archive-fr.com » FR » O » OBSPM.FR

Total: 155

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • mod_alias - Apache HTTP Server
    Directive Description Maps URLs to filesystem locations using regular expressions Syntax AliasMatch regex file path directory path Context server config virtual host Status Base Module mod alias This directive is equivalent to Alias but makes use of standard regular expressions instead of simple prefix matching The supplied regular expression is matched against the URL path and if it matches the server will substitute any parenthesized matches into the given string and use it as a filename For example to activate the icons directory one might use AliasMatch icons usr local apache icons 1 Redirect Directive Description Sends an external redirect asking the client to fetch a different URL Syntax Redirect status URL path URL Context server config virtual host directory htaccess Override FileInfo Status Base Module mod alias The Redirect directive maps an old URL into a new one The new URL is returned to the client which attempts to fetch it again with the new address URL path a decoded path any requests for documents beginning with this path will be returned a redirect error to a new encoded URL beginning with URL Example Redirect service http foo2 bar com service If the client requests http myserver service foo txt it will be told to access http foo2 bar com service foo txt instead Note Redirect directives take precedence over Alias and ScriptAlias directives irrespective of their ordering in the configuration file Also URL path must be an absolute path not a relative path even when used with htaccess files or inside of Directory sections If no status argument is given the redirect will be temporary HTTP status 302 This indicates to the client that the resource has moved temporarily The status argument can be used to return other HTTP status codes permanent Returns a permanent redirect status 301 indicating that the resource has moved permanently temp Returns a temporary redirect status 302 This is the default seeother Returns a See Other status 303 indicating that the resource has been replaced gone Returns a Gone status 410 indicating that the resource has been permanently removed When this status is used the URL argument should be omitted Other status codes can be returned by giving the numeric status code as the value of status If the status is between 300 and 399 the URL argument must be present otherwise it must be omitted Note that the status must be known to the Apache code see the function send error response in http protocol c Example Redirect permanent one http example com two Redirect 303 three http example com other RedirectMatch Directive Description Sends an external redirect based on a regular expression match of the current URL Syntax RedirectMatch status regex URL Context server config virtual host directory htaccess Override FileInfo Status Base Module mod alias This directive is equivalent to Redirect but makes use of standard regular expressions instead of simple prefix matching The supplied regular expression is matched against the URL path and if it matches the server will

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_alias.html (2015-11-16)
    Open archived version from archive


  • mod_asis - Apache HTTP Server
    used to send any kind of data from the server including redirects and other special HTTP responses without requiring a cgi script or an nph script For historical reasons this module will also process any file with the mime type httpd send as is Directives This module provides no directives Topics Usage See also mod headers mod cern meta Apache s Handler Use Usage In the server configuration file associate files with the send as is handler e g AddHandler send as is asis The contents of any file with a asis extension will then be sent by Apache to the client with almost no changes Clients will need HTTP headers to be attached so do not forget them A Status header is also required the data should be the 3 digit HTTP response code followed by a textual message Here s an example of a file whose contents are sent as is so as to tell the client that a file has redirected Status 301 Now where did I leave that URL Location http xyz abc com foo bar html Content type text html html head title Lame excuses R us title head body h1 Fred s exceptionally wonderful

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_asis.html (2015-11-16)
    Open archived version from archive

  • mod_auth - Apache HTTP Server
    mod auth dbm mod auth msql and mod auth anon These modules supply the bulk of the user credential checking but a few administrator related accesses fall through to a lower level with a well protected AuthUserFile By default control is not passed on and an unknown userID or rule will result in an Authentication Required reply Not setting it thus keeps the system secure and forces an NCSA compliant behaviour Security Do consider the implications of allowing a user to allow fall through in his htaccess file and verify that this is really what you want Generally it is easier to just secure a single htpasswd file than it is to secure a database such as mSQL Make sure that the AuthUserFile and the AuthGroupFile are stored outside the document tree of the web server do not put them in the directory that they protect Otherwise clients will be able to download the AuthUserFile and the AuthGroupFile AuthGroupFile Directive Description Sets the name of a text file containing the list of user groups for authentication Syntax AuthGroupFile file path Context directory htaccess Override AuthConfig Status Base Module mod auth The AuthGroupFile directive sets the name of a textual file containing the list of user groups for user authentication File path is the path to the group file If it is not absolute it is treated as relative to the ServerRoot Each line of the group file contains a groupname followed by a colon followed by the member usernames separated by spaces Example mygroup bob joe anne Note that searching large text files is very inefficient AuthDBMGroupFile provides a much better performance Security Make sure that the AuthGroupFile is stored outside the document tree of the web server do not put it in the directory that it protects Otherwise clients

