| Version | Date | Notes | By |
|---|---|---|---|
| 0.2 | 2019-06-11 | Added: Convert .pfx file to RSA. Known issues | JTO |
| 0.1 | 2019-01-01 | Initial commit | JFM |
This documents contains some extra information about configuring the application with IIS
This is usefull when you have to add a diferent Access Control Allow Origin besides the one that's handled automatically with laravel
<rewrite>
<outboundRules>
<rule name="Enable CORS for Fonts">
<match serverVariable="RESPONSE_Access_Control_Allow_Origin" pattern=".*" />
<conditions>
<add input="{REQUEST_URI}" pattern="^[^\?]+\.(ttf|otf|eot|woff|woff2|svg)(\?.*)?$" />
</conditions>
<action type="Rewrite" value="*" />
</rule>
</outboundRules>
</rewrite>
https://stackoverflow.com/questions/39647732/enabling-cors-on-iis-for-only-font-files
https://kamranicus.com/posts/2016-03-06-cors-multiple-origins-iis
On the Start search for certmgr (Manage Computer Certificates)
Right-click the certificate to export and select All Tasks > Export.
Choose Yes, export the private key and include all certificates in certificate path if possible. Warning: Do not select the delete private key option.
Leave the default settings and then enter your password.
Choose to save the file and then click Finish. You should receive an "export successful" message. The .pfx file is now saved to the location you selected.
First we need to download and install OpenSSL for windows http://www.slproweb.com/products/Win32OpenSSL.html.
After the installation open command prompt in administrator mode and navigate to where you installed OpenSSL
We can extract the private key form a PFX to a PEM file with this command (replace filename.pfx for the location and filename where the .pfx file was exported):
Exporting the certificate only:
Removing the password from the extracted private key:
Copy the files to "C:
Alter the laravel-echo-server.json to the following:
"protocol": "https",
"sslCertPath": "C:<Application-Backend-Directory>\\storage\\certificates\\certificate.pem",
"sslKeyPath": "C:<Application-Backend-Directory>\\storage\\certificates\\private.key",
"verifyAuthPath": true,
"verifyAuthServer": false
Solution: