Set up secure connection to your UI Bakery on-prem instance
The easiest way to secure connection to your UI Bakery instance with an SSL certificate is to use an additional web server that will proxy requests to your UI Bakery instance. Below you can find instructions on how to do that using:
a popular web server Nginx
a free SSL certificate that is generated by Let's Encrypt or a self-signed certificate
a tool to rotate SSL certificates called
We will use additional web server Nginx to proxy requests to your UI Bakery instance. To install Nginx on your machine run:
After Nginx is installed, you need to create a configuration for your UI Bakery platform in its configuration. Assuming, that you would like to run UI Bakery at the domain name bakery.example.com you need to create the following file located at /etc/nginx/sites-enabled/bakery.example.com:
Afterward, you can verify the syntax of your config file using the following command:
If you get any error, open your configuration file and check that the syntax is correct.
is a Certificate Authority (CA) that facilitates obtaining and installing free TLS/SSL certificates.
is a tool that helps you automate the process of acquiring and rotating of SSL certificates. The Certbot team suggests installing the tool using snap. Install it if you don't have it installed already.
Afterward, you can install the Certbot tool:
Finally, you can link Certbot to the directory available in PATH so you could easily run this tool from the command line without using the full path to the executable:
The easiest way to obtain a certificate and use it in your Nginx configuration is through the Certbot Nginx plugin:
After you run this command, the SSL certificate would be generated and the Nginx configuration file will be updated. So the only thing left to do is to reload the Nginx server:
Make sure that port 443 is accessible on your VM!
To generate a self-signed key and certificate pair using OpenSSL type the following command:
You will be asked to to fill out the prompts. Make sure the Common Name (e.g. server FQDN or YOUR name) matches the domain in your nginx config.
Then you will need to create a strong Diffie-Hellman (DH) group with the following command:
Create a configuration snippet pointing to the SSL key and certificate in the /etc/nginx/snippets/self-signed.conf file:
Put into the /etc/nginx/snippets/ssl-params.conf file the following SSL settings:
Update your site configuration at /etc/nginx/sites-enabled/bakery.example.com :
After that you can check that your Nginx configuration is correct with the command:
And then restart the Nginx service:
sudo apt update
sudo apt install nginxserver {
listen 80;
listen [::]:80;
index index.html index.htm index.nginx-debian.html;
server_name bakery.example.com;
client_max_body_size 50M;
location / {
proxy_pass http://localhost:3030;
}
}sudo nginx -tsudo snap install core; sudo snap refresh coresudo snap install --classic certbotsudo ln -s /snap/bin/certbot /usr/bin/certbotsudo certbot --nginx -d bakery.example.comsudo systemctl reload nginxsudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/nginx-selfsigned.key -out /etc/ssl/certs/nginx-selfsigned.crtsudo openssl dhparam -out /etc/nginx/dhparam.pem 4096ssl_certificate /etc/ssl/certs/nginx-selfsigned.crt;
ssl_certificate_key /etc/ssl/private/nginx-selfsigned.key;ssl_protocols TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_dhparam /etc/nginx/dhparam.pem;
ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
ssl_ecdh_curve secp384r1;
ssl_session_timeout 10m;
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off;
ssl_stapling on;
ssl_stapling_verify on;
resolver 8.8.8.8 8.8.4.4 valid=300s;
resolver_timeout 5s;
# Disable strict transport security for now. You can uncomment the following
# line if you understand the implications.
#add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
add_header X-Frame-Options DENY;
add_header X-Content-Type-Options nosniff;
add_header X-XSS-Protection "1; mode=block";server {
listen 443 ssl;
listen [::]:443 ssl;
include snippets/self-signed.conf;
include snippets/ssl-params.conf;
server_name bakery.example.com;
client_max_body_size 50M;
location / {
proxy_pass http://localhost:3030;
}
}
server {
listen 80;
listen [::]:80;
server_name bakery.example.com;
return 302 https://$server_name$request_uri;
}sudo nginx -tsudo systemctl restart nginx