AgileTestware

Security

SSL/HTTPS configuration and user management for Bumblebee.

Managing Users

Navigate to the Accounts tab in the Bumblebee web portal to create additional accounts or change passwords:

Bumblebee user management

Change the default admin / admin credentials immediately after installation.

Enabling HTTPS / SSL

To secure the Bumblebee server with SSL, use a service like Let's Encrypt to obtain a certificate or generate a self-signed certificate.

Place the keystore file in the Bumblebee installation directory and create an application.yml file:

server:
  port: 8443
  ssl:
    key-store: keystoreFile.pfx
    key-store-password: your_key_store_password
    keyStoreType: PKCS12

After configuring, restart the Bumblebee service:

  • Windows: Restart the BumbleBee HP ALM Integration Service in Windows Services
  • Linux: Run sudo ./shutdown.sh then sudo ./startup.sh from the Bumblebee installation directory

Generating a Self-Signed Certificate

keytool -genkeypair \
  -alias bumblebee \
  -keyalg RSA \
  -keysize 2048 \
  -storetype PKCS12 \
  -keystore keystore.pfx \
  -validity 3650 \
  -dname "CN=bumblebee.example.com, O=Example Corp, C=US"

Let's Encrypt

For internet-facing deployments, Let's Encrypt provides free auto-renewing certificates. After obtaining a certificate with Certbot, convert it to PKCS12 format:

openssl pkcs12 -export \
  -in /etc/letsencrypt/live/bumblebee.example.com/fullchain.pem \
  -inkey /etc/letsencrypt/live/bumblebee.example.com/privkey.pem \
  -out keystore.pfx \
  -name bumblebee

Then reference keystore.pfx in your application.yml.

On this page