• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Reseller owned SSL logins to 8443

R

rspurlock

Guest
Hi all,

I couldn't find this answered anywhere but did find lots of folks wanting to change from 8443 to 443. I can keep 8443 but what I'm looking for is a way to load a reseller's SSL Cert so it shows when they send their customers to log in at their reseller url. An example:

reseller's URL: reseller.com
plesk server url: plesk01.plesk.com

My shared clients log in at https://plesk01.plesk.com:8443
The reseller's clients need to log in at https://www.reseller.com:8443

AND not get the SSL security warning and not get my ssl cert info. Basically how do I keep it separate and have it show up correctly based on the domain?

Possible?

I've tried this in the vhost_ssl.conf

ServerAlias admin.servername.com
SSLProxyEngine on
ProxyRequests off
ProxyPass / https://admin.servername.com:8443/
ProxyPassReverse / https://admin.servername.com:8443/

This allows the reseller's customer to go to something like https://admin.reseller.com and get the real cert, but it dies when going into the phpmyadmin. So how do I get around this little problem?

TIA,

Rob
 
Anyone?

Has no one come across this problem and/or found a resolution?

Will swsoft have more reseller tuning for future versions?
 
Assign the reseller their own Exclusive IP. Then put the reseller's domain on that IP. Then install an SSL certificate on the reseller's domain and assign it to the Exclusive IP. (You might also like to arrange for all the domains that the reseller adds to be on that same IP -[ in that case don't make the IP exclusive - make it Shared, but make the reseller's domain the Default for that IP ]- in order to keep them "separate" from your own.)

You'll need more than one IP for this obviously!

Please see http://forum.swsoft.com/showthread.php?s=&threadid=30857

Faris.
 
Hi Faris,

Thanks for the response but adding an ssl cert isn't the problem. what I'm trying to accomplish is a customer's cert for admin login (ie port 8443). The server, no matter what URL you add in for admin login will load the default server ssl cert when you log in via port 8443.

While setting up an ssl proxy for each domain is fine, it craps out when going into phpmyadmin.

Thoughts or is the a future possible "to do" item for swsoft?

Rob
 
Ah! I see what you mean. I've duplicated your issue. This is new to me. I assumed it just worked, even though 8443 and 80 are different webservers.

Have you tried uploading the cert into the admin certificate repository as well as the domain's certificate repository, then selecting the domain and clicking on Setup?

It might be worth trying that, and making the domain with the secure cert the default one for that IP.

Faris.
 
Back
Top