Support | Zephyr



How to: Integrate Zephyr Blueprint with Zephyr Enterprise/ Community Edition

Created on

Step 1. Check if Zephyr Enterprise/ Community Edition or Confluence is SSL Configured

 

1.1  Adding Java certificate to the Confluence server.

In order to make confluence SSL configured. Please follow the instructions given on the following link

https://confluence.atlassian.com/display/CONF51/Running+Confluence+Over+SSL+or+HTTPS

 

1.2  Add the SSL certificate to your zephyr instance

In order for successful integration between zephyr instance and confluence both the instances should be ssl configured. The instructions for making zephyr ssl configured are:

  1. Using JSSE to change HTTP to HTTPS

The following changes are made to server.xml file located at <Zephyr folder>/tomcat/config/

Locate the following section:

<!--

<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"

maxThreads="150" scheme="https" secure="true"

clientAuth="false" sslProtocol="TLS" />

-->

 

Once you locate the section, uncomment it. Then add the appropriate information to keyAlias, keystoreFile and

keystorePass.

 

The connector location will look like the following once the above lines are added and additional other highlighted

changes are made:

<Connector port="8443" protocol="org.apache.coyote.http11.Http11Protocol" SSLEnabled="true"

maxThreads="150" scheme="https" secure="true"

keyAlias="mycertalias" keystoreFile="conf/mycertstore.jks" keystorePass="changeit"

 

  1. Making changes to the jdbc.properties file in <Zephyr Root>/tomcat/webapps/flex/WEB-INF/classes/

 

This is the Zephyr file responsible for defining all the communication channels used by Zephyr and its clients. You will be converting non-secure to secure. The jdbc.properties file can only work with Java JKS certificate format.

 

3.Locate the following section:

# Needed by services-config.xml

secured=false

rtmp.port=2038

<!-- Provide correct keystore.file, keystore.password and keystore.alias if secured property is true-->

keystore.file=

keystore.password=

keystore.alias=

 

Make the following edits to it:

# Needed by services-config.xml

secured=true

rtmp.port=2099

<!-- Provide correct keystore.file, keystore.password and keystore.alias if secured property is true-->

keystore.file=c:/progra~1/zephyr/tomcat/conf/mycertstore.jks

 

 

Step 2: Configuring Application Link

 

Follow the steps listed on the documentation link given below

https://zephyrdocs.atlassian.net/wiki/display/ZBP/Zephyr+Enterprise+Edition

Please make sure to give the credentials of test manager of your zephyr instance in the Outgoing Authentication Window

 

 


Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request
Powered by Zendesk