--- loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2011/05/26 01:08:09 1.1
+++ loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2014/04/25 16:02:41 1.6
@@ -6,7 +6,7 @@ via SSL (Secure Sockets Layer):
\item Encrypted web pages served by Apache via port 443.
In this case, client requests will be for URLs beginning https://.
\item Encrypted internal communication between LON-CAPA servers via port 5663.
-
+\end{itemize}
\textbf{Apache SSL}
@@ -40,12 +40,12 @@ You will then put the the (nopass) key a
accessible to Apache, and include information about the locations of those files
in a config file containing the following lines:
\begin{quote}
- SSLCertificateFile
+ SSLCertificateFile $<$path to signed certificate$>$
\end{quote}
\begin{quote}
- SSLCertificateKeyFile
+ SSLCertificateKeyFile $<$path to key$>$
\end{quote}
-replacing with the path to the location of the particular file.
+replacing $<$path to ...$>$ with the path to the location of the particular file.
Which Apache config file contains these entries depends on the distro:
@@ -94,7 +94,7 @@ loncapa\_rewrite.conf with the following
\begin{itemize}
\item CentOS/RedHat/Scientific Linux/Fedora
\begin{quote}
-\emph{cp /etc/httpd/conf/rewrites/loncapa\_rewrite.conf /etc/httpd/conf/loncapa\_rewrite.conf}
+\emph{cp /etc/httpd/conf/rewrites/loncapa\_rewrite\_on.conf /etc/httpd/conf/loncapa\_rewrite.conf}
\end{quote}
\item SuSE/SLES/Debian/Ubuntu LTS
\begin{quote}
@@ -106,15 +106,15 @@ and then reload the web server:
\begin{itemize}
\item CentOS/RedHat/Scientific Linux/Fedora
\begin{quote}
-\emph{cp /etc/init.d/httpd reload}
+\emph{/etc/init.d/httpd reload}
\end{quote}
\item SuSE/SLES/Debian/Ubuntu LTS
\begin{quote}
-\emph{cp /etc/init.d/apache2 reload}
+\emph{/etc/init.d/apache2 reload}
\end{quote}
\end{itemize}
-If you want to disable rewriting of external web requests to https://, copy
+To disable rewriting of external web requests to https://, copy
rewrites/loncapa\_rewrite\_off.conf to loncapa\_rewrite.conf and reload the web
server.
@@ -130,7 +130,7 @@ You will need to open the server's Firew
\end{quote}
\item SuSE/SLES
\begin{quote}
-yast -\> Security and Users -> Firewall
+yast -$>$ Security and Users -$>$ Firewall
\end{quote}
\item Debian 6/Ubuntu LTS
\begin{quote}
@@ -158,8 +158,8 @@ commands:
\textbf{Important}: for the Common Name you should enter the lonHostID.
This is displayed on the log-in page (Server: ) and is also an entry in the
-loncapa.conf file in /etc/httpd/conf (CentOS/RedHat/Scientific Linux/Fedora)
-or /etc/apache2 (SuSE/SLES/Debian/Ubuntu LTS). An example would be msul1.
+loncapa.conf file in /etc/httpd/conf (CentOS RedHat Scientific Linux Fedora)
+or /etc/apache2 (SuSE SLES Debian Ubuntu LTS). An example would be msul1.
By running \emph{request\_ssl\_key.sh} you will:
\begin{itemize}
@@ -177,7 +177,7 @@ Your certificate will be signed by the c
will be sent to the e-mail address you gave when prompted for one
when you ran request\_ssl\_key.sh.
-Save the email you receive to a file, remove the headers from it,
+Save the e-mail you receive to a file, remove the headers from it,
and run it (as the \emph{www} user).
If it successfully completes you will have: