# Client Area Configuration
The Client Area is the front-end interface dedicated to your end users. It allows clients to manage their services, access IPMI consoles and perform other account-related actions.
In EasyDCIM 1.25.0+, the Client Area runs as a Docker-based service managed by easydcim-control. For the general CLI workflow, see Docker Management with easydcim-control.
# Deployment modes
# Local Client Area (same host as EasyDCIM)
This is the default mode for a standard single-server deployment.
- It is usually installed automatically by
easydcim-control app install. - It uses ports 8444 (HTTP) and 8443 (HTTPS).
- It is exposed through the built-in
/clientpath on the main EasyDCIM domain. - It shares the same SSL configuration as the main EasyDCIM App.
# External Client Area (separate host)
Use this mode when you want the Client Area to run on a different server or a dedicated public domain.
- It uses ports 80 (HTTP) and 443 (HTTPS).
- It is available directly at the root of its own domain or subdomain.
- It communicates with the EasyDCIM backend through APIv3.
- SSL is managed independently from the main EasyDCIM App.
# Requirements
Before installing the Client Area, make sure that the target environment meets the following requirements.
System requirements:
- Debian 12 (bookworm) or Debian 13 (trixie)
- root or
sudoaccess - at least 4 GB RAM and 4 vCPU (recommended minimum)
Network requirements:
- The Client Area host must be able to communicate with the EasyDCIM backend over HTTP/HTTPS.
- If you use proxied noVNC sessions, allow communication required for Websockify traffic as described later in this guide.
# Backend configuration fields
Within the Settings → Basic → Client Area section, you can configure all backend parameters related to the Client Area connection and behavior:
- Client Area Mode – Defines where the Client Area is hosted:
- Local – Installed and integrated directly within the EasyDCIM instance (default).
- External – Hosted on a separate remote server.
- Client Area Branding – Opens the Branding Editor, where you can adjust the logo, colors, and theme elements visible to clients.
- Client Area Version – Displays the currently installed version of the Client Area package.
- Default Client Area Language – Specifies the language displayed by default to all users upon first login.
- Disable Client Area – Allows you to temporarily deactivate client access. When enabled, the client interface becomes unavailable to end users.
# Installation
# Local installation
If you want the Client Area on the same host as EasyDCIM, the recommended workflow is simply:
sudo easydcim-control app install --key 'LICENSE_KEY'
The local Client Area is installed automatically unless you use --no-client.
# External installation
To deploy the Client Area on a separate server, install easydcim-control on that server and run:
sudo easydcim-control client install --mode external --backend-url "https://demo.easydcim.com" --app-token "34|aVsfnLAjLHaMrFP6xlq8OJPacRVsU3gz3HIvCtSb701d64d1"
You can copy the backend URL and application token from Settings → Basic → Client Area in the EasyDCIM backend.
# Updating the Client Area
To update an existing Client Area installation, run:
sudo easydcim-control client update
To verify the service after the update:
easydcim-control client status
easydcim-control client logs
# SSL Configuration
SSL management commands are available only for an external Client Area deployment. A local Client Area automatically uses the SSL configuration of the main EasyDCIM App.
# Free SSL (Let’s Encrypt)
sudo easydcim-control client ssl letsencrypt install client.example.com
sudo easydcim-control client ssl letsencrypt renew
sudo easydcim-control client ssl letsencrypt remove
# Paid or custom SSL certificates
sudo easydcim-control client ssl install /etc/ssl/mydomain/fullchain.pem /etc/ssl/mydomain/privkey.pem
After configuring the certificate, update the Client Area URL field in Settings → Basic → Client Area to the final HTTPS URL, for example:
https://client.example.com
# noVNC Console Sessions
The Client Area provides built-in support for noVNC console sessions, enabling users to remotely access their devices directly through a web browser. All console traffic is securely proxied through the Client Area to the EasyDCIM backend.
When a session is initiated, the Client Area establishes a tunnel to EasyDCIM via the /websockify/<port> endpoint, ensuring compatibility with EasyDCIM’s native VNC service.
# Ports used by Client Area
- Local mode:
8444/TCP,8443/TCP - External mode:
80/TCP,443/TCP - Proxied noVNC sessions:
6081–6200/TCP
# Security note for external deployments
If you run the Client Area on a separate external server, you can limit public exposure of the EasyDCIM backend:
- expose only the Client Area publicly,
- keep the EasyDCIM backend behind a private network, VPN, or restricted routing,
- allow only the Client Area host to communicate with the EasyDCIM API and Websockify endpoints.
This is the recommended approach for distributed or higher-security environments.