IVR HTTPS configuration guide
Setup SSL certificate for IVR
Setup your SSL certificate (reference)
- Launch Internet Information Services (IIS) Manager.
- Select your server name (host) where IVR services are installed.
- Open Server Certificates under the IIS section.
- Import or complete your SSL certificate.
Bind Your Certificate to IVR's websites (reference)
- Open Bindings of the website where IVR services are installed.
- Add binding for HTTPS:
- Type: https
- IP address: All Unassigned
- Port: 443
- SSL certificate: Select your SSL certificate.
Make SSL required for IVR services (reference)
- Select IVRCompSrv virtual directory.
- Open SSL Settings under IIS section.
- Enable the Require SSL option, then apply the change with the Apply link in the Actions section.
- Repeat step 1-3. for IVRWS and IVRDesigner.
Install your SSL certificate to Trusted Root store
Install your SSL certificate to the Trusted Root Certification Root store.
Configure IVR Engine for HTTPS
Endpoint service
- Open Endpoint service configuration file UCMAIVR.exe.config in IVR/EndPoint folder.
- Change IVRWS URL to use HTTPS. Set
ivrwsurl
parameter at/configuration/appSettings/add
path tohttps://[ServerFQDN]/IVRWS/IVRWS.asmx
.
IVRCompSrv service
- Open IVRCompSrv configuration file Web.config in IVR/IVRCompSrv folder.
- Change IVRWS URL to use HTTPS. Set
IVRWSUrl
parameter at/configuration/compsrv/component/initparameters/param
path to<![CDATA[https://[ServerFQDN]/IVRWS/IVRWS.asmx]]>
.
License Manager
- Open License Manager configuration file LSMgr.exe.config in IVR/LSMgr folder.
- Change IVRWS URL to use HTTPS. Set
ivrwsurl
parameter at/configuration/appSettings/add
path tohttps://[ServerFQDN]/IVRWS/IVRWS.asmx
.
Node Service
- Open Node Service configuration file NodeService.exe.config in IVR/NodeService folder.
- Change IVRWS URL to use HTTPS. Set
ivrwsurl
parameter at/configuration/appSettings/add
path tohttps://[ServerFQDN]/IVRWS/IVRWS.asmx
.
Configure IVR Designer for HTTPS
- Open IVRDesigner configuration file Web.config in IVRDesigner folder.
- Change the IVRWS URL to use HTTPS. Set
address
attribute at/configuration/system.serviceModel/client/endpoint
path tohttps://[ServerFQDN]/IVRWS/IVRWS.asmx
) Replace the
/configuration/system.serviceModel/bindings/basicHttpBinding/binding/security
node to use TLS certificate with the following (reference):<security mode="Transport"> <transport clientCredentialType="None"/> <message clientCredentialType="Certificate" algorithmSuite="Default" /> </security>
Add support for TLS 1.2
IVR is using .NET Framework 3.5, 4.0 and 4.5, so TLS 1.2 needs to be configured for these .NET Framework versions. Execute the following steps to configure TLS 1.2 for all required .NET Framework version.
Enable TLS 1.2 on Windows Servers (source)
Launch regedit.exe.
In registry, go to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
Create a new key entry with a name TLS 1.2 and create another subkey Client and Server.
Under the subkey Server (an under subkey Client if it is required on your server), create another DWORD Enabled with a value of 1.
Still under the subkey Server, create a DWORD DisabledByDefault with a value of 0.
You must create a subkey DisabledByDefault entry in the appropriate subkey (Client, Server) and set the DWORD value to 0 since this entry is set to 1 by default.
Reboot the server and test.
Enable TLS 1.2 for .NET Framework 3.5 (source)
Launch regedit.exe.
Go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727
Create a new entry SystemDefaultTlsVersions with a DWORD value set to 1.
Create a new entry SchUseStrongCrypto with a DWORD value set to 1.
Go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
Create a new entry SystemDefaultTlsVersions with a DWORD value set to 1.
Create a new entry SchUseStrongCrypto with a DWORD value set to 1.
For 64-bit OS, the same changes also needed for the following locations:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
Create a new entry SystemDefaultTlsVersions with a DWORD value set to 1.
Create a new entry SchUseStrongCrypto with a DWORD value set to 1.
Go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319
Create a new entry SystemDefaultTlsVersions with a DWORD value set to 1.
Create a new entry SchUseStrongCrypto with a DWORD value set to 1.
Test.
Note
Before disabling TLS 1.0 or TLS 1.1 protocols on the server, make sure Management Service connection is configured properly in the configuration of the IVRCompSrv service.