Loading...
 

History: How to install Openfire Meetings on ClearOS

Preview of version: 21

How to install Openfire Meetings on ClearOS


Openfire 4.x and ClearOS 7.x

Background


ClearOS is an operating system for your Server, Network, and Gateway systems. It is designed for homes, small to medium businesses, and distributed environments. ClearOS is commonly known as the Next Generation Small Business Server, while including indispensable Gateway and Networking functionality. It delivers a powerful IT solution with an elegant user interface that is completely web-based. Simply put.. ClearOS is the new way of delivering IT. Source: https://www.clearos.com/

Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License. It uses the only widely adopted open protocol for instant messaging, XMPP (also called Jabber). Openfire is incredibly easy to setup and administer, but offers rock-solid security and performance. Source: http://www.igniterealtime.org/projects/openfire/index.jsp

Openfire Meetings is an Openfire plugin that uses WebRTC and the Jitsi Videobridge to provide high quality, scalable video conferences for your Openfire users.You will also need the Openfire Meetings Chrome extension for screen sharing, co-browsing and application sharing. Source: https://www.igniterealtime.org/projects/openfire/plugins/ofmeet/readme.html

The Openfire Fastpath Plugin adds support for managed queued chat requests, such as a support team might use. For example, a web based "Live Support" interface can point a potential customer at a workgroup representing the Sales team. Members of that workgroup will receive notification that a someone is waiting and when someone from that workgroup accepts, the customer and the team member will be connected to communicate with each other.

Information


To install Install Openfire on ClearOS within the WikiSuite environment follow the next steps.

1.- Install a fresh ClearOS Server, be sure to run the latest Software updates to the core system and include in the installation of:

a. The Web Server
b. Software Repository Modules
c. and Open LDAP and Directory Server

If not already installed, you may do so through the Webconfig-Market Place Module (https://your-ip-address:81/app/marketplace).

2.- Using Software Repository Module, make sure the clearos-epel, clearos-centos and clearos-centos-updates repositories are enable.

3

Configure OpenLDAP


1.-Through the Webconfig-Open LDAP Directory Server Module (https://your-ip-address:81/app/openldap_directory).

10

2.-On the Directory Server Settings page set the server mode and Base Domain (https://your-ip-address:81/app/openldap_directory/settings/edit)

10.5

3.-On the Directory Server Policies page set the Publish Policy and Accounts access according to your requirements (https://your-ip-address:81/app/openldap_directory/policies/edit)

12

4.-Don't forget to create one or two users as they will be use in the Openfire configuration phase.

Install Openfire


1.-Login to your ClearOS via SSH using root

2.-Install the Openfire RPM

Type:

rpm -ivh http://www.igniterealtime.org/downloadServlet?filename=openfire/openfire-4.0.0-1.i386.rpm

1

For Openfire to work on ClearOS 64-bit the 32-bit zlib library is required.
Source: https://community.igniterealtime.org/thread/43673

Type:

yum install zlib.i686

5a

5b

3.- Start the Openfire service:

Type:

/etc/init.d/openfire start

And check the status

/etc/init.d/openfire status

24

Configure Openfire


Use a web browser to connect to the admin console. The default port for the web-based admin console is 9090. If you are on the same machine as Openfire, the following URL will usually work: http://127.0.0.1:9090. Initial setup and administration can also be done from a remote computer using LAN IP address instead or hostname if it is resolvable by the remote computer. i.e. https://your-ip-address:9090. Source: http://www.igniterealtime.org/builds/openfire/docs/latest/documentation/install-guide.html

1.-The first screen will request you to choose your preferred language and press continue.

4

2.-Type your host domain and press continue

6

3.-Select to use the Embedded Database and press continue

8

4.-Choose "Directory Server (LDAP)" as the user and group system to use with the server and press continue.

9

5.-Configure the connection settings for your LDAP directory and press "Test Settings"

13

6.-Once the test has been successful press "Save and Continue"

14

7.-Configure how the server finds and loads users from your LDAP directory and press "Test Settings"

15b

8.-Once the test has been successful press "Save and Continue"

15c

9.-Configure how the server finds and loads groups from your LDAP directory and press "Test Settings"

16

11.-Once the test has been successful press "Save and Continue"

16a

12.-Choose one or more users from your LDAP directory to be administrators by entering their usernames. Press "Save and Continue"

17

13.-Setup is complete! Click on "Login to Admin Console"

18

14.-Log in to the Admin Console.

19

19a

20

Install Openfire Meetings Plugin


1.- Login to your Openfire Admin Console with a administrator user.

2.- Click on the Plugins Tab to manage Plugins

20

3.- Click on the available plugins link and scroll down to find the Openfire Meetings plugin

21

4.- Click on then ¨+¨ to add the plugin to the Openfire server

22

Source: http://www.igniterealtime.org/projects/openfire/plugins/ofmeet/readme.html

Install Openfire Fastpath plugin


(please add documentation)


Here is a live example: http://avan.tech/Fastpath
and some notes from Guus (keep or delete what you think)

For future reference: the snippet is provided on the Openfire Admin Console (Fastpath - Workgroup Manager - Workgroup Settings - Text)

I have made jivelive.jsp available on http://evoludata.com:9090/webchat/jivelive.jsp - perhaps you'll need to edit the snippet above, if you're redirecting access to that resource through a reversed proxy.

There's a simple landing page here: http://evoludata.com:9090/webchat/

Adding admins



1.-There is no ClearOS group for the Openfire admins. Instead: Edit server properties: https://example.org:9091/server-properties.jsp

25

2.- Find the admin.authorizedJIDs property, edit it and add comma separated full JIDs. In our specific case user at example.org. "Click on Save Property"

26

3.- Openfire needs a restart, Login to your ClearOS via SSH using root and type:

service openfire restart


Configure SSL


As of Openfire 3.2 certificate management can be performed from the Admin Console.

Once the setup process is completed Openfire will create self-signed certificates for the assigned Openfire's domain. Most users should either get the created certificates signed by a Certificate Authority or replace the created certificates with your own certificates. Source: http://www.igniterealtime.com/builds/openfire/docs/latest/documentation/ssl-guide.html


27

  • Manage the existing certificates in the Openfire Identity Certificate Store


27a

  • Import Private Key and Certificate


27c

Advanced configuration

alias

History

Advanced
Information Version
charles.robert 35
View
Marc Laporte 34
View
Marc Laporte 33
View
Marc Laporte 32
View
luis.lucio 31
View
System Administrator 30
View
System Administrator 29
View
System Administrator 28
View
System Administrator 27
View
System Administrator 26
View
System Administrator 25
View
System Administrator ClearOS is not accessible locally so remove confusion 24
View
System Administrator 23
View
System Administrator 22
View
System Administrator 21
View
System Administrator 20
View
System Administrator Fixing some typos and adding info about Fastpath 19
View
System Administrator 18
View
System Administrator 17
View
System Administrator 16
View
luis.lucio Added SSL configuration 15
View
luis.lucio Added images to "Adding admins" section and corrected text 14
View
luis.lucio Image Plugin modified by editor. 13
View
luis.lucio Changed all imgages sizes to height="50%" width="50%" 12
View
luis.lucio Image Plugin modified by editor. 11
View
luis.lucio Image Plugin modified by editor. 10
View
luis.lucio 9
View
luis.lucio 8
View
luis.lucio 7
View
System Administrator 6
View
System Administrator 5
View
System Administrator 4
View
System Administrator 3
View
System Administrator 2
View
System Administrator 1
View