Dynamic Resource Scheduler
Whats New!
User Experience Changes
Security and Authentication
Modules and Utilities
Cyclical Scheduling - Configuration Interface
Cyclical Scheduling - Now Bulk Scheduling
Resource Quotas Improvements - Percentages
Architecture and Scheduling
Configuration
User Guides and Help
Get to Know Dynamic Resource Scheduler
How Does Dynamic Resource Scheduling Work
Speaking the Language of Scheduling
Navigating Dynamic Resource Scheduler
How your Data Links Together
Managing your Organisation
Viewing your Data
Your Customer Data
Your Service Orders
Your Jobs
Your Workers and Resources
Manage Your Tasks
Actioning your Jobs and Tasks
Job Templates
Find A Jobs Possible Workers
Locking Your Jobs
Create a Follow On Task
User Queues and Organising Your Tasks
Schedule and Organise
How to Optimise Your Scheduling
How to Schedule Manually
Scheduling Mutliple Jobs at Once
Reassign and Reschedule your Tasks
Managing Your Time and Durations
Managing your Comments and Contacts
Using Bookmarks to Drive Efficiency
Managing Your Job Status
Visualising Your Planning
Workers and Resources
Advanced Data Management
Creating Unavailability in your Workforce
Adding an Unavailability to an Individual Worker
Creating Unavailabilities for Multiple Days or Workers
Maps And Journey
Using Maps to Visualise Your Data
Using Maps With Your Data
Learn about our Closest Function
Your Journeys
Meetings and Non-Productive Planning
Administer Your Scheduler
Managing Your Organisations and Agencies
Managing Your Custom Data
Managing your Contracts
Customising Your Experience
Managing Depots and Starting Locations
Managing Diary Bookmarks
Managing your External Chart Views
KPI Settings
Managing Your Priorities
Learn about Sectors
Managing Your Follow On Templates
Get To Know Your Working Time Calendar
Managing your SOR Templates
Managing your Job Templates
Managing Your Vocabulary
Managing Your Bookmarks
Manage Your Customer Templates
Get to Know Import and Export
Managing Your Tenant Code Rules
Managing your Order Templates
Managing Your Unavailability Reasons
Get To Know Your Working Time Calendars
Managing your Worker Templates
Releases and Readiness
DRS 6, DRS 5.7 and Job Manager
User Guides and Help
Get to Know DRS
Dynamic Scheduling - How does it work
Navigating DRS
Vocabulary and Concepts
Customers
Orders
Jobs
Scheduling Jobs
Job Functions
Workers
Views
Object Inheritance
Agencies
DRS Modules
Scenario Based Planning
Managing your SMS Service
5.7 Documentation
Technical Documentation
Release Notes
DRS 6.1 Release Notes
DRS 6.1.22 - February 20, 2026
DRS 6.1.21 - September 10, 2025
DRS 6.1.20 - April 20th, 2025
DRS 6.1.19 - 11th April, 2025
DRS 6.1.18 - 13 February 2025
DRS 6.1.17 - 20th December 2024
DRS 6.1.16 - November 8th, 2024
DRS 6.1.15 - October 10th, 2024
DRS 6.1.14 - 6th September 2024
DRS 6.1.13 - 9th August 2024
DRS 6.1.12 Release Notes
DRS 6.1.11 Release Notes
DRS 6.1.10 Release Notes
DRS 6.1.9 Release Notes
DRS 6.1.8 Release Notes
DRS 6.1.7 Release Notes
DRS 6.1.6 Release Notes
DRS 6.1.5 Release Notes
DRS 6.1.4 Release Notes
DRS 6.1.3 Release Notes
DRS 6.1.2 Release Notes
DRS 6.1.1 Release Notes
DRS 6.1.0 Release Notes
DRS 6.0 Release Notes
DRS 6.0.0.0 Release Notes
DRS 6.0.0.1 Release Notes
DRS 6.0.0.2 Release Notes
DRS 6.0.0.3 Release Notes
DRS 6.0.0.4 Release Notes
DRS 6.0.0.6 Release Notes
DRS 6.0.1.0 Release Notes
DRS 6.0.1.1 Release Notes
DRS 6.0.1.2 Release Notes
DRS 6.0.1.3 Release Notes
DRS 6.0.1.4 Release Notes
DRS 6.0.1.5 Release Notes
Kirona Housing
Job Manager 9
Job Manager 9.3.0 - October 2024
Job Manager 9.1.0 - December 2022
Job Manager 9.2.0 - November 2023
Release Notes Disclaimer
Administering your Field Service Products
Supported Versions Policies
- All categories
- DRS 6, DRS 5.7 and Job Manager
- Technical Documentation
- Job Manager
- Updating Apache Versions for Job Manager
Updating Apache Versions for Job Manager
Updated
by Andrew Dotto
Purpose
This document is written to help you understand how to upgrade your underlying Apache and Apache Tomcat versions within Job Manager for customers with On Premise installations.
Important Points to Note before you start
- These tasks should only be performed by an appropriately skilled professional.
- All changes should be throughly tested in Test before committing changes to production.
- The upgrade of HTTPD and Tomcat can be scheduled to run concurrently with an Oracle database upgrade.
- If performed concurrently, Job Manager cannot be restarted until the database upgrade is complete.
- Check with OneAdvanced support around tested and supported versions of Apache and Apache Tomcat for your version of Job Manager
- Please note that the configuration of TLS certificates has been altered for Apache HTTPD to bring inline with recommended practices for more recent version of Apache HTTPD.
- The text file, D:\tpp\apache\apache-2.4.58\conf\ssl\README-creating-certificate-files.txt, describes how certificate file, fullchain.pem, is produced.
- If in any doubt, please contact OneAdvanced Support before continuing.
Installation files
Download your required installation files (Apache HTTPD and Tomcat) to the Job Manager Host Server.
Certificate check
Before upgrading Apache HTTPD you should check the certificates in use by navigating to your Job Manager console in a browser and checking the certificates reported:

In the above screenshot we see that the certificate for host has been signed by intermediate certificate DigiCert Global G2 TLS RSA SHA256 2020 CA1.
Using openssl we can check which certificates the server is including in its handshaking with HTTPS clients:
D:\tpp\apache\Apache2.4.56\bin>openssl s_client -connect localhost:443 -servername <<YOUR JOB MANAGER HOST SERVER NAME HERE>>
CONNECTED(00000130)
depth=1 C = US, O = DigiCert Inc, CN = DigiCert Global G2 TLS RSA SHA256 2020 CA1
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C = GB, L = London, O = <<ASSIGNED AGENT>>, CN = <<URL>>
verify return:1
---
Certificate chain
0 s:C = GB, L = London, O = <<ASSIGNED AGENT>>, CN = <<URL>>
i:C = US, O = DigiCert Inc, CN = DigiCert Global G2 TLS RSA SHA256 2020 CA1
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 20 00:00:00 2023 GMT; NotAfter: Apr 19 23:59:59 2024 GMT
1 s:C = US, O = DigiCert Inc, CN = DigiCert Global G2 TLS RSA SHA256 2020 CA1
i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 30 00:00:00 2021 GMT; NotAfter: Mar 29 23:59:59 2031 GMT
The s_client output shows that a chain of two certificates are returned by the server, the certificate for the host itself and the certificate for the intermediate CA, DigiCert Global G2 TLS RSA SHA256 2020 CA1.
The certificate chain is correctly configured on this host for the old version of Apache HTTPD
Checking the configuration related to HTTPS, we find the following directives related to certificates:
SSLCertificateFile "${SRVROOT}/conf/ssl\<<ENDPOINTCER>>.cer"
SSLCertificateKeyFile "${SRVROOT}/conf/ssl\private.key"
SSLCACertificateFile "${SRVROOT}/conf/ssl\intermediate.cer"Although the HTTPD server is currently returning a correct certificate chain, it is configured to do so by way of a separate Certificate Authority (CA) chain file. Newer versions of Apache HTTPD recommend we combine the host’s and the intermediate CAs' certificates into a single file.
Make sure a README-creating-certificate-files.TXT is placed alongside the certificate files in the new Apache installation with the following content:
Apache HTTPD is configured to use two files related to TLS:
- private.key
- Contains the private key associated with the server's certificate.