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_auth.html (2015-11-16)
    Open archived version from archive

  • mod_auth_anon - Apache HTTP Server
    entered in the passwd field are logged to the error log file Anonymous LogEmail Excerpt of httpd conf Anonymous NoUserId off Anonymous MustGiveEmail on Anonymous VerifyEmail on Anonymous LogEmail on Anonymous anonymous guest www test welcome AuthName Use anonymous Email address for guest entry AuthType basic An AuthUserFile AuthDBUserFile AuthDBMUserFile directive must be specified or use Anonymous Authoritative for public access In the htaccess for the public directory add Files Order Deny Allow Allow from all Require valid user Files Anonymous Directive Description Specifies userIDs that areallowed access without password verification Syntax Anonymous user user Context directory htaccess Override AuthConfig Status Extension Module mod auth anon A list of one or more magic userIDs which are allowed access without password verification The userIDs are space separated It is possible to use the and quotes to allow a space in a userID as well as the escape character Please note that the comparison is case IN sensitive I strongly suggest that the magic username anonymous is always one of the allowed userIDs Example Anonymous anonymous Not Registered I don t know This would allow the user to enter without password verification by using the userIDs anonymous AnonyMous Not Registered and I Don t Know Anonymous Authoritative Directive Description Configures if authorization will fall through to other methods Syntax Anonymous Authoritative On Off Default Anonymous Authoritative Off Context directory htaccess Override AuthConfig Status Extension Module mod auth anon When set On there is no fall through to other authentication methods So if a userID does not match the values specified in the Anonymous directive access is denied Be sure you know what you are doing when you decide to switch it on And remember that the order in which the Authentication modules are queried is defined in the modules c files at

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_auth_anon.html (2015-11-16)
    Open archived version from archive

  • mod_auth_dbm - Apache HTTP Server
    such as mod auth Whereas this DBM module supplies the bulk of the user credential checking a few administrator related accesses fall through to a lower level with a well protected htpasswd file By default control is not passed on and an unknown userID or rule will result in an Authentication Required reply Not setting it thus keeps the system secure and forces an NCSA compliant behaviour Security Do consider the implications of allowing a user to allow fall through in his htaccess file and verify that this is really what you want Generally it is easier to just secure a single htpasswd file than it is to secure a database which might have more access interfaces AuthDBMGroupFile Directive Description Sets the name of the database file containing the list of user groups for authentication Syntax AuthDBMGroupFile file path Context directory htaccess Override AuthConfig Status Extension Module mod auth dbm The AuthDBMGroupFile directive sets the name of a DBM file containing the list of user groups for user authentication File path is the absolute path to the group file The group file is keyed on the username The value for a user is a comma separated list of the groups to which the users belongs There must be no whitespace within the value and it must never contain any colons Security make sure that the AuthDBMGroupFile is stored outside the document tree of the web server do not put it in the directory that it protects Otherwise clients will be able to download the AuthDBMGroupFile unless otherwise protected Combining Group and Password DBM files In some cases it is easier to manage a single database which contains both the password and group details for each user This simplifies any support programs that need to be written they now only have to deal with writing to and locking a single DBM file This can be accomplished by first setting the group and password files to point to the same DBM AuthDBMGroupFile www userbase AuthDBMUserFile www userbase The key for the single DBM is the username The value consists of Unix Crypt ed Password List of Groups ignored The password section contains the encrypted password as before This is followed by a colon and the comma separated list of groups Other data may optionally be left in the DBM file after another colon it is ignored by the authentication module This is what www telescope org uses for its combined password and group database AuthDBMType Directive Description Sets the type of database file that is used to store passwords Syntax AuthDBMType default SDBM GDBM NDBM DB Default AuthDBMType default Context directory htaccess Override AuthConfig Status Extension Module mod auth dbm Compatibility Available in version 2 0 30 and later Sets the type of database file that is used to store the passwords The default database type is determined at compile time The availability of other types of database files also depends on compile time settings It is crucial that whatever program you

