Strategy ONE
Configure Secure Communication Between the Export Engine and Intelligence Server
HTTPS is used to secure communication between the Export Engine service and Intelligence server.
Enable HTTPS
To enable HTTPS, you need to explicitly set the following property in application.properties of the Export Engine:
## Whether to enable HTTPS support. Default: false.
server.ssl.enabled=true
## Whether the value of server.ssl.key-store-password is encrypted. Default: false
password.encrypted=true
The following properties must be correctly configured with the HTTPS certificate:
## The keystore that contains a private key and a certificate chain. If HTTPS is enabled, this is required.
server.ssl.key-store=
## The keystore type. It must be either PKCS12 or JKS. Default: PKCS12.
server.ssl.key-store-type=PKCS12
## The keystore password. This is required to decrypt and read the keystore.
server.ssl.key-store-password=
## The key alias in the keystore. If HTTPS is enabled, this is required to find the corresponding key in the keystore.
server.ssl.key-alias=
- Open
application.propertieslocated in<install path>/Export. For example:- In Linux:
/opt/mstr/MicroStrategy/install/Export/ - In Windows:
C:\Program Files (x86)\MicroStrategy\Export\
- In Linux:
-
Add the following parameters to
application.properties:-
server.ssl.enabled- Set totrueto enable HTTPS. -
server.ssl.key-store- The correct path of the corresponding certificate. For example, /home/mstr/Desktop/HTTPS/xxxxx.p12. The administrator needs to pursue the right certificate to use. -
server.ssl.key-store-type- The value of this parameter (eitherPKCS12orJKS) must be consistent with the certificate type. The defautl value isPKCS12. -
server.ssl.key-store-password- If the password is not encrypted, the parameterpassword.encryptedis set tofalse. If you want to encrypt the password, the parameterpassword.encryptedmust be set totrue, and a tool must be used to get the encrypted password.In Linux:
- Run the command
./pdfexporter.sh encryptto generate an encrypted password. - Paste the output as the value of
server.ssl.key-store-passwordand setpassword.encryptedtotrue.
In Windows:
- Run
encryptor.batto generate an encrypted password. - Paste the output as the value of
server.ssl.key-store-passwordand setpassword.encryptedtotrue.
- Run the command
-
server.ssl.key-alias- When you set the alias of the key when generating the key, you need to fill in the alias. If you did not set it, you can comment this parameter.
-
-
Start the Export Engine service.
If the parameters are correctly configured, the Export Engine service starts normally. If the startup fails, check
NewExportEngine.logto troubleshoot. -
Enable HTTPS on the Intelligence server.
A new option is added to the registry under
[HKEY_LOCAL_MACHINE\SOFTWARE\MicroStrategy\DSS Server\PDFExporter]or[HKEY_LOCAL_MACHINE\SOFTWARE\WoW6432\MicroStrategy\DSS Server\PDFExporter].Key Default Value Type Description https0 DWORD (32-bit)If this is set to 1, HTTPS should be used instead of HTTP to communicate with the Export Engine. As Consul can only return an IP address and a port, no protocol is returned. The IntelligencesServer should read this value to decide whether HTTPS should be used. hostlocalhost
StringThe Intelligence server will try connecting to the Export Engine with this host name. If it does not exist, the Intelligence Server queries the Export Engine from Consul. This value should be the same as the certificate value.
port20100 DWORD (32-bit)The Intelligence server will try connecting to the Export Engine with this port number. If it does not exist, the Intelligence Server queries the Export Engine from Consul. ssl.ca.locationStringBundle of root CA certificates that the Intelligence server passes to cURL. It’s used to identify any HTTPS endpoints, including the Export Engine. -
Run a dashboard and export to PDF.
Confirm that the PDF export is successful. If export fails, check
NewExportEngine.logandDSSErrors.logto troubleshoot.
