the SSL certificate. KeyUse this to specify the path to the SSL key. Required Fields for SSL Configuration in the Override File
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "https",
"Host": "customer.openit.com",
"Port": "443",
"Certificate": {
"Cert": "C:\Program Files\OpeniT\Ingress\configuration\caddy\ssl.crt\server.crt",
"Key": "C:\Program Files\OpeniT\Ingress\configuration\caddy\ssl.key\server.key"
}
}
]
} -
Save the file.
-
Open the Task Manager.
-
Go to the Services tab.
-
Restart the OpeniTIngress service.
-
Go to the Open iT Ingress configuration directory, which is
/opt/openit/ingress/configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, input the necessary details.
Fields Description SchemeUse this to specify the https protocol. HostUse this to specify the hostname or domain name.
Warning: Hostnames or domain names cannot contain underscores_since this is an invalid character according to the DNS specifications and RFC standards.PortUse this to specify the port number. You can use the default port for HTTPS, 443. CertUse this to specify the path to the SSL certificate. KeyUse this to specify the path to the SSL key. Required Fields for SSL Configuration in the Override File
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "https",
"Host": "customer.openit.com",
"Port": "443",
"Certificate": {
"Cert": "/opt/openit/ingress/configuration/caddy/ssl.crt/server.crt",
"Key": "/opt/openit/ingress/configuration/caddy/ssl.key/server.key"
}
}
]
} -
Save the file.
-
Run the following command to restart Ingress:
Command Syntaxsystemctl restart openit-ingress-api
Configure HTTPS using Let's Encrypt
Open iT Ingress can use secure browsing (HTTPS) using Let's Encrypt.
- Windows
- Unix
-
Go to the Open iT Ingress configuration directory, which is
C:\Program Files\OpeniT\Ingress\configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, make sure that the Cert and Key fields are empty.
This allows Caddy to automatically create a certificate.
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "https",
"Host": "customer.openit.com",
"Port": "443",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Save the file.
-
Open the Task Manager.
-
Go to the Services tab.
-
Restart the OpeniTIngress service.
-
Go to the Open iT Ingress configuration directory, which is
/opt/openit/ingress/configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, make sure that the Cert and Key fields are empty.
This allows Caddy to automatically create a certificate.
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "https",
"Host": "customer.openit.com",
"Port": "443",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Save the file.
-
Run the following command to restart Ingress:
Command Syntaxsystemctl restart openit-ingress-api
Add Multiple Site Bindings
- Windows
- Unix
-
Go to the Open iT Ingress configuration directory, which is
C:\Program Files\OpeniT\Ingress\configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, copy the entire site binding section.
For example, copy the contents from line 3 to 11.
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Paste the copied contents at the end of the
SiteBindingsarray.Add a comma
,to separate each site bindings.SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
},
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
},
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Modify the values in the additional site binding(s) as needed.
You may also use the following sections for reference:
-
Save the file.
-
Open the Task Manager.
-
Go to the Services tab.
-
Restart the OpeniTIngress service.
-
Go to the Open iT Ingress configuration directory, which is
/opt/openit/ingress/configurationby default. -
Create a copy of
SiteBindings.jsonand rename the duplicate file toSiteBindings.Override.json.Open the existing
SiteBindings.Override.json, if there is already one. -
In the override file, copy the entire site binding section.
For example, copy the contents from line 3 to 11.
SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Paste the copied contents at the end of the
SiteBindingsarray.Add a comma
,to separate each site bindings.SiteBindings.Override.json{
"SiteBindings": [
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
},
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
},
{
"Scheme": "http",
"Host": "",
"Port": "8080",
"Certificate": {
"Cert": "",
"Key": ""
}
}
]
} -
Modify the values in the additional site binding(s) as needed.
You may also use the following sections for reference:
-
Save the file.
-
Run the following command to restart Ingress:
Command Syntaxsystemctl restart openit-ingress-api
Add an Additional Reverse Proxy
This section guides you through the process of setting up an additional reverse proxy instance in your environment.
- Windows
- Unix
-
Go to the Open iT Ingress CaddyFilePartials directory, which is by default in
C:\Program Files\OpeniT\Ingress\configuration\ingress\CaddyFilePartials. -
Open the
custom.caddyfile using your preferred text editor. Use this file to define additional reverse proxy configurations to append to the main CaddyFile automatically.custom.caddy# This is a sample partial file, this will be appended at the end of your caddyfile.caddyAdd your new reverse proxy configuration below the comment:
Example# This is a sample partial file, this will be appended at the end of your caddyfile.caddy
https://customer.another.openit.com {
reverse_proxy :8888
} -
Save the changes.
-
Open the Task Manager.
-
Go to the Services tab.
-
Restart the OpeniTIngress service.
-
Verify that the configurations added in the
custom.caddyfile are appended to theCaddyFile.caddyfile, which is by default inC:\Program Files\OpeniT\Ingress\configuration\ingress\CaddyFile.caddy.CaddyFile.caddy# This is a sample partial file, this will be appended at the end of your caddyfile.caddy
https://customer.another.openit.com {
reverse_proxy :8888
}
-
Go to the Open iT Ingress CaddyFilePartials directory, which is by default in
/opt/openit/ingress/configuration/ingress/CaddyFilePartials. -
Open the
custom.caddyfile using your preferred text editor. Use this file to define additional reverse proxy configurations to append to the main CaddyFile automatically.custom.caddy# This is a sample partial file, this will be appended at the end of your caddyfile.caddyAdd your new reverse proxy configuration below the comment:
Example# This is a sample partial file, this will be appended at the end of your caddyfile.caddy
https://customer.another.openit.com {
reverse_proxy :8888
} -
Save the changes.
-
Run the following command to restart Ingress:
Command Syntaxsystemctl restart openit-ingress-api -
Verify that the configurations added in the
custom.caddyfile are appended to theCaddyFile.caddyfile, which is by default in/opt/openit/ingress/configuration/ingress/CaddyFile.caddyCaddyFile.caddy# This is a sample partial file, this will be appended at the end of your caddyfile.caddy
https://customer.another.openit.com {
reverse_proxy :8888
}