- fullchain.pem
- Contains the chain of the server's host TLS certificate and any Intermediate CA certificates necessary to establish trust back to a root CA certificate.
When certificates are updated from time-to-time, manual steps may be needed to recreate fullchain.pem.
The file private.key was already available from a previous Apache HTTPD installation.
The file fullchain.pem was created by combining the content of the endpoint certificate file, <yourURL>.cer, with the content of intermediate.cer to a new text file.
The order of certificates in fullchain.pem must be the host certificate, followed by any intermediate CA certificates in the order necessary to establish a trust chain back to a root CA certificate.
The root CA certificate should not be added to fullchain.pem.
OpenSSL versions
If OpenSSL is installed on your servers, newer versions are bundled with Apache HTTPD, which will be deployed as part of the upgrade process.
Upgrade activities for the Job Manager host
- Shutdown Job Manager and its modules by running the
/app/kirona/admin/stopall_jmLive_tomcatservice.batbatch file. - Shutdown Apache HTTPD by running the
/app/kirona/admin/stopApache.batbatch file. - Uninstall the Apache HTTPD service
- Navigate to the HTTPD bin directory and run the
httpd -k uninstallcommand.
- Navigate to the HTTPD bin directory and run the
- Uninstall the Tomcat services for Job Manager and modules
- Navigate to the
/tpp/tomcat/KIRONALIVE/bin/servicescriptsdirectory and run the following:
JmLiveService.bat uninstall
integrationLiveService.bat uninstall - Navigate to the
Install Apache HTTPD
- Extract contents of directory
httpd-2.4.58-win64-VS17.zip:/Apache24to path/tpp/apache/apache-2.4.58. - Copy files
<YourURL>.cerandprivate.keyfrom/tpp/apache/Apache2.4.56/conf/sslto/tpp/apache/apache-2.4.58/conf/ssl. - Use Notepad++ (or another appropriate comparison tool) to compare existing configuration file
/tpp/apache/Apache2.4.56/conf/httpd.confto new configuration file/tpp/apache/apache-2.4.58/conf/httpd.confand apply relevant changes to the new configuration file. - Use Notepad++ (or another appropriate comparison tool) to compare existing configuration file
/tpp/apache/Apache2.4.56/conf/extra/httpd-ssl.confto new configuration file/tpp/apache/apache-2.4.58/conf/extra/httpd-ssl.confand apply relevant changes to the new configuration file.- Note: The host and intermediate CA certificates have been combined into a single file,
fullchain.pem. This must be reflected in the new configuration file. - Note: Ensure
ServerNamein httpd-ssl.conf matches the subject in the host certificate.
- Note: The host and intermediate CA certificates have been combined into a single file,
- Run
httpdfrom the command line to confirm no errors in configuration. - Visit your Job Manager Dashboard url in a web browser and confirm It works! is displayed.
- On the command line, navigate to the
/tpp/apache/apache-2.4.58/bindirectory and run the following command to confirm the certificate chain is present in HTTPS handshaking:openssl s_client -connect localhost:443 -servername <YourURL>
- Check logs files for any errors.
- Stop the httpd process by using Control-C.
- Install the Apache service by running
httpd -k install. - Clear any log files
Install Apache Tomcat
- Extract directory
apache-tomcat-9.0.82-windows-x64.zip:/apache-tomcat-9.0.82as/tpp/tomcat/apache-tomcat-9.0.82. - Navigate to directory
/tpp/tomcat/KIRONALIVE/bin/servicescriptsand modify the three batch scripts used to install the Job Manager and modules' Windows Services to refer to the new version of Apache Tomcat. - This can be done using Notepad++'s Find-and-Replace functionality. Find 9.0.80 and replace with 9.0.82.
- For each batch script, run the following with the 'install' command line argument:
jmLiveservice.bat install
integrationLiveservice.bat install
- For each tomcat container under /tpp/tomcat/KIRONALIVE (i.e. JM and the modules), clean up the log directories by removing old logs, keeping the last 10 days of logs.
- Remove any old logs under /tpp/tomcat/KIRONALIVE/logs.
- Note: Log rotation is applied to this directory, but there may be lots of old files that can be cleaned up.