HTTPS
To ensure secure connections and data transfer, we recommend using HTTPS when connecting to the vScope web application.
Set up HTTPS via reverse proxy
The recommended option, suitable for most cases, is to allow an existing reverse proxy or load balancer to handle HTTPS connections and proxy the traffic to the vScope server over HTTP.
Configure the reverse proxy
It is possible to set up vScope with any third-party reverse proxy. Please refer to the official documentation for your specific software on how to properly configure and secure it. Below are some examples and links to help you get started.
Basic example configuration to help you get started with NGINX. Be sure to read NGINX Reverse Proxy for proper guidance and additional information.
Basic example configuration to help you get started with Apache. Be sure to read Reverse Proxy Guide for proper guidance and additional information.
Other common reverse proxies
Update Base URL in vScope
Open vScope in your browser and navigate to Settings > Network.
Update Base URL to the address that end-users will use to access vScope. This address is used in communication with end-users, such as in emails, and should always be kept up-to-date. Be sure to include https://
along with the address (e.g. https://vscope.example.tld
).
Set up HTTPS in vScope
If you don’t have, or prefer not to use, a reverse proxy, you can configure HTTPS directly in vScope by uploading a certificate.
Generate a self-signed certificate with OpenSSL
If you already have a certificate you can skip ahead to Configure vScope.
While it is recommended to use a publicly trusted certificate, vScope can be used with a self-signed certificate.
The first command will generate a key and certificate valid for 10 years (3650 days) and for the domain vscope.example.tld
.
If you use these commands be sure to replace the domain with your actual domain.
The second command will ask you to set at password and package both the key and the certificate as a PKCS#12 file keystore.p12
.
This is the file you will upload to vScope.
Due to how OpenSSL works both the key and the keystore itself will be password protected with the password you entered when you ran the command.
Configure vScope
-
Enable HTTPS
In vScope, navigate to Settings > Network and enable HTTPS. -
Upload the certificate
Upload the certificate on the right hand side by clincking on Upload and selecting it from your file system.
-
Configure the HTTPS port
Enter the port vScope will use to accept HTTPS connections. The default port is 443 and we recommend you leave it unchanged unless necessary. -
Configure passwords
Both the keystore and the key inside can be password protected. Enter the password(s) into the respective text field.It is not unusal for both to be password protected and with the same password. If you generated a self-signed certificate as per the instructions above then this will indeed be the case.
-
Configure alias
If your keystore only contains one certificate then you can leave this empty and vScope will find and use it.If you have multiple certificates in the keystore then enter the alias of the certificate that vScope should use into the text field.
-
Save the configuration
Click Save to apply your configuration. -
Reload webservice
Allow 10-15 seconds for the service to restart.
Ensure that it works by accessing the vScope web UI using https://
in the address field.
Update Base URL
Update Base URL to the address that end-users will use to access vScope. This address is used in communication with end-users, such as in emails, and should always be kept up-to-date. Be sure to include https://
along with the address (e.g. https://vscope.example.tld
).
Common errors
Failed to update settings: Keystore validation failed: No valid certificates found
vScope couldn’t find a certificate to use in the keystore. Ensure that the keystore actually contains a certificate and key.
If you didn’t enter a keystore password this most likely means that your keystore is password protected.
Failed to update settings: Keystore conversion failed: Keystore conversion failed: Get Key failed: Given final block not properly padded. Such issues can arise if a bad key is used during decryption.
The key is likely password protected and you did not enter a password, or the password you entered is incorrect.
If you have used OpenSSL to generate your certificate then the key password will be the same as the keystore password, unless instructed otherwise.
In case you are unsure how your certificate was generated then try to enter the same password in the “Key password” text field anyway, if only to eliminate the possibility of this being the issue.
Failed to update settings: Keystore Parsing failed. Supported types: [pkcs12, jks]. Exceptions: [as ‘pkcs12’:keystore password was incorrect, as ‘jks’:keystore password was incorrect]
The keystore could not be read because the password is incorrect. Try re-entering the password.
Locked out of vScope / vScope is not starting properly
If you are locked out of vScope web UI due to a misconfiguration, you can temporarily disable HTTPS by following these steps:
-
Stop the vScope service
Stop the running vScope service on your server. -
Navigate to the configuration folder
On the server, open the.settings
folder in the vScope data folder, e.g.
C:\vScopeData\configuration\.settings
.
You might have to enable “Show hidden files” in your file manager. -
Edit the settings file
Open thecom.infrasight.web.common.prefs
file in a text editor. -
Disable HTTPS
Find the line:
https.enabled = true
Change the value to:
https.enabled = false
-
Restart the vScope service
Start the vScope service again. -
Access the UI and reconfigure HTTPS
Log in to the vScope web UI and navigate to Settings > Network and reconfigure HTTPS with the correct settings.