You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/modules/webdav/pages/configuration.adoc
+19-57Lines changed: 19 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,77 +5,39 @@
5
5
6
6
To authenticate desktop applications, the server must have HTTPS enabled. Here are simple instructions for configuring HTTPS in your development environment.
7
7
8
-
[IMPORTANT]
9
-
====
10
-
Self-signed certificates are suitable solely for testing purposes. When running production applications, it's essential to utilize SSL certificates issued by a trusted authority.
11
-
====
8
+
[[trusted-certificate]]
9
+
=== Generating Trusted Certificate
10
+
11
+
Trusted certificates can be obtained from SSL certificate providers or generated with `certbot`. But for the development purposes you can issue your own root certificate and sign development server's certificate with it. To simplify this task, we recommend using the `mkcert` tool.
12
12
13
-
[[keystore-file]]
14
-
=== Creating a Keystore File
13
+
. Install `mkcert` by following the instructions provided in its repository: https://github.com/FiloSottile/mkcert[https://github.com/FiloSottile/mkcert^].
15
14
16
-
. Generate a keystore using the https://docs.oracle.com/en/java/javase/11/tools/keytool.html[keytool utility^] provided by JDK:
1. Press the `Windows` key + `R` to open the *Run* dialog, then type `"certmgr.msc"` and press *Enter*. This will open the *Certificate Manager*.
39
-
40
-
2. In the left pane of the *Certificate Manager*, expand the *Trusted Root Certification Authorities* folder.
41
-
42
-
3. Right-click on the folder and select *All Tasks > Import...* from the context menu. This will open the *Certificate Import Wizard*.
43
-
44
-
4. In the *Certificate Import Wizard*, click *Next* and then browse to the location where your certificate file is stored. Select the certificate file and click *Next*.
45
-
46
-
5. Choose the option to place the certificate in the *Trusted Root Certification Authorities* store and click *Next*.
47
-
48
-
6. Review the information and click *Finish* to complete the import process.
49
-
50
-
7. You should see a message indicating that the import was successful. Click *OK* to close the wizard.
38
+
Enter `changeit` as the source keystore password.
51
39
+
52
-
Once these steps are completed, the certificate should be registered as trusted in the Windows operating system.
53
-
* On macOS:
54
-
1. Double-click on `localhost.cer` file in Finder. The *Keychain Access* application will open.
55
-
2. Find your certificate under the name entered on the first step as "your first and last name" on the *Certificates* tab.
56
-
3. Double-click the certificate and select *Trust -> When using this certificate: Always Trust*.
57
-
58
-
=== Generate trusted certificate
59
-
60
-
Some use cases like opening WebDAV files in recent LibreOffice and Firefox versions may not work with self-signed certificates. Trusted
61
-
certificates can be obtained from SSL-providers or generated with `certbot`. But for the development purposes you can issue
62
-
your own root certificate and sign development server's certificate with it. To simplify this task we recommend to use
63
-
`mkcert` generation/maintenance tool. You can skip this section in case you are ok with HTTPS warnings and restrictions.
64
-
65
-
. Install `mkcert` from the following repo: https://github.com/FiloSottile/mkcert[https://github.com/FiloSottile/mkcert].
66
-
You can build it either from source (requires golang to be installed) and copy binary to `/usr/local/bin` or use binaries provided by vendor.
67
-
68
-
. Once having `mkcert` in path you can generate and install root certificate:
69
-
70
-
mkcert -install
71
-
72
-
. Navigate to keystore directory and create signed certificates for your development server:
73
-
74
-
mkcert -pkcs12 localhost 127.0.0.1 ::1
75
-
76
-
. Create `.jks` keystore file with certificates for your project:
Copy file name to clipboardExpand all lines: content/modules/webdav/pages/configuring-https.adoc
+37-47Lines changed: 37 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,56 +1,52 @@
1
-
= 3. Configuring to Work with Desktop Applications
1
+
= 3. Working with Desktop Applications
2
2
3
3
To authenticate desktop applications, the server must have HTTPS enabled. Here are simple instructions for configuring HTTPS in your development environment.
4
4
5
-
[IMPORTANT]
6
-
====
7
-
Self-signed certificates are suitable solely for testing purposes. When running production applications, it's essential to utilize SSL certificates issued by a trusted authority.
