Revision as of 12:50, September 8, 2016 by Priyam (talk | contribs)
Jump to: navigation, search

Start SIP Feature Server

To start and verify SIP Feature Server:

Warning
Do not start Feature Server until you have set the configuration options replicationStrategyClassName and replicationOptions. See Cassandra options.
  1. To run Feature Server in secure (https) mode:
    • Open the start.ini file and uncomment etc/jetty-ssl.xml
    • In the IVR Profile, set initial-page-url = https://Feature Server IP address or host name:8443/fs
  2. Use Genesys Administrator, not the command line, to start SIP Feature Server. If you are running more than one Feature Server, start the Master first.
  3. In Genesys Administrator, verify that the Feature Server is running.
  4. Verify that the GAX interface is running by logging in as the Default administrator (in other words, the Default user in Configuration Server):
    GAX IP address:port/gax
  5. At this point, only the Default administrator can log into the Feature Server GAX interface. To enable other users to log in as administrators, assign the Administrator role to them.

Jetty Support

HTTP Configuration

  • In the command section of the launcher.xml file, add:
    jetty.port=8080
  • Comment default value for http port. Default value should be used from launcher.xml file:
    ## HTTP port to listen on
    #jetty.port=8080

HTTPS Configuration

  • In the command section of the launcher.xml file, add:
    https.port=8443
  • To enable https module, add the following to start.ini file:
    # Module: https
    --module=https
  • To add HTTPS idle timeout:
    # HTTPS idle timeout in milliseconds
    https.timeout=30000
  • To enable ssl module:
    # Module: ssl
    --module=ssl
  • To specify keystore and truststore:
    ## Setup a demonstration keystore and truststore
    jetty.keystore=etc/keystore
    jetty.truststore=etc/keystore
  • To specify passwords for keystore, keymanager, and truststore:
    File $FS_HOME/start.ini contains Secure Password Obfuscation for:
    jetty.keystore.password=OBF:1f2o1x0r1z0f1z0f1x1v1f1q
    jetty.keymanager.password=OBF:1f2o1x0r1z0f1z0f1x1v1f1q
    jetty.truststore.password=OBF:1f2o1x0r1z0f1z0f1x1v1f1q
  • Configuration certificates in Jetty 9
    • Configuring SSL in Jetty 9:
    Configuring SSL
    • Configuring Jetty SslContextFactory:
    Configuring Jetty SslContextFactory
    • Generating a CSR with keytool:
    Generating a CSR with keytool
    • Loading Keys and Certificates via PKCS12:
    Loading Keys and Certificates via PKCS12
Comments or questions about this documentation? Contact us for support!