Documentation for JIRA 5.0. Documentation for other versions of JIRA is available too.
If you want to configure a read/write connection with Microsoft Active Directory, you will need to install an SSL certificate, generated by your Active Directory server, onto your JIRA server and then install the certificate into your JVM keystore.
On this page:
The information on this page does not apply to JIRA OnDemand.
keystore
.To generate a certificate, you need the following components installed on the Windows Domain Controller to which you're connecting.
Required Component | Description |
---|---|
Internet Information Services (IIS) | This is required before you can install Windows Certificate Services. |
Windows Certificate Services | This installs a certification authority (CA) which is used to issue certificates. Step 1, below, explains this process. |
Windows 2000 Service Pack 2 | Required if you are using Windows 2000 |
Required if you are using Windows 2000. Provides the highest available encryption level (128-bit). |
If Certificate Services are already installed, skip to step 2, below. The screenshots below are from Server 2008, but the process is similar for Server 2000 and 2003.
The steps above describe how to install the certification authority (CA) on your Microsoft Active Directory server. Next, you will need to add the Microsoft Active Directory server's SSL certificate to the list of accepted certificates used by the JDK that runs your application server.
The Active Directory certificate is automatically generated and placed in root of the C:\ drive, matching a file format similar to the tree structure of your Active Directory server. For example: c:\ad2008.ad01.atlassian.com_ad01.crt
.
You can also export the certificate by executing this command on the Active Directory server:
certutil -ca.cert client.crt
For an application server to trust your directory's certificate, the certificate must be imported into your Java runtime environment. The JDK stores trusted certificates in a file called a keystore. The default keystore file is called cacerts
and it lives in the jre\lib\security
sub-directory of your Java installation.
In the following examples, we use server-certificate.crt
to represent the certificate file exported by your directory server. You will need to alter the instructions below to match the name actually generated.
C:\Program Files\Java\jdk1.6.0_45
.Run the command below, where server-certificate.crt
is the name of the file from your directory server:
keytool -import -keystore .\jre\lib\security\cacerts -file server-certificate.crt
keytool
will prompt you for a password. The default keystore password is changeit
.When prompted Trust this certificate? [no]:
enter yes
to confirm the key import:
Enter keystore password: changeit Owner: CN=ad01, C=US Issuer: CN=ad01, C=US Serial number: 15563d6677a4e9e4582d8a84be683f9 Valid from: Tue Aug 21 01:10:46 ACT 2007 until: Tue Aug 21 01:13:59 ACT 2012 Certificate fingerprints: MD5: D6:56:F0:23:16:E3:62:2C:6F:8A:0A:37:30:A1:84:BE SHA1: 73:73:4E:A6:A0:D1:4E:F4:F3:CD:CE:BE:96:80:35:D2:B4:7C:79:C1 Trust this certificate? [no]: yes Certificate was added to keystore
You may now use the 'Secure SSL' option when connecting your application to your directory server.
cd $JAVA_HOME
will usually get you there.Run the command below, where server-certificate.crt
is the name of the file from your directory server:
sudo keytool -import -keystore ./jre/lib/security/cacerts -file server-certificate.crt
keytool
will prompt you for a password. The default keystore password is changeit
.When prompted Trust this certificate? [no]:
enter yes
to confirm the key import:
Password: Enter keystore password: changeit Owner: CN=ad01, C=US Issuer: CN=ad01, C=US Serial number: 15563d6677a4e9e4582d8a84be683f9 Valid from: Tue Aug 21 01:10:46 ACT 2007 until: Tue Aug 21 01:13:59 ACT 2012 Certificate fingerprints: MD5: D6:56:F0:23:16:E3:62:2C:6F:8A:0A:37:30:A1:84:BE SHA1: 73:73:4E:A6:A0:D1:4E:F4:F3:CD:CE:BE:96:80:35:D2:B4:7C:79:C1 Trust this certificate? [no]: yes Certificate was added to keystore
You may now use the 'Secure SSL' option when connecting your application to your directory server.
/Library/Java/Home
.Run the command below, where server-certificate.crt
is the name of the file from your directory server:
sudo keytool -import -keystore ./jre/lib/security/cacerts -file server-certificate.crt
keytool
will prompt you for a password. The default keystore password is changeit
.When prompted Trust this certificate? [no]:
enter yes
to confirm the key import:
Password: Enter keystore password: changeit Owner: CN=ad01, C=US Issuer: CN=ad01, C=US Serial number: 15563d6677a4e9e4582d8a84be683f9 Valid from: Tue Aug 21 01:10:46 ACT 2007 until: Tue Aug 21 01:13:59 ACT 2012 Certificate fingerprints: MD5: D6:56:F0:23:16:E3:62:2C:6F:8A:0A:37:30:A1:84:BE SHA1: 73:73:4E:A6:A0:D1:4E:F4:F3:CD:CE:BE:96:80:35:D2:B4:7C:79:C1 Trust this certificate? [no]: yes Certificate was added to keystore
You may now use the 'Secure SSL' option when connecting your application to your directory server.
NOTE: After importing the certificate, you'll need to restart your application so that it can flush the cache and load the modifications in the
cacerts
file.
Connecting to an LDAP Directory
Configuring User Directories