Configuring TLS for Sametime mux on Docker and Podman
The following steps enable TLS for the Sametime mux, which overrides the default security with TLS 1.2 between Sametime Connect clients and the Sametime mux. For more details, see Securing connections between the Sametime mux and the Connect and Embedded clients.
The Docker and Podman commands are similar. The only difference is that docker precedes the command when issued in a Docker environment and podman precedes the name in a Podman environment. Example commands used in the Sametime documentation are shown using Docker. For Podman, change docker to podman.
-
Create a mux.env with the following setting and values appropriate for your configuration.
STI__Debug__VPMX_DISABLE_CONFIGURATION_UPDATE=1 STI__Debug__VPMX_PORT=1533 STI__Debug__VPMX_TLS_PORT=1533 STI__Config__VPMX_CAPACITY=20000 STI__Config__ST_TLS_KEY_STORE_TYPE=p12 STI__Config__ST_TLS_KEY_STORE_FILE=/local/sametimemuxdata/keystore.p12 STI__Config__ST_TLS_KEY_STORE_PASSWORD=keystore\_password STI__Config__ST_TLS_SECURITY_LEVEL=2
-
Add
mux.env
to the environment file variable in to themux
section of docker-compose.yml file.env file: -mux.env
-
Map the keyfile into the container
volumes: - ./keystore.p12:/local/sametimemuxdata/keystore.p12
-
Start the Sametime server to apply the changes.
docker compose up -d
Parent Topic: Securing connections between the Sametime mux and the Connect and Embedded clients