Admin guide
By default, the Jami Account Management Server (JAMS) runs an embedded Apache Tomcat server visible on port 8080. However, this is impractical for many reasons. This guide is designed to help with setting up a JAMS to run in a production environment.
JAMS and Nginx
It is generally not recommended to expose JAMS directly to the outside world. JAMS is required to run in SSL mode. It is recommended to place JAMS behind an Nginx or similar web server. The Nginx, or similar, web server would proxy requests between the outside world and JAMS.
Below is an example map of how the JAMS could be configured behind an Nginx server. The process would be similar if any other type of proxy solution is used.
The IP 10.10.0.1 is random and should be seen as an example.
Typically a new site called jams-site.conf
would be added to the Nginx configuration.
It would contain the following entries if an SSL certificate was placed at the Nginx level:
server { listen 443 ssl; listen [::]:443 ssl; ssl on; ssl_certificate /etc/certificates/mycertificate.pem ssl_certificate_key /etc/certificates/mycertificatekey.pem ssl_client_certificate /jams/installation/path/CA.pem; ssl_verify_client optional; ssl_verify_depth 2; client_max_body_size 100M; server_name jams.mycompany.com; location / { # Block client-supplied headers that could be used to spoof if ($http_x_client_cert) { return 400; } proxy_pass http://10.10.0.1:8080/; proxy_set_header X-Real-IP $remote_addr; proxy_set_header Host $http_host; proxy_set_header X-Client-Cert $ssl_client_escaped_cert; } }
This is the preferred setup method by most admins, as local traffic is usually run unencrypted since it is usually either an inter-VM connection, a VLAN, or another dedicated link.
[!NOTE]
Since the CA is generated during the JAMS initial configuration, Nginx needs to be restarted once the initial setup is completed.
Troubleshooting and resetting
If a restart from 0 (i.e., reset everything and drop existing data) is required, delete the following files in the distribution folder (<project-root-folder>/jams
):
The internal JAMS folder: <project-root-folder>/jams/jams derby.log oauth.key oauth.pub config.json
This will reset the server to its original state, and the configuration wizard is able to be run again. Before performing this operation, please ensure that the server is shut down.
Running JAMS as a GNU/Linux Service
Running JAMS as a GNU/Linux Service is fairly straightforward with systemd—simply create a service unit file with the following structure:
[Unit] Description=JAMS Server [Service] Type=simple WorkingDirectory=[DIRECTORY WHERE JAMS WAS UNZIPPED] ExecStart=/usr/bin/java -jar [DIRECTORY WHERE JAMS WAS UNZIPPED]/jams-launcher.jar PORT SSL_CERTIFICATE SSL_CERTIFICATE_KEY [Install] WantedBy=multi-user.target
The parameters PORT, SSL_CERTIFICATE and SSL_CERTIFICATE_KEY are optional (however, PORT can be used alone, whereas the SSL_CERTIFICATE comes in a pair with SSL_CERTIFICATE_KEY).
Running JAMS as a Windows Service
A. Download and install JAMS
Visit https://jami.biz/ and download JAMS.
Extract JAMS to C:\jams
B. Download and install Java Development Kit (JDK)
Download JDK 11 from https://www.oracle.com/java/technologies/javase-jdk11-downloads.html (choose the corresponding VM architecture).
Install it using the installation wizard.
C. Download OpenSSL to generate a key and a certificate
Download the OpenSSL Binary Distributions for Microsoft Windows from https://kb.firedaemon.com/support/solutions/articles/4000121705. Alternatively, select another OpenSSL binary.
Once downloaded, extract it to
C:\openssl
.Create a
bin
folder inside, i.e.,C:\openssl\bin
.Create a new file inside the
bin
folder namedopenssl.cnf
(make sure that the file extension is.cnd
and not.cnd.txt
).Copy and paste the default configuration below from http://www.flatmtn.com/article/setting-openssl-create-certificates.html.