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_auth_dbm.html (2015-11-16)
    Open archived version from archive

  • mod_auth_digest - Apache HTTP Server
    which are in the same protection space i e use the same realm and username password info The specified URIs are prefixes i e the client will assume that all URIs below these are also protected by the same username password The URIs may be either absolute URIs i e inluding a scheme host port etc or relative URIs This directive should always be specified and contain at least the set of root URI s for this space Omitting to do so will cause the client to send the Authorization header for every request sent to this server Apart from increasing the size of the request it may also have a detrimental effect on performance if AuthDigestNcCheck is on The URIs specified can also point to different servers in which case clients which understand this will then share username password info across multiple servers without prompting the user each time AuthDigestFile Directive Description Location of the text file containing the list of users and encoded passwords for digest authentication Syntax AuthDigestFile file path Context directory htaccess Override AuthConfig Status Experimental Module mod auth digest The AuthDigestFile directive sets the name of a textual file containing the list of users and encoded passwords for digest authentication File path is the absolute path to the user file The digest file uses a special format Files in this format can be created using the htdigest utility found in the support subdirectory of the Apache distribution AuthDigestGroupFile Directive Description Name of the text file containing the list of groups for digest authentication Syntax AuthDigestGroupFile file path Context directory htaccess Override AuthConfig Status Experimental Module mod auth digest The AuthDigestGroupFile directive sets the name of a textual file containing the list of groups and their members user names File path is the absolute path to the group file Each line of the group file contains a groupname followed by a colon followed by the member usernames separated by spaces Example mygroup bob joe anne Note that searching large text files is very inefficient Security Make sure that the AuthGroupFile is stored outside the document tree of the web server do not put it in the directory that it protects Otherwise clients may be able to download the AuthGroupFile AuthDigestNcCheck Directive Description Enables or disables checking of the nonce count sent by the server Syntax AuthDigestNcCheck On Off Default AuthDigestNcCheck Off Context server config Status Experimental Module mod auth digest Not implemented yet AuthDigestNonceFormat Directive Description Determines how the nonce is generated Syntax AuthDigestNonceFormat format Context directory htaccess Override AuthConfig Status Experimental Module mod auth digest Not implemented yet AuthDigestNonceLifetime Directive Description How long the server nonce is valid Syntax AuthDigestNonceLifetime seconds Default AuthDigestNonceLifetime 300 Context directory htaccess Override AuthConfig Status Experimental Module mod auth digest The AuthDigestNonceLifetime directive controls how long the server nonce is valid When the client contacts the server using an expired nonce the server will send back a 401 with stale true If seconds is greater than 0 then it specifies

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_auth_digest.html (2015-11-16)
    Open archived version from archive

