--- loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2011/05/26 13:29:44 1.3 +++ loncom/html/adm/help/tex/Domain_Configuration_SSL.tex 2014/04/25 16:02:41 1.6 @@ -40,12 +40,12 @@ You will then put the the (nopass) key a accessible to Apache, and include information about the locations of those files in a config file containing the following lines: \begin{quote} - SSLCertificateFile \textless path to signed certificate\textgreater + SSLCertificateFile $<$path to signed certificate$>$ \end{quote} \begin{quote} - SSLCertificateKeyFile \textless path to key\textgreater + SSLCertificateKeyFile $<$path to key$>$ \end{quote} -replacing \textless path to ...\textgreater with the path to the location of the particular file. +replacing $<$path to ...$>$ with the path to the location of the particular file. Which Apache config file contains these entries depends on the distro: @@ -106,11 +106,11 @@ and then reload the web server: \begin{itemize} \item CentOS/RedHat/Scientific Linux/Fedora \begin{quote} -\emph{cp /etc/init.d/httpd reload} +\emph{/etc/init.d/httpd reload} \end{quote} \item SuSE/SLES/Debian/Ubuntu LTS \begin{quote} -\emph{cp /etc/init.d/apache2 reload} +\emph{/etc/init.d/apache2 reload} \end{quote} \end{itemize} @@ -130,7 +130,7 @@ You will need to open the server's Firew \end{quote} \item SuSE/SLES \begin{quote} -yast -\textgreater Security and Users -\textgreater Firewall +yast -$>$ Security and Users -$>$ Firewall \end{quote} \item Debian 6/Ubuntu LTS \begin{quote} @@ -177,7 +177,7 @@ Your certificate will be signed by the c will be sent to the e-mail address you gave when prompted for one when you ran request\_ssl\_key.sh. -Save the email you receive to a file, remove the headers from it, +Save the e-mail you receive to a file, remove the headers from it, and run it (as the \emph{www} user). If it successfully completes you will have: