Alma/Rocky/CentOS
Installing Passwork on following OS:
- CentOS 8 Stream, Alma Linux 8, Rocky Linux 8.
- CentOS 9 Stream, Alma Linux 9, Rocky Linux 9.
On this page you can switch between blocks of code to view the commands applicable to your version of the OS
Passwork is not resource-heavy. How much disk space, RAM and CPU power you will need depends on the number of active users, the amount of stored data, and your requirements for fault-tolerance.
See the full system requirements
If your server has 2-4 GB of RAM, we recommend enabling the SWAP file for libraries to compile properly.
First, gain root access and update the local packages:
Then, install web-server Apache2 and curl data transfer tool:
Run httpd.service:
And enable autostart:
Install the dynamically managed firewall Firewalld:
Run firewalld.service:
Enable autostart:
Allow HTTP services in firewalld:
Allow HTTPS services in firewalld:
And apply the changes to firewalld:
Edit the /etc/selinux/config configuration file:
Change theSELINUX parameter from enforcing to disabled:
Save the changes (Ctrl+O) and exit the terminal (Ctrl+X). Then, restart your system to apply the changes to SELinux:
Install the EPEL package and YUM package management tool:
Download and install the latest EPEL repository:
Download and install the repository for access to PHP versions:
Enable the PHP 8.3 modile from REMI repository:
Install PHP and its extensions:
Install a PHP MongoDB driver:
Create configuration files for PHP MongoDB startup and activation:
Get the location of the opcache configuration file:
Edit the configuration file:
Add the following lines to the configuration file:
Create a file to add MongoDB into YUM package manager
Add the following lines into the file:
Install MongoDB:
Run mongod.service:
And enable autostart:
Go to the Passwork customer portal and copy the certificate number for the Release Candidate:

Verify the available release candidate version of Passwork from the customer portal using the copied certificate number by query:
You need to make sure that a release candidate version of Passwork is available for downloading — 07xxxxxx
Get Passwork using a query:
Unzip the release candidate version of Passwork to a physical location:
Give apache owner privileges for the files and directories:
Open the virtual host configuration file for HTTP:
Edit the file so it looks as follows:
Restart the web server (httpd.service):
You can open http://passwork.local or http://127.0.0.1 to test your Passwork connection
When you connect to Passwork for the first time, you will need to go over the checklist that includes:
- Automatic parameter checking
- Checking connection to MongoDB database
Change the connection to MongoDB to the address — mongodb://localhost:27017
- Generating an encryption key for MongoDB
- License verification
After finishing the checklist, you will be offered to create the first Passwork user and set their login, password and email address for notifications.
This user is always local and the owner of Passwork by default, in case of assigning LDAP/SSO user an owner, it will automatically become local and you will not be able to authorise in Passwork
Install a SSL module for Apache2:
Create a new directory to store the private key and the certificate in:
Use OpenSSL to generate a self-signed X.509 certificate for Apache2:
- Common Name (CN) — Specify the IP of your server or host. This field is important, as the certificate should match the domain or IP of your website;
- subjectAltName (SAN) — Альтернативное имя домена или IP-адрес.
Generate Diffie-Hellman parameters with the key length of 2048:
Add Diffie-Hellman parameters to the self-signed certificate:
Give root access to the user to secure the private key and the certificate:
Open the virtual host configuration file for HTTPS connection:
Find the section that starts with <VirtualHost _default_:443> and edit it as follows:
- Uncomment the DocumentRoot line and change the path to Passwork's root folder /var/www/public
- Uncomment the ServerName line and change www.example.com to the IP or the domain of the server (it should match the Common Name of the certificate):
- Add the <Directory> directive after ServerName:
- Comment the SSLProtocol and SSLCipherSuite lines:
- Update the paths to certificate files, which were generated earlier:
- After editing the file, check if the virtual host configuration file matches the example:
Restart the web server (httpd.service):
Check the HTTPS connection to Passwork using https://passwork.local
When using a secure SSL connection (HTTPS), client browsers require certain flags to process Passwork data.
If the session.cookie_secure flag is not set, browsers will not be able to establish a connection, which may result in authorization errors.
Enable the ;session.cookie_secure parameter in /etc/php.ini:
Do not set this parameter or reset it to its original value if you change your mind about using SSL and work over the HTTP protocol.
Background tasks are tasks that are executed by the scheduler in the background. For example, LDAP synchronisation, loading favicons, and other tasks that are time-consuming, persistent, or resource-allocating.
See a guide on setting up background tasks.