...
Open port 80 (HTTP) in UFW to enable the Let’s Encrypt certbot domain-control-check.
Open port 443 in UFW to expose/enable HTTPS.
You must own and control a valid DNS domain,
for example,
agent86.yourcasdomain.commust resolve (to your CAS public IP).See below: Create an “A” record
The script will fail if you cannot supply a valid DNS domain. If the script fails for this reason, then:
add the domain (e.g.
agent86.yourcasdomain.com) to your DNS records, andrun
sudo certbot --nginxto try again.
The
/batm/config/hostnamefile must point to that valid domain to be used.The script will fail if this file is missing. If the file is missing:
create the file (with the correct contents),
restart CAS, and
run
install-reverse-proxyagain.
Disable version reporting in NGINX to improve security:
Edit the file:
/etc/nginx/nginx.confFind the line:
# server_tokens off;Delete the leading hashtag “
#" (only the hashtag) to disable version reporting.Test the configuration and restart NGINX:
sudo nginx -t && sudo systemctl reload nginx
...
Testing
URL path examples Enter one of the following testing URLs into a browser.
Examples (replace “agent86.yourcasdomain.com" with your actual domain):
Veriff example:
https://agent86.yourcasdomain.com/server/serverapi/apiv1/identity-check/veriffwh/lnurl example:
https://agent86.yourcasdomain.com/server/extensions/lnurl/
When properly configured, either URL should connect to their respective REST API
...
without errors.
Example of testing success in Chrome:
...
| Panel | ||
|---|---|---|
| ||
MANUAL INSTALLATION: |
...
| Note |
|---|
If you use a Cloudflare tunnel, do not conflict this DNS entry with the tunnel name. You do not need to use both NGINX and the cloudflared tunnel (they serve the same purpose) anyway.
|
...