Use this page to enable the Application Web Server—which hosts LabVIEW Web services—and to enable Secure Sockets Layer (SSL) encryption on the Application and System Web Servers. Refer to the LabVIEW Help for more information about Web services, SSL encryption, and the Application and System Web Servers.
This page includes the following components:
Web Servers—Configures the System and Application Web Servers.
System Web Server—Configures the System Web Server, which performs internal Web service processes such as the temporary processing of the .lvws file. The System Web Server runs as an independent system service. After you install LabVIEW, the System Web Server launches whenever you boot up the system.
Port—Displays the network port for the System Web Server. The default port is 3580 on desktop systems and both 80 and 3580 on remote targets.
Enabled—Displays that the System Web Server is enabled. You cannot disable the System Web Server.
Advanced—Displays options to enable SSL encryption for the System Web Server.
SSL enabled—Enables SSL on the System Web Server.
Certificate file—Specifies the SSL certificate file that encrypts communication on the System Web Server. You can create a new SSL certificate on the SSL Certificate Management tab. You also can refer to the NI Distributed System Manager Help for information about creating certificate files on a system.
Application Web Server—Configures the Application Web Server that hosts Web services on the network. The Application Web Server runs as an independent system service. You can enable and run the Application Web Server without running LabVIEW or the LabVIEW Run-Time Engine on the host system.
Port—Specifies the network port for the Application Web Server. The default port is 8080.
Enabled—Specifies the status of the Application Web Server. Once you enable the Application Web Server, it remains enabled whenever you boot up the system.
Advanced—Displays options to enable SSL encryption for the Application Web Server. Enable SSL on the Application Web Server to protect communication between Web clients and a LabVIEW application deployed as a Web service.
Virtual hosts—Configures virtual hosts that represent instances of the Application Web Server. You must create a virtual host to enable SSL encryption on the Application Web Server. You can configure each instance with a unique IP address and configuration options. When you deploy a Web service to the Application Web Server, the Web service is accessible on all virtual hosts.
Virtual host list—Displays active virtual hosts.
Host name—Specifies the name of the virtual host.
Listen on all interfaces—Specifies that the virtual host accepts communication over all IP addresses configured for the Application Web Server. By default, the virtual host accepts communication using the host system's IP address.
IP—Specifies an IP address for the virtual host if you have not enabled Listen on all interfaces.
Port—Specifies a network port for the virtual host.
SSL enabled—Enables SSL on the virtual host instance of the Application Web Server.
Certificate file—Specifies the SSL certificate file that encrypts communication on the System Web Server. You can create a new SSL certificate on the SSL Certificate Management tab. You also can refer to the NI Distributed System Manager Help for information about creating certificate files on a system.
Add a new virtual host—Adds a new virtual host to the Virtual host list.
Remove selected virtual host—Deletes the selected virtual host from the Virtual host list.
SSL Certificate Management—Configures SSL certificates on the system. Refer to the LabVIEW Help for information about SSL certificates and certificate signing requests.
Certificate list—Displays the available certificates on the system. SSL encryption uses certificates to establish secure connections between a client and a server. LabVIEW creates a default self-signed certificate when you enable SSL.
Generate a new self signed certificate—Displays the Create New Certificate dialog box. Use this dialog box to configure a self-signed certificate.
Remove certificate—Removes the selected certificate from the system.
Certificate Information—Displays the components of the selected certificate.
Certificate Signing Request list—Displays the available certificate signing requests on the system. Use certificate signing requests to obtain a certificate that is authorized with a digital signature from a certificate authority (CA), a trusted third-party company that digitally certifies the authenticity of certificates. A network administrator, such as a corporate IT department, might also issue digital signatures.
Generate a new certificate signing request—Displays the New signing request dialog box. Use this dialog box to configure a new certificate signing request.
Remove certificate signing request—Removes the selected certificate signing request from the system.
Install Certificate—Specifies a certificate provided by a CA to install on the system.
Certificate Signing Request Information—Displays the components of the selected certificate signing request.
Web Services API Key—Configures API key security for the Web server.
Generate New Key—Generates a new API key.
Reset to Default—Resets the API key.
Copy to Clipboard—Copies the API key to the clipboard.
Paste from Clipboard—Pastes an API key from the clipboard.
Apply—Applies the current API key to the Web server.
Access ID—Displays the access ID portion of the API key.
Secret ID—Displays the secret ID portion of the API key.
Valid Timestamp Window (minutes)—Specifies the maximum amount of time you have, after creating a signed HTTP request, to send that request to the Web Application Server. If you create a signed HTTP request and send it after the Valid TimeStamp Window has elapsed, the Web Application Server returns HTTP error 403 Forbidden. The default is 15 minutes.
Components of SSL Certificates and Certificate Signing Requests
Certificates and certificate signing requests include a subset of the following components:
Filename—Displays the location of the certificate or certificate signing request on the system.
Handle number—Displays a unique identification number for the certificate or certificate signing request. The system assigns increasing numerical values for the Handle number, starting at 100 for the first certificate or certificate signing request created on the system.
Common name—Specifies the common name. Use the DNS name or the IP address of the system displayed in NI Web-based Monitoring and Configuration. Example syntax: localhost
Country—Specifies the two character country code. Example syntax: US
State or Province—Specifies the state or province. Example syntax: Texas
Locality—Specifies the locality. Example syntax: Austin
Organization—Specifies the organization. Example syntax: National Instruments
Organizational unit—Specifies the organizational unit. Example syntax: LabVIEW Web Server
Subject alt name—Specifies the subject alt name. You can configure multiple subject alt names. Example syntax: DNS:www1.ni.com or DNS:www1.ni.com,DNS:www2.ni.com/labview
Key usage—Displays the functionality of the certificate.
Serial number—Displays a unique serial number for the certificate.
Valid from—Displays the start date of the certificate's validity.
Valid until—Displays the end date of the certificate's validity
Raw certificate text—Displays the certificate file as raw text.
Raw certificate request—Displays the certificate signing request as raw text.
Setting Permissions to Configure the Application Web Server
Complete the following steps to specify which users have permissions to configure the Application Web Server.
Click the Security Configuration button to display the Security Configuration page. You must have administrator access or the SetDB permission to configure security permissions.
(Optional) Create a new user.
Double-click a user or group to display the associated configuration options.
In the Permission(s) field, place a checkmark in the WIFConfigureAppServer checkbox to allow the user or group to modify the Application Web Server settings.
Click the Save button.
Click the Upload Changes button to save the changes to the system.
Enabling SSL Security for Web Services
Complete the following steps to enable SSL encryption for Web services applications hosted on the Application Web Server.
In the Application Web Server section, place a checkmark in the Enabled checkbox.
Click the Advanced button to display additional configuration options.
Click the Add a new virtual host button to establish an instance of the Application Web Server on which to enable SSL encryption.
Place a checkmark in the SSL enabled checkbox to enable SSL encryption for the selected virtual instance.
Select a certificate file from the Certificate file pull-down menu. You can create a new SSL certificate on the SSL Certificate Management tab. You also can refer to the NI Distributed System Manager Help for information about creating certificate files on a system.
Click the Apply button in the Application Web Server section.