Having issue with our Importer utility for Zephyr for Jira Cloud.Please click here for the steps to resolve the issue. If you are not able to access Capture Cloud and seeing a message, it means your Capture cloud instance is not migrated as part of our GDPR and Atlassian privacy policy. Please click here for the steps to Migrate your Capture Cloud instance to use Capture.
Support | Zephyr

How to: Integrate Zephyr Blueprint with Zephyr Enterprise/ Community Edition

Created on

Step 1. Check if Zephyr Enterprise/ Community Edition or Confluence is SSL Configured


1.1  Adding Java certificate to the Confluence server.

In order to make confluence SSL configured. Please follow the instructions given on the following link



1.2  Add the SSL certificate to your zephyr instance

In order for successful integration between zephyr instance and confluence both the instances should be ssl configured. The instructions for making zephyr ssl configured are:

  1. Using JSSE to change HTTP to HTTPS

The following changes are made to server.xml file located at <Zephyr folder>/tomcat/config/

Locate the following section:


<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"

maxThreads="150" scheme="https" secure="true"

clientAuth="false" sslProtocol="TLS" />



Once you locate the section, uncomment it. Then add the appropriate information to keyAlias, keystoreFile and



The connector location will look like the following once the above lines are added and additional other highlighted

changes are made:

<Connector port="8443" protocol="org.apache.coyote.http11.Http11Protocol" SSLEnabled="true"

maxThreads="150" scheme="https" secure="true"

keyAlias="mycertalias" keystoreFile="conf/mycertstore.jks" keystorePass="changeit"


  1. Making changes to the jdbc.properties file in <Zephyr Root>/tomcat/webapps/flex/WEB-INF/classes/


This is the Zephyr file responsible for defining all the communication channels used by Zephyr and its clients. You will be converting non-secure to secure. The jdbc.properties file can only work with Java JKS certificate format.


3.Locate the following section:

# Needed by services-config.xml



<!-- Provide correct keystore.file, keystore.password and keystore.alias if secured property is true-->





Make the following edits to it:

# Needed by services-config.xml



<!-- Provide correct keystore.file, keystore.password and keystore.alias if secured property is true-->




Step 2: Configuring Application Link


Follow the steps listed on the documentation link given below


Please make sure to give the credentials of test manager of your zephyr instance in the Outgoing Authentication Window



Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request
Powered by Zendesk