This is a Linux CentOS 8 template with Jitsi Meet pre-installed, an open source video conferencing application. The application works via a browser (Chrome, Edge, Firefox, Safari) and does not require registration. The extension
is available on Chrome. Access is via link sharing. An Android
app is also available.
Administrative access is provided via SSH, with the root username and the password chosen during setup.
Jitsi Meet can be accessed at https://IPSERVER
, the creation of rooms is password protected, the default user is admin with the password chosen when the Server was created, access to rooms already created is also open to anonymous users, but a password can still be set for access to an individual room.
In addition to Jitsi Meet, collaborative document editing software Etherpad is available at https://IPSERVER/etherpad
To add an admin user to Jitsi, sign in to the server via SSH and run the following command:
docker exec docker-jitsi-meet_prosody_1 prosodyctl --config /config/prosody.cfg.lua register USERNAME meet.jitsi 'PASSWORD'
replacing USERNAME and PASSWORD with those chosen.
For mobile access, you need to link a domain with the server IP and use valid certificates.
The paths for the certificate and key are:
- key: /opt/jitsi/jitsi-meet-cfg/web/keys/cert.key
- certificate: /opt/jitsi/jitsi-meet-cfg/web/keys/cert.crt
Replace the files and run the command to restart the web container:
docker restart docker-jitsi-meet_web_1
Support for letsencrypt is also available and can be enabled using the procedure below.
NB: you will need a domain that points to the Server's Public IP for the procedure to be completed successfully:
change the file /opt/jitsi/docker-jitsi-meet/.env
decommenting the variables ENABLE_LETSENCRYPT, LETSENCRYPT_DOMAIN, LETSENCRYPT_EMAIL
LETSENCRYPT_DOMAIN=domain that points to the server's Public IP
LETSENCRYPT_EMAIL=a valid email address
After changing the files, run the following commands:
rm -f /opt/jitsi/jitsi-meet-cfg/web/nginx/ssl.conf
docker-compose -f docker-compose.yml -f etherpad.yml down
docker-compose -f docker-compose.yml -f etherpad.yml up -d
fail2ban is installed on the server to offer protection from brute-force attacks on port 22
For this template, the open ports are: