Configuration
3.5.0
Search this version
Configuration
Configuration
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Configuring HTTPS
Copy Markdown
Open in ChatGPT
Open in Claude
MetaDefender Storage Security can be configured to support HTTPS communication when accessing the Web UI and REST API.
Enable HTTPS on Windows-based deployments
In order to setup HTTPS communication please follow these steps:
- Obtain the certificate and the private key as two separate files (for example, crt.pem & key.pem )
- Rename the private key file in the form of <name>.key such that the extension of the file is .key
- Place the certificates in config\nginx\certificates folder inside the installation directory (by default, in C:\Program Files\OPSWAT\MetaDefender Storage Security\config\nginx\certificates)
- Navigate to the docker folder (by default, in C:\Program Files\OPSWAT\MetaDefender Storage Security\scripts)
- Open a PowerShell command prompt and run the following command
PS> .\mdss.ps1 -u enable_https- Verify that HTTPS is configured correctly by navigating with your browser.
Disable HTTPS on Windows-based deployments
For disabling HTTPS communication please follow these steps:
- Navigate to the docker folder (by default, in C:\Program Files\OPSWAT\MetaDefender Storage Security\scripts)
- Run the following command in PowerShell:
Powershell
PS> .\mdss.ps1 -u disable_httpsCertificate Handling When Disabling HTTPS
Disabling HTTPS on Windows will also "disable" the certificates found in config/nginx/certificates by renaming them to: ssl_key_disabled and ssl_crt_disabled .
If you plan to re-enable HTTPS using the same certificates, you must manually rename them back to ssl.key and ssl.crt.
Enable HTTPS on Unix-based deployments
In order to setup HTTPS communication please follow these steps:
- Obtain the certificate and the private key as two separate files (for example, crt.pem & key.pem )
- Rename the private key file in the form of <name>.key such that the extension of the file is .key
- Place your certificates in /etc/mdss/webclient/
- Run the enable_https utility by executing the following command:
sudo mdss -u enable_https- Verify that HTTPS is configured correctly by navigating with your browser.
Disable HTTPS on Unix-based deployments
For disabling HTTPS communication, run the following command:
Bash
sudo mdss -u disable_httpsType to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
Custom CA certificatesDiscard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
