Jiiify is an experimental Java-based IIIF (Version 2, Level 0) image server built with Vert.x (an event-driven, non-blocking, reactive tool-kit). Jiiify is still in active development and does not yet have a stable release.

As a Level 0 IIIF image server, Jiiify does not generate images on-the-fly, but pre-generates the tiles and thumbnails necessary to use Mirador and OpenSeadragon (and perhaps other IIIF tiling clients). Archival images should be ingested into Jiiify so that tiles can be generated. It does not store these images, just the tiles and other derivatives (thumbnails, etc.) that are created. The archival images should continue to live in their repositories or on their separate archival file systems.

Note that in order to use Jiiify with Mirador, or other similar viewers, one must create IIIF Presentation API manifests and upload them into Jiiify using its Web-based administrative interface. There is not, currently, any mechanism for creating or editing IIIF presentation manifests within Jiiify itself. Currently, at my place of work, we use a script that builds a IIIF manifest from files on the file system and a CSV document with metadata.

Installing Jiiify

Since there are no stable releases, to install Jiiify you should follow the instructions in the project's GitHub README. This will build the code and start it on your machine.

Configuring Jiiify

Jiiify runs behind HTTPS by default. For testing purposes, a self-signed certificate is created with each new build and used when the server is run. If you want to use your own SSL certificate, you can change the jiiify.jks setting in the or supervisord.conf files (depending on which method you're using to run Jiiify). To change that value in both files at the point of build, you can supply -Djiiify.jks=/etc/your.jks to the build on the command line or store that value in your system's Maven settings.xml file.

If you'd like to use Let's Encrypt as a certificate provider, there is a script in the project's src/main/scripts folder that will convert a Let's Encrypt certificate to a JKS certificate. It makes the assumption that the Let's Encrypt certificates reside in /etc/letsencrypt/live/, which may not be the case for every Let's Encrypt client(?) In any case, it provides the basic steps needed to convert to a JKS keystore (paths can be adjusted as needed).

Other values that you might want to set at build time include: jiiify.memory,, jiiify.json.config.path, jiiify.logs.dir, jiiify.user,, and jiiify.solr.server.

These do not need to be set if you're just testing on localhost and using the script to run Jiiify, but if you want to run somewhere other than localhost you may want to change some of these values.

Configuring Authentication

The README in the project's GitHub repository will help you get Jiiify started, but you may want to configure the administrative interface's authentication system to use your own Google OAuth client ID instead of the default FreeLibrary placeholder that can be used for testing on localhost. To do this, you will need to have a Google account and to add your Google email address and Google client ID to the configuration file that's passed to Jiiify when it starts (Note: You will need to add your email address to this file even if you do not decide to configure a new Google OAuth client ID because the email addresses in there serve as a whitelist). For what it's worth, the current login system is just a temporary placeholder for a more developed authentication system. The stable release of Jiiify will probably offer multiple OAuth providers in addition to an htdigest option.

To get Google setup as an OAuth provider, you need to log into the API Manager in Google's Developer Console. Once there, you should follow the example in the screenshot below and configure "Authorized Javascript Origins" and the "Authorized Redirect URLs" values. If you're just testing on your localhost machine, the localhost values are the only ones you need to supply. If you want to test on a remote server, you'll need to include those domains as well. Make sure to include port numbers if you're running at a non-default HTTPS port (e.g. not 443). The out of the box test setting is to use port 8443.

Screenshot of API Manager in Google Developer Console

Ingesting Images

Once you can login to the administrative interface, you can ingest images into Jiiify. There are a couple of methods of doing this, but at this point just the CSV import will be described. To test this method you just need a CSV file in the format described by the screenshot below:

Screenshot of Jiiify CSV ingest page

If you'd like, you can use the test CSV file found at /home/kevin/Workspace/jiiify/target/test-classes/csv/test.csv after you've built the project. Its TIFF file should have been downloaded to your machine as a part of the build.

To start, select the Choose File button to upload your file and then click the upload button. If you've already ingested this batch of records, and want to overwrite what's in the system with new tiles, etc., make sure you click the "Overwrite existing data" checkbox. The submission of this form will return a page that indicates the ingest job has been started. In a while, the ingested object will appear in the "Browse" results page.

At this point, there isn't a nice view on the ingest process that will tell you how far along the process is and whether there were any errors. For the time being you can tail -f the log file or grep it for "ERROR" (without the quotes). A visual view into the process is obviously something that will be needed before Jiiify reaches a stable state and is officially released as a production ready piece of software. There is an underlying Vert.x supplied metrics package already integrated into Jiiify, but the ingest process needs to record events in it, and a nice visual Javascript viewer needs to be written (or borrowed from other sources).

If you want to view ingested images in Jiiify, you can visit the Browse page. Also on the browse page is an option to download a zip file of an ingested object, including all its tiles. This can be seen in the following screenshot:

Screenshot of Jiiify browse page

As a warning, there are parts of the administrative interface that are stubbed out, but do not yet function (for instance, the "refresh" links). There will be a notice of "Yet to be implemented" when navigating to them in the browser.

Ingesting Manifests

Lastly, to use Jiiify with Mirador, a IIIF Presentation API manifest needs to be created and uploaded into Jiiify through its administrative interface. This is just like uploading the CSV file with images. The option to do this can be found through the Ingest menu item:

Screenshot of Jiiify manifest ingest page

Like with CSV file ingests, if you want to overwrite a manifest that already exists in the system, the "Overwrite manifest if it already exists" checkbox needs to be clicked.

At my place of work we use a script that generates manifests from files on the file system and a supplied CSV metadata file. I'll try to include a link to it, here, in the near future, since others might find it useful, too.

Jiiify uses Mirador for the display of images from its browse page. To do this it creates a simple manifest for each item (in addition to the info.json file associated with each object). If you want to view either of these, there are links for them from the Browse page.

Future Work

There is still a lot of work to be done on Jiiify before I'd consider it stable and ready for general use. There should be corresponding tickets, but I'll list a few of the desired features here that I think need to be done before Jiiify is promoted as a tool others could/should use:

If you're interested in these or other features, you might be interested in the Architecture page (also under the Documentation drop down in the top menu).


Feel free to send me comments, suggestions, problems testing it, etc. This is definitely a work in progress and I'd be interested in hearing from others interested in its progress. There is also an issues queue if you run into a bug or something that could be improved and would like to report it.