Skip to end of metadata
Go to start of metadata

Only applicable to the BiZZdesign on-premise solution.

Team Server is now called HoriZZon Server. While the new name is being implemented in the software and on the Support pages, the old name may still be visible in places until the process is completed. See also Team Server is now HoriZZon Server.

The HoriZZon Server supports working with certificates issued by trusted certificate authorities. BiZZdesign has tested the HTTPS with a JKS and p12/pfx certificate.

To ensure your HoriZZon Server instance is using a certificate authority issued certificate, the following steps are needed as part of the HoriZZon Server configuration.

The settings mentioned in this topic are case sensitive. In case of debugging issues with HTTPS, please also check whether settings are spelled correctly.

Creating a keystore

The HoriZZon Server uses Java keystores to configure SSL certificates and keys. Usually, signing authorities provide instructions on how to create a Java keystore. If no such instruction was provided to you, please refer to the following page for instructions:

How do I create a keystore with an SSL certificate for the HoriZZon Server?

Once you have successfully created your keystore, you need to configure your HoriZZon Server instance to use this keystore.

Configuring the HTTPS port

To enable HTTPS, open the server.wrapper.conf file (HoriZZonServerHome\conf folder) in a text editor, locate the section that starts with # Java Additional Parameters, and do as follows:

  1. Disable the HTTP port by adding the following line: = -Dhttp.port=disabled

  2. Choose an HTTPS port you want the HoriZZon Server to run on: = -Dhttps.port=443

    Advised port number to use is 443.

    After choosing a port number, make sure that this port is also open in your firewall settings.

  3. Specify the path to the keystore containing the private key and certificate, if not provided, it will generate a keystore for you. = -Dplay.server.https.keyStore.path=D://LocationOfCertificate//keystorename.jks

    or = -Dplay.server.https.keyStore.path=D://LocationOfCertificate//keystorename.p12

  4. Enter the password of your certificate: = -Dplay.server.https.keyStore.password=MyPassword

  5. Specify the keystore type. Choose the JKS or PKCS12 certificate: = -Dplay.server.https.keyStoreType=JKS

    or = -Dplay.server.https.keyStoreType=PKCS12

  6. Save the changes and close the file.

Configuring the default teamServiceUrl

  1. Open the application.conf file (HoriZZonServerHome\conf folder), and replace the default URL by changing the value of http://localhost:9000 to your desired HTTPS URL. For example:


  2. Save the changes and close the file.

Stop and restart the HoriZZon Server after completing the above procedures. When opening the HoriZZon Server in your web browser, you should now correctly be directed to the sign-in page over HTTPS.

Testing the SSL functionality

To test the SSL functionality, an example of a BiZZdesign supplied certificate (of type JKS) is available: bizzdesigntest.jks

If you can run this example file successfully, you would only need to replace the keystore with a certificate issued by your Certificate Authority (CA). Make sure you have configured the teamServiceUrl in the application.conf file (as mentioned above) before you perform the test.

In your server.wrapper.conf file, refer to the downloaded test file, and then start the HoriZZon Server.

# Java Additional Parameters -Dconfig.file=${wrapper_home}/conf/application.conf -Dhttp.port=9000 = -Dhttp.port=disabled = -Dhttps.port=443 = -Dplay.server.https.keyStore.path=C://Keystore//bizzdesigntest.jks
#location of the keystore = -Dplay.server.https.keyStore.password=changeit
#password for the keystore is changeit = -Dplay.server.https.keyStoreType=JKS

When everything checks out, the HoriZZon Server will start up and listen on port 443. Please take note that the used example is a self-signed certificate. It will come up with a warning that it is unsafe, but it proves that the HTTPS settings are correct. If you get to this point, you would only need to have a valid JKS or P12 keystore.

Clicking the "Not secure" text (Chrome) or padlock icon (other browser) in the address bar will provide information about the certificate, similar to the example below.