COMPUTING > Cloud Servers > Template datasheets > JTS-001 - CentOS 8 64Bit - Jitsi

JTS-001 - CentOS 8 64Bit - Jitsi

EOL (End Of Life)
This template is no longer available for creating new Cloud Servers.


This is a Linux CentOS 8 template with Jitsi Meet pre-installed, an open source video conferencing application. The application works via a browser (Chrome, Edge, Firefox, Safari) and does not require registration. The extension is available on Chrome. Access is via link sharing. An Android and iOS app is also available.


Administrative access is provided via SSH, with the root username and the password chosen during setup.
Jitsi Meet can be accessed at https://IPSERVER, the creation of rooms is password protected, the default user is admin with the password chosen when the Server was created, access to rooms already created is also open to anonymous users, but a password can still be set for access to an individual room.
In addition to Jitsi Meet, collaborative document editing software Etherpad is available at https://IPSERVER/etherpad.


To add an admin user to Jitsi, sign in to the server via SSH and run the following command:
docker exec docker-jitsi-meet_prosody_1 prosodyctl --config /config/prosody.cfg.lua register USERNAME meet.jitsi 'PASSWORD'
replacing USERNAME and PASSWORD with those chosen.

For mobile access, you need to link a domain with the server IP and use valid certificates.

The paths for the certificate and key are:
  • key: /opt/jitsi/jitsi-meet-cfg/web/keys/cert.key
  • certificate: /opt/jitsi/jitsi-meet-cfg/web/keys/cert.crt
Replace the files and run the command to restart the web container:
docker restart docker-jitsi-meet_web_1

Support for letsencrypt is also available and can be enabled using the procedure below.
NB: you will need a domain that points to the Server's Public IP for the procedure to be completed successfully:
change the file /opt/jitsi/docker-jitsi-meet/.env
LETSENCRYPT_DOMAIN=domain that points to the server's Public IP
LETSENCRYPT_EMAIL=a valid email address

After changing the files, run the following commands:
cd /opt/jitsi/docker-jitsi-meet
rm -f /opt/jitsi/jitsi-meet-cfg/web/nginx/ssl.conf
docker-compose -f docker-compose.yml  -f etherpad.yml down
docker-compose -f docker-compose.yml  -f etherpad.yml up -d

fail2ban is installed on the server to offer protection from brute-force attacks on port 22

For this template, the open ports are:
80 TCP
443 TCP
22 TCP
4443 TCP
5355 TCP
10000 UDP

Template version