Question: How can I put JFrog Artifactory behind Nginx reverse proxy and Let’s Encrypt SSL certificate?. JFrog Artifactory is a powerful and advanced repository manager designed to integrate with the majority of CI/CD tools to ensure quicker delivery of software from Development to Production.

By default, JFrog Artifactory binds to an IP address and port number on a server which means access is only via IP or Domain name and specified port number. If you’re keen on security, you’ll want to use a reverse proxy such as Nginx to secure access to JFrog Artifactory server.

In this guide, we will discuss how you can configure Nginx to sit in front of JFrog Artifactory server. We assume you already have a running Artifactory server before you follow this guide. If by any chance you don’t have one, our guides below will be helpful.

How to Install JFrog Artifactory on Ubuntu 18.04 / 16.04

How to Install JFrog Artifactory on CentOS 7

Once you have JFrog Artifactory server setup, proceed to configure Nginx with Let’s Encrypt SSL as reverse proxy to it.

Step 1: Install Nginx

Install Nginx on the server you want to use for reverse proxy functionalities. This can be the same server running Artifactory or a different server.

# Install Nginx on CentOS / RHEL
$ sudo yum -y install nginx

# Install Nginx on Fedora
$ sudo dnf -y install nginx

# Install Nginx on Ubuntu/Debian
$ sudo apt -y install nginx

Once Nginx web server is installed, start the service and set it to start at system boot.

sudo systemctl start nginx
sudo systemctl enable nginx

Step 2: Install Cerbot tool

Next is the installation of Certbot tool that is used to obtain Let’s Encrypt SSL certificate. Download and install certbot-auto command line tool.

curl -sL | sudo tee /usr/local/bin/certbot-auto

Give the script an execution bit.

sudo chmod +x /usr/local/bin/certbot-auto

Check if working:

$ certbot-auto --version
certbot 0.33.1

When asked to confirm installation of dependencies, answer “yes“.

Dependencies Resolved

 Package              Arch      Version                   Repository  Size
 augeas-libs          x86_64    1.4.0-6.el7_6.1           updates    355 k
 libffi-devel         x86_64    3.0.13-18.el7             base        23 k
 mod_ssl              x86_64    1:2.4.6-88.el7.centos     base       112 k
 python-devel         x86_64    2.7.5-76.el7              base       398 k
 python-tools         x86_64    2.7.5-76.el7              base       856 k
 python-virtualenv    noarch    15.1.0-2.el7              base       1.7 M
 python2-pip          noarch    8.1.2-8.el7               epel       1.7 M
 redhat-rpm-config    noarch    9.1.0-87.el7.centos       base        81 k
Installing for dependencies:
 dwz                  x86_64    0.11-3.el7                base        99 k
 libXft               x86_64    2.3.2-2.el7               base        58 k
 libXrender           x86_64    0.9.10-1.el7              base        26 k
 perl-srpm-macros     noarch    1-8.el7                   base       4.6 k
 tcl                  x86_64    1:8.5.13-8.el7            base       1.9 M
 tix                  x86_64    1:8.4.3-12.el7            base       254 k
 tk                   x86_64    1:8.5.13-6.el7            base       1.4 M
 tkinter              x86_64    2.7.5-76.el7              base       326 k
 zip                  x86_64    3.0-11.el7                base       260 k

Transaction Summary
Install  8 Packages (+9 Dependent packages)

Total download size: 9.5 M
Installed size: 26 M
Is this ok [y/d/N]: y

Step 3: Request for Let’s Encrypt SSL Certiticate

You need a working DNS for the domain or subdomain used by the JFrog Artifactory server, e.g

You also need to open port 80 to be able to get the certificate, but only if you have an active firewall.

# CentOS / Fedora / RHEL
$ sudo firewall-cmd --add-service={http,https} --permanent
$ sudo firewall-cmd --reload

# Ubuntu / Debian
$ sudo ufw allow proto tcp from any to any port 80,443
$ sudo ufw status

Once that is done, get Let’s Encrypt Certificate:

export DOMAIN=""
export ALERTS_EMAIL="[email protected]"
sudo systemctl stop nginx
sudo /usr/local/bin/certbot-auto certonly --standalone -d $DOMAIN --preferred-challenges http --agree-tos -n -m $ALERTS_EMAIL --keep-until-expiring

Sample output:

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator standalone, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for
Waiting for verification…
Cleaning up challenges
Congratulations! Your certificate and chain have been saved at:
Your key file has been saved at:
Your cert will expire on 2019-07-11. To obtain a new or tweaked
version of this certificate in the future, simply run certbot-auto
again. To non-interactively renew all of your certificates, run
"certbot-auto renew"
Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt:
Donating to EFF:

Step 4: Configure Nginx

Create an Nginx configuration file for Jenkins.

sudo vim /etc/nginx/conf.d/artifactory.conf

Paste below to the file.

server {
  listen 80;
  return 301 https://$host$request_uri;
server {
  listen 443 ssl;
  access_log /var/log/nginx/;
  error_log /var/log/nginx/;
  ssl_certificate /etc/letsencrypt/live/;
  ssl_certificate_key /etc/letsencrypt/live/;

  rewrite ^/$ /artifactory/webapp/ redirect;
  rewrite ^/artifactory/?(/webapp)?$ /artifactory/webapp/ redirect;
  chunked_transfer_encoding on;
  client_max_body_size 0;
  if ($http_x_forwarded_proto = '') {
      set $http_x_forwarded_proto  $scheme;
  location / {
    proxy_read_timeout  900;
    proxy_pass_header   Server;
    proxy_cookie_path   ~*^/.* /;
    if ( $request_uri ~ ^/artifactory/(.*)$ ) {
    proxy_set_header    X-Forwarded-Port  $server_port;
    proxy_set_header    X-Forwarded-Proto $http_x_forwarded_proto;
    proxy_set_header    Host              $http_host;
    proxy_set_header    X-Forwarded-For   $proxy_add_x_forwarded_for;

Replace artifactory[dot] with your Artifactory server Domain. When done making changes, validate Nginx configuration file.

$ nginx  -t
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful

If the configuration looks fine, start nginx and set it to start at boot.

sudo systemctl restart nginx
sudo systemctl enable nginx

Step 6: Access JFrog Artifactory Web Interface

Access JFrog Artifactory web interface on

Artifactory nginx reverse proxy https

You should be redirected from http to https.

Artifactory nginx reverse proxy https interface

You have successfully configured Nginx as Reverse proxy to JFrog Artifactory server with Let’s Encrypt SSL certificate.

You can also check:

Configure Jenkins behind Nginx reverse proxy and Let’s Encrypt SSL

How to Install Gitea self-hosted Git service on CentOS 7 with Nginx Reverse Proxy

How to Configure Nginx Proxy for Semaphore Ansible Web UI

Configure Graylog Nginx reverse proxy with Letsencrypt SSL

Your support is our everlasting motivation,
that cup of coffee is what keeps us going!

As we continue to grow, we would wish to reach and impact more people who visit and take advantage of the guides we have on our blog. This is a big task for us and we are so far extremely grateful for the kind people who have shown amazing support for our work over the time we have been online.

Thank You for your support as we work to give you the best of guides and articles. Click below to buy us a coffee.


Please enter your comment!
Please enter your name here