Certificate
A certificate, signed by a certificate authority needs to be created and installed on the web server. How this is done differs if the server is accessible from the public internet or not.
Public Facing Web Server
If the web server is public facing then a free certificate can be obtained using Let's Encrypt. Follow the instructions in SSL/TLS using Let's Encrypt
Alternatively you can use any commercial certificate authority. Ex: DigiCert, Entrust, Thawte, etc.
Internal Web Server
If the server is internal then an internal Certificate Authority will be needed.
- Identify the Certificate Authority (CA) - If you need to setup Microsoft Certificate Services the following links may help:
- If you don't have Active Directory - http://www.isaserver.org/img/upl/vpnkitbeta2/installstandaloneca.htm
- If you have Active Directory - http://www.isaserver.org/img/upl/vpnkitbeta2/installenterpriseca.htm
- Install the Certificate - Request and install a certificate for the website under which the application will run. See: How to Get a Certificate from an internal CA
- The certificate must be created for a website (ex: Default Web Site) not the virtual directory for the web application.
- A Bit length of 2048 is recommended.
- See this Microsoft KB article for more information: http://support.microsoft.com/kb/299875
IIS Configuration
Binding
Add an https site binding
- Select the Website that contains the web application (ex: Sites/Default Web Site)
- In the Actions pane, click Bindings...
- In the Site Bindings dialog click Add...
- Add https Binding
- Type: https:
- IP Address: All Unassigned
- Port: 443
- SSL certificate: Select the certification you installed
- Click OK
- Click Close
Service Endpoints
Make it so that web services can or must use HTTPS.
Edit service endpoints in web.config files for Adams Admin and Adams Web
- Open web.config
- Find <services>
- For each endpoint within each <service> do one of:
- For HTTPS access only: Edit “Http” in binding value to “Https”.
Ex: “basicHttpBinding” ➔ “basicHttpsBinding”; “mexHttpBinding” ➔ “mexHttpsBinding” - For both HTTP and HTTPS access: Add a copy all endpoints with “Http” in binding value and edit value to have Https.
Ex: Copy endpoint line and edit “basicHttpBinding” ➔ “basicHttpsBinding” – Use this if both HTTP and HTTPS will be used.
URL Rewrite
Redirect HTTP to HTTPS.
If HTTP is going to be blocked then this section can be skipped. What that means is that if HTTP is used the URL will be denied, not redirected to HTTPS.
- Install the URL Rewrite Module for IIS: http://www.iis.net/downloads/microsoft/url-rewrite
- Require SSL must not be checked for either Default Web Site or for any application (ex: AdamsAdmin, AdamsWeb, AdamsBridge, etc) under that. You can check the SSL Settings for each to see that it isn’t.
- Create the URL rewrite rules for the Default Web Site
- In IIS Manager select the Default Web Site
- In the IIS section, open the URL Rewrite module
NOTE: If the URL Rewrite module does not appear as an option after installing it, try closing and reopening IIS Manager. - Click Add Rule(s)…
- Select Inbound rules > Blank rule
- Select OK
- Fill in the following information
- Name - HTTP to HTTPS Redirect
- Match URL
- Requested URL - Matches the Pattern
- Using - Regular Expressions
- Pattern - (.*)
- Ignore case - checked
- Conditions
- Logical grouping: Match All
- Click Add…
- Condition input - {HTTPS}
- Check if input string - Matches the Pattern
- Pattern - ^OFF$
- Ignore case - checked
- Click OK
- Action
- Action type: Redirect
- Redirect URL: https://{HTTP_HOST}{REQUEST_URI}
- Append query string: un-checked
- Redirect type: Permanent (301)
- Click Apply (in the upper hand corner)
- Click Back to Rules
- Restart the web application pool