--- loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2011/05/26 13:29:44 1.3
+++ loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2014/04/25 16:02:41 1.6
@@ -40,12 +40,12 @@ You will then put the the (nopass) key a
accessible to Apache, and include information about the locations of those files
in a config file containing the following lines:
\begin{quote}
- SSLCertificateFile \textless path to signed certificate\textgreater
+ SSLCertificateFile $<$path to signed certificate$>$
\end{quote}
\begin{quote}
- SSLCertificateKeyFile \textless path to key\textgreater
+ SSLCertificateKeyFile $<$path to key$>$
\end{quote}
-replacing \textless path to ...\textgreater with the path to the location of the particular file.
+replacing $<$path to ...$>$ with the path to the location of the particular file.
Which Apache config file contains these entries depends on the distro:
@@ -106,11 +106,11 @@ and then reload the web server:
\begin{itemize}
\item CentOS/RedHat/Scientific Linux/Fedora
\begin{quote}
-\emph{cp /etc/init.d/httpd reload}
+\emph{/etc/init.d/httpd reload}
\end{quote}
\item SuSE/SLES/Debian/Ubuntu LTS
\begin{quote}
-\emph{cp /etc/init.d/apache2 reload}
+\emph{/etc/init.d/apache2 reload}
\end{quote}
\end{itemize}
@@ -130,7 +130,7 @@ You will need to open the server's Firew
\end{quote}
\item SuSE/SLES
\begin{quote}
-yast -\textgreater Security and Users -\textgreater Firewall
+yast -$>$ Security and Users -$>$ Firewall
\end{quote}
\item Debian 6/Ubuntu LTS
\begin{quote}
@@ -177,7 +177,7 @@ Your certificate will be signed by the c
will be sent to the e-mail address you gave when prompted for one
when you ran request\_ssl\_key.sh.
-Save the email you receive to a file, remove the headers from it,
+Save the e-mail you receive to a file, remove the headers from it,
and run it (as the \emph{www} user).
If it successfully completes you will have: