Windows Server installation
Prepare an environment with Windows Server. Refer to the Get started with Windows Server guide for more information.
System requirements
Supported operating systems
- Windows Server 2008 or higher
Minimum hardware requirements
- 4 GB RAM
- 2 vCores
- 100 MBit network connection
- 120 MB free disk space for the installation files
- 10 GB free disk space for application data
- The actual requirement depends on the use case, a scalable store solution is recommended
Environment dependencies
- DNS name
- Free port (e.g.,
80
or443
, other ports can be configured as well) - HTTP(S) connectivity client => server
- SSL certificate (.p12 / .pfx) with or without a private key passphrase
- The passphrase is stored as plain text in
server-config.json
- The passphrase is stored as plain text in
- SMTP server with or without authentication
Recommendations
- Store Ninox data files on SSD storage
- Implement a backup strategy with at least two layers of backup
- VM snapshots
- File system-based incremental backups of the data directory
- Implement a fail-over strategy
Network configuration
Ninox client/server communication is based on HTTP(S). There are multiple ways to configure a Ninox installation, however, the following properties must be given:
- Clients must be able to connect to the Ninox server by HTTPS via TCP/IP
- A DNS name for the Ninox server (or the first component in the configuration that terminates the client connection) that reliably resolves to the server's IP
- Static IP addresses are highly encouraged, DynDNS is not recommended
- If clients connect from the internet and intranet, they need to use the same address/DNS name
Follow the steps for one of the deployment configurations.
Simple setup
Client –> HTTPS –> Server
The basic configuration requires that the Ninox server exposes a port for HTTP communication on the internet or on a private network.
Forward proxy setup
Client –> HTTPS –> Forward Proxy –> HTTPS –> Server
DMZ setup
Client –> HTTPS –> Reverse Proxy –> HTTP –> Server
In a DMZ environment, a reverse proxy terminates any client-side communication. This is the recommended configuration for environments that have already implemented a DMZ. Two main advantages of a DMZ setup are:
- Centralized certificate management on the reverse proxy
- A reverse proxy can act as a security component with traffic inspection
Requirements
- Allow at least the following HTTP methods:
POST
,GET
,PUT
,PATCH
,DELETE
,OPTIONS
, andHEAD
- TCP timeouts must be higher than 60 seconds
- No path rewriting rules, Ninox cannot be mounted on a sub-path
- Ninox may heavily rely on parallel TCP connections
- The reverse proxy needs to be able to handle multiple TCP connections—ideally at least 2 concurrent connections per concurrent client
Configuration file
Edit server-config.json
in the installation directory. Refer to section Sample configuration file for more information.
On Windows, do not use Notepad to edit the configuration file. Other code editors, including Notepad ++, are suitable options.
Ensure the configuration file complies with the UTF-8 encoded JSON format. The configuration file must not involve proprietary UTF-8 encoding headers.
Reply
Content aside
- 2 mths agoLast active
- 68Views
-
1
Following