# # OpenSSL configuration file. # # Establish working directory. dir = . [ca] default_ca = CA_default [CA_default] serial = $dir/serial database = $dir/certindex.txt new_certs_dir = $dir/certs certificate = $dir/cacert.pem private_key = $dir/private/cakey.pem default_days = 365 default_md = md5 preserve = no email_in_dn = no nameopt = default_ca certopt = default_ca policy = policy_match [policy_match] countryName = match stateOrProvinceName = match organizationName = match organizationalUnitName = optional commonName = supplied emailAddress = optional [req] default_bits = 1024 # Size of keys default_keyfile = key.pem # Name of generated keys default_md = md5 # Message digest algorithm string_mask = nombstr # Permitted characters distinguished_name = req_distinguished_name req_extensions = v3_req [req_distinguished_name] # Variable name Prompt string #------------------------- ---------------------------------- 0.organizationName = Organization Name (company) organizationalUnitName = Organizational Unit Name (department, division) emailAddress = Email Address emailAddress_max = 40 localityName = Locality Name (city, district) stateOrProvinceName = State or Province Name (full name) countryName = Country Name (2 letter code) countryName_min = 2 countryName_max = 2 commonName = Common Name (hostname, IP, or username) commonName_max = 64 # Default values for the above, for consistency and less typing. # Variable name Value ------------------------ ------------------------------ 0.organizationName_default = My Company localityName_default = My Town stateOrProvinceName_default = State or Province countryName_default = US [ v3_ca ] basicConstraints = CA:TRUE subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer:always [ v3_req ] basicConstraints = CA:FALSE subjectKeyIdentifier = hash
D. Add OpenSSL to System Environment Variables
Go to Edit the system environment variables → Environment Variables.
In System variables, edit Path and add C:\openssl\
.
E. Configure OpenSSL
Open the Command Prompt.
Execute the following command to set the path to the OpenSSL configuration file.
set OPENSSL_CONF=C:\openssl\bin\openssl.cnf
Type
cd C:\jams
To generate the Key and Certificate, type:
openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout server.key -out server.pem
Follow the wizard.
Once the key and certificate are generated, type
dir
. The output should look like:
C:\jams>dir
Volume in drive C has no label.
Volume Serial Number is BC94-9EF2
Directory of C:\jams
2020-11-10 12:38 PM <DIR> .
2020-11-10 12:38 PM <DIR> ..
2020-10-22 10:56 AM 5,186,016 jams-launcher.jar
2020-10-22 10:56 AM 33,413,882 jams-server.jar
2020-11-10 11:53 AM <DIR> libs
2020-11-10 12:34 PM 1,732 server.key
2020-11-10 12:38 PM 1,336 server.pem
2020-10-22 04:05 PM 2,047,932 userguide.pdf
5 File(s) 40,650,898 bytes
3 Dir(s) 93,365,936,128 bytes free
Execute the following command to start JAMS:
java -jar jams-launcher.jar PORT_NUMBER (eg. 8443 or 443) server.pem server.key
Open a navigator on the server and visit https://localhost:443 or https://localhost:8443 to validate that JAMS is working.
Type CTRL+C to close the application.
F. Expose the localhost to the Internet
Click on Windows and search for Windows Defender Firewall with Advanced Security.
Right-click Inbound Rules and click New Rule…
Select Port, click Next.
Specify the port to use, for example, 443 or 8443, and click Next.
Select Allow the connection and click Next.
Leave Domain Private and Public unchanged, and click Next.
Name the rule JAMS Inbound and click Finish.
Right-click on Outbound Rules and click New Rule…
Select Port, click Next.
Specify the port to use, for example, 443 or 8443, and click Next.
Select Allow the connection and click Next.
Leave Domain Private and Public unchanged, and click Next.
Name the rule JAMS Outbound and click Finish.
The localhost is now available on the Internet. The application can now be visited through the server domain name or IP address on port 443 or 8443.
G. Create a JAMS Windows Service (Embed Tomcat Server Windows Service) to start JAMS with the server
In order to create a JAMS Windows Service, the NSSM (the Non-Sucking Service Manager) can be used. NSSM is available at http://nssm.cc/download and https://github.com/kirillkovalenko/nssm.
Once NSSM has successfully downloaded, open a Command Prompt and change the directory to:
nssm-2.24\win64
To install and open a graphical user interface (GUI), type:
nssm.exe install JAMS
In the Path field, specify the path to the Java executable, for example:
"C:\Program Files\Common Files\Oracle\Java\javapath\java.exe"
In the Startup directory, for the installation folder path, type:
"C:\jams"
In the last field, add the following arguments:
-classpath "C:\jams" -jar jams-launcher.jar PORT_NUMBER server.pem server.key
where PORT_NUMBER is the port number to use to serve the application, for example, 443 or 8443.
Now the JAMS application will start with the server.
Source: https://medium.com/@lk.snatch/jar-file-as-windows-service-bonus-jar-to-exe-1b7b179053e4