In a standard installation of Acrolinx, communication between the core server and the outside world is unencrypted. By "outside world" we mean people who connect to the core server with an Acrolinx integration, or with a web browser.
Your core server has two separate URLs, each with a different port. The core server uses one of these URLs exclusively for internal communication (between your core server and language and analytics servers), and the other for public communication. This article tells you how to secure your public URL with HTTPS. To learn how to secure your internal URL with HTTPS, see our article on securing your internal Acrolinx URL with HTTPS.
When integrations connect to the core server through the public internet, you might choose to use HTTPS, the internet standard for secure web communication. HTTPS communication ensures that data and passwords are unreadable during transmission.
By the way, setting up HTTPS, especially generating the proper public key certificate, is best done by a security professional. Some of the configuration steps aren’t for the faint-hearted. In any event, the Acrolinx Support team is happy to assist you in securing Acrolinx with HTTPS.
Acrolinx only supports certificates signed by a third-party certificate authority (CA). Self-signed certificates in any form aren't supported.
Here’s a checklist of what you'll need:
- Your certificate (.crt) file signed by a third-party certificate authority.
- The key (.key) file that belongs to your certificate.
- All related (chain) certificate files.
- OpenSSL installed to generate your Java keystore.
Once you have the .crt, .key, related certificate files, and you've installed OpenSSL, you can start. If you'd like help with the following steps, contact Acrolinx Support to schedule a web meeting.
To secure Acrolinx for HTTPS communication, you need to define the protocol and port that you use for secure external communication. You also need to define the keystore and truststore details.
- Stop all your Acrolinx servers.
- Import your certificate into a Java keystore:
a) Combine all certificate files (chain certificates) you received together with the <CERTIFICATE_NAME>.crt file into a new <CERTIFICATE_NEW_NAME>.crt file as follows:
- Open your main <CERTIFICATE_NAME>.crt file and select Save As… to create a <CERTIFICATE_NEW_NAME>.crt file.
- Open each chain certificate file, Select All, Copy and then paste into your <CERTIFICATE_NEW_NAME>.crt file directly underneath the existing -----END CERTIFICATE----- line.
- Repeat for all chain certificates.
Your certificate file should now look like this:
b) Combine your <CERTIFICATE_NEW_NAME>.crt file and the <KEY_NAME>.key file into a single PKCS12 file - To do this, open a command-line shell and enter the following command:
openssl pkcs12 -inkey <KEY_NAME>.key -in <CERTIFICATE_NEW_NAME>.crt -export -out combined.pkcs12
c) Create a <PASSWORD> when asked, verify it when prompted and make a note of it.
d) Copy the file combined.pkcs12 from wherever it was generated into the bin folder of your overlay directory. You can find this under
If you use a Windows server, you might enter a command that resembles this:
copy C:\files\combined.pkcs12 C:\ProgramData\Acrolinx\ServerConfiguration\server\bin
If you use a Unix-based server, you might enter a command that resembles this:
cp /Users/<USERNAME>/Documents/combined.pkcs12 /home/.config/Acrolinx/ServerConfiguration<VERSION_NUMBER>/server/bin
e) Navigate to your overlay bin directory (Here's a Windows example:
%ACROLINX_CONFIGURATION_ROOT%\server\bin— the location to which you just copied your combined.pkcs12 file) and import the PKCS12 file into your Java keystore.
cd C:\ProgramData\Acrolinx\ServerConfiguration\server\bin keytool.exe -v -importkeystore -srckeystore combined.pkcs12 -srcstoretype PKCS12 -srcstorepass <PASSWORD> -destkeystore myKeystore -deststoretype JKS -deststorepass <KEYSTORE_PASSWORD> -destkeypass <KEYSTORE_PASSWORD>
If keytool.exe isn't found, you'll need to state the path to it. This will depend where you have Java installed. For example:
C:\Program Files\Java\jdk1.8.0_131\bin\keytool.exe -v -importkeystore -srckeystore combined.pkcs12 -srcstoretype PKCS12 -srcstorepass <PASSWORD> -destkeystore myKeystore -deststoretype JKS -deststorepass <KEYSTORE_PASSWORD> -destkeypass <KEYSTORE_PASSWORD>Here's a Unix example:
cd /home/.config/Acrolinx/ServerConfiguration<VERSION_NUMBER>/server/bin keytool -v -importkeystore -srckeystore combined.pkcs12 -srcstoretype PKCS12 -srcstorepass <PASSWORD> -destkeystore myKeystore -deststoretype JKS -deststorepass <KEYSTORE_PASSWORD> -destkeypass <KEYSTORE_PASSWORD>
- The variable <PASSWORD> is the password you used when you created the PKCS12 file.
- The variable <KEYSTORE_PASSWORD> is your keystore password.
You've now generated a keystore in your core server's overlay bin directory.
- Open your overlay of the core server properties file. You can find it under
%ACROLINX_CONFIGURATION_ROOT%/server/bin/coreserver.properties. Add the following properties.
<CORE_SERVER_NAME> has to be the domain name on your certificate, and not the machine name. To use HTTPS, the core server needs a DNS name that's accessible to the integrations.
a) Update the endpointPort value if you use a different port for secure communication. By default, all integrations connect to the core server through port 8031. If your security policy requires secure communication to go through a specific port such as 443, add the extra endpointPort as follows:
- Define the keystore and truststore details by adding the following properties:
sslKeystore=<KEYSTORE_NAME> sslKeystorePassword=<PASSWORD> sslTruststore=<KEYSTORE_NAME> sslTruststorePassword=<PASSWORD>Example:
sslKeystore=myKeystore sslKeystorePassword=pRu4Hatr sslTruststore=myKeystore sslTruststorePassword=pRu4Hatr
In most cases, the value for sslTruststore is the same as the value for sslKeystore. If you leave out the sslTruststore properties completely, the values that you entered for the sslKeystore properties are automatically used as the sslTruststore settings as well. If you created a separate truststore, use that file name and password instead.
- (Optional) If you use a different JVM to the one that is installed with Acrolinx and want
to specify a different keystore algorithm, complete this step - otherwise proceed to step 6.
Add the following additional property:
ssl.KeyManagerFactory.algorithm=<ALGORITHM_NAME>For example, if you use the IBM JVM, add the property as follows:
- Save your overlay of the core server properties file, and start all your Acrolinx servers.
Updating the URL in the Acrolinx Integrations
After you’ve secured the Acrolinx Server communication with HTTPS, Acrolinx users need to update the connection details in their integrations to use the new HTTPS address.
Instruct users to navigate toand update the Server address field to:
Users need to access the Dashboard through the https address as well:
Your Acrolinx Server is now secured with HTTPS and ready to use.
See the following articles for optional extra steps: