You are here: Administrator's Guide > Securing FME Server > Securing FME Server and Applications/Services > Configuring for HTTPS

Configuring for HTTPS

HTTPS ensures that communication between the client and server is encrypted, so that if it is intercepted, the third party cannot easily view or use the information. For FME Server, you can use HTTPS to ensure that sensitive log in information is not exposed. This is especially important if you are using the Active Directory integration.

Enabling FME Server SSL Support

To enable SSL support:

  1. Modifying Service URLs to Use HTTPS
  2. Enable SSL on the Web and/or Application Server
  3. Enable SSL on the WebSocket Server
  4. Verify the Configuration

Modifying Service URLs to Use HTTPS

To enable SSL for a service, open the FME Server Web User Interface, select Manage > Administration > Services, and click the desired service in the table.

The Editing Service page opens.

In the URL Pattern field, change HTTP to HTTPS, and modify the port number, if required. Typically SSL is configured on either port 8443 or 443.

Enable SSL on the Web and/or Application Server

Depending on the method, instructions to set up SSL on different application servers vary. The following example provides steps for setting up SSL for Apache Tomcat 7, which is the application server included with an express installation of FME Server.

For any HTTPS (SSL) page, a certificate is required. For development and testing purposes, self-signed certificates are supported. For production use, we recommend that you use SSL certificates from a verified SSL certificate authority (CA).

First, you must generate a keystore that contains a certificate chain using the keytool command from the Java Developer Kit (JDK).

Note: To ensure the security of the keystore file, allow access to it only by users who run the FME Server Services, and select users with administrative privileges on FME Server.

  1. Open the command prompt.
  2. Type the following command:

    keytool -genkey -alias tomcat -keyalg RSA

    -keystore <your_keystore_filename>

    If your path is not set to the Java bin directory, navigate to that directory and type the appropriate command.

    Note: A JDK must be installed to use the keytool command.

    A message prompts you to enter a keystore password.

  3. Enter a password for the keystore.

  4. Enter the required details, shown here:

    Note: (CA-issued certificates only): Answer "What is your first and last name?" with the server domain name; for example, "".

  5. Enter the same password you entered in step 3.

    A keystore is generated in the following location:


  6. (CA-issued certificates only)

    1. Generate a certificate signing request (CSR):

    2. keytool -certreq -keyalg RSA -alias tomcat -file certreq.csr

      -keystore <your_keystore_filename>

    3. Submit the CSR (certreq.scr) to your CA to obtain a certificate, according to your CA's instructions.

    4. Import the certificate into the keystore. Depending on the web application server, you may also need to import a root certificate (consult your web application or CA's instructions).

    5. keytool -import -alias root -keystore <your_keystore_filename>

      -trustcacerts -file <chain_certificate_filename>

      keytool -import -alias tomcat -keystore <your_keystore_filename>

      -file <certificate_filename>

  7. Copy the .keystore file to the Tomcat directory, and then copy the path to the file.

    If you are using the default web application included with FME Server, Tomcat is located at:

    <FME Server Install DIR>\Utilities\tomcat

  8. Open the server.xml file:


  9. Locate the Connector code block, and replace it with the following:

    <Connector protocol="org.apache.coyote.http11.Http11Protocol"

    port="443" minSpareThreads="5"

    enableLookups="true" disableUploadTimeout="true"

    acceptCount="100" maxThreads="200"

    scheme="https" secure="true" SSLEnabled="true"

    keystoreFile="C:\Program Files\FMEServer\Utilities\tomcat\.keystore"


    clientAuth="false" sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2"


    URIEncoding="UTF8" />

    <Connector port="80" protocol="HTTP/1.1"


    Note: The sslEnabledProtocols and ciphers parameters disallow SSL v3 and ciphers that are considered unsafe. However, these modifications break SSL compatibility with Internet Explorer 6, and may cause unexpected behavior with Java Runtime Environment Version 6.0 Update 45 (Java 6u45). For more information, see

    Note: The values for cipher specified above are compatible with Java v8, which is included with FME Server 2015.1.2 and later. For FME Server versions earlier than 2015.1.2, specify these ciphers instead, compatible with Java v7: "TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
    . Note that these ciphers have a higher strength rating than those provided in previous versions of the FME Server documentation.

  10. Be sure to set the keystoreFile path to the correct location and the keystorePass to the password you entered in step 3. Also, if you configured the FME Server Service URLs to use a port other than 443, that port number must be corrected in the port and redirectPort directives.
  11. Change the Listener className line (found near the beginning of the file) to how it is written below:

    <Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine='off'/>

  12. Save the server.xml file.
  13. Open the web.xml file:


  14. Add the following code block to the end of the file, just before the closing </web-app> tag:
  15. <security-constraint>









  16. Save the web.xml file.
  17. If you are using the default FME Server Application Server, restart that service. Or, if you are using your own Tomcat application, restart that.
  18. Open a browser and navigate to https://localhost:<port>. If you used the same port as specified in Step 9, <port> is 443.

    This should show you the same Tomcat home page, but in a secured format.

  19. (Self-signed certificates only) On the machine that hosts the FME Server Core, run the following JDK keytool command from the command prompt:
  20. keytool -import -v -trustcacerts -alias server-alias -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file <your self-signed certificate> -keypass <key password> -storepass <keystore password>

    This command imports the untrusted certificate into the FME Server database and instructs the web application server to make an exception for it.

Enable SSL on the WebSocket Server

The FME Server WebSocket server supports insecure or secure connections. (Only one or the other protocol is currently supported). To enable SSL, edit the fmeWebSocketConfig.txt file in your server installation (<FMEServerDir>\Server).

  2. Uncomment the WEBSOCKET_KEYSTORE_FILE_PATH directive and set it to reference the keystore file you generated under Enable SSL on the Web and/or Application Server. For example:
  3. WEBSOCKET_KEYSTORE_FILE_PATH=/data/fmeserver/Utilities/tomcat/keystore.jks

  4. Specify the same settings for the WEBSOCKET_ENABLE_SSL, WEBSOCKET_KEYSTORE_FILE_PATH, and WEBSOCKET_KEYSTORE_FILE_PASSWORD directives in the following files:
    • <FMEServerDir>\Server\config\subscribers\
    • <FMEServerDir>\Server\config\publishers\

Enable SSL on the WebSocket Publisher and WebSocket Subscriber

To enable SSL on the Notification Service WebSocket Publisher and WebSocket Subscriber, update the value property of the PROPERTY directive from "ws://localhost:7078/websocket" to "wss://localhost:7078/websocket" in the following files:

  • <FMEServerDir>\Resources\publishers\websocket\publisherProperties.xml
  • <FMEServerDir>\Resources\subscribers\websocket\subscriberProperties.xml

Verify the Configuration

To verify that HTTPS is configured properly, perform the relevant checks here, including confirmation that the web services are available, and confirmation that FME Server can run a job.

See Also