If you prefer to use your own SSL instead of Groove's we support a couple of different methods. 

In your Settings > Custom Domain & SSL, select "I would like to use my own SSL," type in your custom domain, and then click Update

To add a custom domain you will need to create a CNAME record within your DNS provider's administration panel and configure it to point to Groove.

When you create the record, the CNAME host will be your new subdomain (help.yourdomain.com) and the CNAME value will be the default URL for your Knowledge Base. In this example, the host would be help.acmecorp.com and the value would be acme-support.groovehq.com

Setting up with SSL With CloudFlare

Log in or create an account with CloudFlare and navigate to your dashboard:

  • Make sure you’ve set up your CloudFlare nameservers
  • Go to the DNS section on the dashboard for your CloudFlare site and create a CNAME record per the steps outline above.
  • Now go to Crypto section and make sure SSL is set to Full.
  • Additionally on the same page, enable Always use HTTPS

(Note: if you have the free plan with CloudFlare, it can take up to 24 hours to issue your certificate.)

Setting up SSL with AWS CloudFront

Sign in to your AWS console and open CloudFront service and click Create distribution:

  • Under Web, click Get Started
  • Fill in the form fields as follows:
    • Origin Domain Name - Is the domain name of your Groove Knowledge Base URL shown under Settings -> General, for example: yourkbsubdomain.groovehq.com
    • Viewer Protocol Policy - Redirect HTTP to HTTPS
    • Allowed HTTP Methods - GET, HEAD, OPTIONS, PUT, POST, PATCH, DELETE
    • Cache Based on Selected Request Headers - All
    • Query String Forwarding and Caching - Forward all, cache based on all
    • Alternate Domain Names (CNAMEs) - Is your custom domain, for example: help.groovehq.help
    • Custom SSL Certificate - Select AWS certificate for your custom domain.
    • Finally click Create Distribution

Wait until distribution gets to Enabled state:

Now you can go ahead and point your custom domain in AWS Routes 53 to the created CloudFront distribution.

Setting up SSL with Nginx/Apache

To use your own SSL certificate and set up your own Termination SSL proxy with Nginx or Apache Web server. Use the sample configuration below:

Nginx

server {
  listen 443 ssl;
  # Set your own custom domain here
  server_name help.yourdomain.com;

  ssl_certificate /path/to/your/fullchain.pem;
  ssl_certificate_key /path/to/your/privatekey.pem;

  location / {
    # "set" enables nginx to follow dynamic IPs
    set $groove "https://yourkbsubdomain.groovehq.com"; 
    proxy_set_header Host $host;
    proxy_pass $groove;
  }
}

Apache

<VirtualHost *:443>
  # Set your own custom domain here
  ServerName help.yourdomain.com

  SSLEngine on
  SSLProxyVerify none
  SSLProxyEngine on
  SSLProxyCheckPeerCN off
  SSLProxyCheckPeerName off
  SSLProxyCheckPeerExpire off

  SSLCertificateFile /path/to/your/fullchain.pem
  SSLCertificateKeyFile /path/to/your/privatekey.pem

  ProxyPreserveHost On
  ProxyPass / https://yourkbsubdomain.groovehq.com/
  ProxyPassReverse / https://yourkbsubdomain.groovehq.com/
</VirtualHost>