8
-
====
5
+
[[using-libreoffice]]
6
+
== Using LibreOffice
7
+
8
+
Install LibreOffice and configure the xref:webdav-properties.adoc#jmix.webdav.applications[jmix.webdav.applications] property to open all files in it:
. Generate a keystore using the https://docs.oracle.com/en/java/javase/11/tools/keytool.html[keytool utility^] provided by JDK:
22
+
. Install `mkcert` utility by following the instructions provided in its repository: https://github.com/FiloSottile/mkcert[https://github.com/FiloSottile/mkcert^].
1. Press the `Windows` key + `R` to open the *Run* dialog, then type `"certmgr.msc"` and press *Enter*. This will open the *Certificate Manager*.
36
-
37
-
2. In the left pane of the *Certificate Manager*, expand the *Trusted Root Certification Authorities* folder.
38
-
39
-
3. Right-click on the folder and select *All Tasks > Import...* from the context menu. This will open the *Certificate Import Wizard*.
40
-
41
-
4. In the *Certificate Import Wizard*, click *Next* and then browse to the location where your certificate file is stored. Select the certificate file and click *Next*.
42
-
43
-
5. Choose the option to place the certificate in the *Trusted Root Certification Authorities* store and click *Next*.
44
-
45
-
6. Review the information and click *Finish* to complete the import process.
46
-
47
-
7. You should see a message indicating that the import was successful. Click *OK* to close the wizard.
47
+
Enter `changeit` as the source keystore password.
48
48
+
49
-
Once these steps are completed, the certificate should be registered as trusted in the Windows operating system.
50
-
* On macOS:
51
-
1. Double-click on `localhost.cer` file in Finder. The *Keychain Access* application will open.
52
-
2. Find your certificate under the name entered on the first step as "your first and last name" on the *Certificates* tab.
53
-
3. Double-click the certificate and select *Trust -> When using this certificate: Always Trust*.
49
+
You will see the `localhost.jks` file in the current folder.
Desktop applications use basic authentication for server connections via WebDAV, so you have to set up HTTPS for your web application. Refer to the xref:configuration.adoc#https[Configuring HTTPS] section for guidance on configuring HTTPS on localhost for development purposes.
50
50
51
51
[[requirements]]
52
-
== Minimal Requirements
52
+
== Requirements
53
53
54
-
The minimum version of Microsoft Office needed to access documents via the WebDAV protocol is MS Office 2010 SP2 or higher. For LibreOffice, the minimum required version is 6.3.
54
+
IMPORTANT: Due to recently disabled Basic authentication in Microsoft 365 applications (see https://learn.microsoft.com/en-us/microsoft-365-apps/security/basic-authentication-prompts-blocked[^]), the WebDAV add-on cannot work with the latest versions of Microsoft Office.
55
+
56
+
The minimum version of Microsoft Office needed to access documents via the WebDAV protocol is MS Office 2010 SP2. For LibreOffice, the minimum required version is 6.3.
55
57
56
58
To verify the installed versions of Microsoft Office and Service Pack (SP) on your computer, open MS Word and navigate to the *Product Information* section via *File → Help*. Service Pack 2 for MS Office 2010 (and subsequent versions) should display the following number: 14.0.7015.1000 (or higher). To update your Service Pack, click on this https://www.microsoft.com/en-US/download/details.aspx?id=39667[link^].
Copy file name to clipboardExpand all lines: content/modules/webdav/pages/view-with-webdav-documents.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,5 +99,5 @@ In this section, you have created the basic feature of the application: a knowle
99
99
100
100
You have learned that:
101
101
102
-
* The WebDAV add-on offers the `WebdavDocument` entity, which represents a document within the WebDAV functionality. This entity facilitates editing and viewing documents using external applications such as Microsoft Word and Excel, managing document versions, and controlling access to specific documents.
102
+
* The WebDAV add-on offers the `WebdavDocument` entity, which represents a document within the WebDAV functionality. This entity facilitates editing and viewing documents using external applications, managing document versions, and controlling access to specific documents.
103
103
* The xref:flow-ui:vc/components/entityPicker.adoc[entityPicker] component is used by default to select a reference in a generated detail view. Clicking the ellipsis button for the *WebDAV document* field will open the standard xref:webdav:webdav-documents.adoc[WebDAV documents view] provided by the add-on.
0 commit comments