Configuring the SSL Certificate for Tomcat Server

To configure SSL on the Tomcat server for the Command Center, Web Console, or Compliance Search, you must create a certificate and then configure the SSL connector.

Before You Begin

  • Create a Certificate.


    Self-signed certificates are automatically created and installed by the Commvault software. If you use a self-signed certificate, users will see a warning in the browser indicating that it is not safe to proceed.

  • If you use a Custom Report Engine and you want to configure SSL on a port other than 443, you must add the customreportengineurl additional setting. For more information, see Configuring an Alternate Port for SSL for the Custom Report Engine.

  • To support stronger encryption when establishing the SSL connection, add the Djdk.tls.ephemeralDHKeySize=2048 setting to the startup option of the Tomcat service. This setting is enabled by default on Command Center, Web Console, and Compliance Search computers that are installed with Version 11 SP9 or later service packs.

Where to Perform This Task

  • For Command Center, perform this task on the Command Center computer.

  • For Web Console, perform this task on the Web Console computer.

  • For Compliance Search, perform this task on the Compliance Search computer.


  1. Stop the Tomcat Server.

  2. Go to software_installation_path/Apache/Conf, and then back up the server.xml file that is part of the Apache configuration.

  3. Copy the generated keystore file to software_installation_path/Apache.

  4. For new installations of Version 11 SP9 or higher, in the server.xml file, modify the path to the generated keystore file and the keystore password values:

    <Certificate certificateKeystoreFile="software_installation_path/Apache/your_file" certificateKeystorePassword="Password" certificateKeystoreType="JKS"/>


    • certificateKeystoreFile is the path to your keystore file. You can use the .jks keystore file and set the certificateKeystoreType to JKS. You can also use the .pfx,.p12 or .p7b keystore files and set certificateKeystoreType to PKCS12.

    • certificateKeystorePassword is the password that you used to create the keystore or certificate.

    For configuration on SP8 or earlier installations, refer to the corresponding service pack version documentation.

  5. In the server.xml file Connector element associated with port 443, keep the following up to date:

    • SSL protocols: Update the SSLHostConfig element protocols attribute (enable TLSv1.2 and higher).

    • Ciphers: Update the SSLHostConfig element ciphers attribute according to your corporate security policy. For a list of ciphers that are considered reasonably secure at this time, see Ciphers for the SSL Connector for Tomcat Server.

      <SSLHostConfig certificateVerification="none" honorCipherOrder="true" protocols="TLSv1.2" ciphers="TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA">
  6. Additional configurations for the Web Console:

  7. Start the Tomcat Server and access the resource on your server using HTTPS.

    For instructions on restarting the Tomcat service, see Restarting a Service.

What to Do Next

For Compliance Search, configure HTTPS for the Compliance Search Link from the Web Console.