For client systems to be able to communicate with the CAS server, the TCP port that Tomcat’s HTTPS connector was configured to use earlier (see Enable and configure the HTTPS connector) must be opened in the operating system firewall. To do this, first create a firewalld
service configuration file called /etc/firewalld/services/tomcat-https.xml
with the following contents:
<?xml version="1.0" encoding="utf-8"?>
<service>
<short>Tomcat Secure HTTP (HTTPS)</short>
<description>Tomcat typically implements TLS/SSL-secured HTTP (HTTPS) on a different port than a regular web server does (often so that both servers can co-exist on the same system).</description>
<port protocol="tcp" port="8443"/>
</service>
to define the Tomcat HTTPS service. Then, run the commands
casdev-master# restorecon /etc/firewalld/services/tomcat-https.xml
casdev-master# chmod 640 /etc/firewalld/services/tomcat-https.xml
to assign the correct SELinux context and file permissions to the tomcat-https.xml
file. Finally, run the commands
casdev-master# firewall-cmd --zone=public --add-service=tomcat-https --permanent
success
casdev-master# firewall-cmd --reload
success
casdev-master#
to open the newly-defined service in the system firewall.
The steps above should be performed on the master build server (casdev-master); the results will be copied to the CAS servers (casdev-srv01, casdev-srv02, and casdev-srv03) later.