  • mod_auth_ldap - Apache HTTP Server
    similar to the previous one but is uses the common name instead of the UID Note that this could be problematical if multiple people in the directory share the same cn because a search on cn must return exactly one entry That s why this approach is not recommended it s a better idea to choose an attribute that is guaranteed unique in your directory such as uid AuthLDAPURL ldap ldap airius com ou People o Airius cn require valid user Grant access to anybody in the Administrators group The users must authenticate using their UID AuthLDAPURL ldap ldap airius com o Airius uid require group cn Administrators o Airius The next example assumes that everyone at Airius who carries an alphanumeric pager will have an LDAP attribute of qpagePagerID The example will grant access only to people authenticated via their UID who have alphanumeric pagers AuthLDAPURL ldap ldap airius com o Airius uid qpagePagerID require valid user The next example demonstrates the power of using filters to accomplish complicated administrative requirements Without filters it would have been necessary to create a new LDAP group and ensure that the group s members remain synchronized with the pager users This becomes trivial with filters The goal is to grant access to anyone who has a filter plus grant access to Joe Manager who doesn t have a pager but does need to access the same resource AuthLDAPURL ldap ldap airius com o Airius uid qpagePagerID uid jmanager require valid user This last may look confusing at first so it helps to evaluate what the search filter will look like based on who connects as shown below The text in blue is the part that is filled in using the attribute specified in the URL The text in red is the part that is filled in using the filter specified in the URL The text in green is filled in using the information that is retrieved from the HTTP client If Fred User connects as fuser the filter would look like qpagePagerID uid jmanager uid fuser The above search will only succeed if fuser has a pager When Joe Manager connects as jmanager the filter looks like qpagePagerID uid jmanager uid jmanager The above search will succeed whether jmanager has a pager or not Using TLS To use TLS see the mod ldap directives LDAPTrustedCA and LDAPTrustedCAType Using SSL To use SSL see the mod ldap directives LDAPTrustedCA and LDAPTrustedCAType To specify a secure LDAP server use ldaps in the AuthLDAPURL directive instead of ldap Using Microsoft FrontPage with mod auth ldap Normally FrontPage uses FrontPage web specific user group files i e the mod auth module to handle all authentication Unfortunately it is not possible to just change to LDAP authentication by adding the proper directives because it will break the Permissions forms in the FrontPage client which attempt to modify the standard text based authorization files Once a FrontPage web has been created adding LDAP authentication to it is a matter of adding the following directives to every htaccess file that gets created in the web AuthLDAPURL the url AuthLDAPAuthoritative off AuthLDAPFrontPageHack on AuthLDAPAuthoritative must be off to allow mod auth ldap to decline group authentication so that Apache will fall back to file authentication for checking group membership This allows the FrontPage managed group file to be used How It Works FrontPage restricts access to a web by adding the require valid user directive to the htaccess files If AuthLDAPFrontPageHack is not on the require valid user directive will succeed for any user who is valid as far as LDAP is concerned This means that anybody who has an entry in the LDAP directory is considered a valid user whereas FrontPage considers only those people in the local user file to be valid The purpose of the hack is to force Apache to consult the local user file which is managed by FrontPage instead of LDAP when handling the require valid user directive Once directives have been added as specified above FrontPage users will be able to perform all management operations from the FrontPage client Caveats When choosing the LDAP URL the attribute to use for authentication should be something that will also be valid for putting into a mod auth user file The user ID is ideal for this When adding users via FrontPage FrontPage administrators should choose usernames that already exist in the LDAP directory for obvious reasons Also the password that the administrator enters into the form is ignored since Apache will actually be authenticating against the password in the LDAP database and not against the password in the local user file This could cause confusion for web administrators Apache must be compiled with mod auth in order to use FrontPage support This is because Apache will still use the mod auth group file for determine the extent of a user s access to the FrontPage web The directives must be put in the htaccess files Attempting to put them inside Location or Directory directives won t work This is because mod auth ldap has to be able to grab the AuthUserFile directive that is found in FrontPage htaccess files so that it knows where to look for the valid user list If the mod auth ldap directives aren t in the same htaccess file as the FrontPage directives then the hack won t work because mod auth ldap will never get a chance to process the htaccess file and won t be able to find the FrontPage managed user file AuthLDAPAuthoritative Directive Description Prevent other authentication modules from authenticating the user if this one fails Syntax AuthLDAPAuthoritative on off Default AuthLDAPAuthoritative on Context directory htaccess Override AuthConfig Status Experimental Module mod auth ldap Set to off if this module should let other authentication modules attempt to authenticate the user should authentication with this module fail Control is only passed on to lower modules if there is no DN or rule that matches the supplied user

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_auth_ldap.html (2015-11-16)
    Open archived version from archive

  • mod_autoindex - Apache HTTP Server
    ending in name for FancyIndexing Icon is either a escaped relative URL to the icon or of the format alttext url where alttext is the text tag given for an icon for non graphical browsers Name is either DIRECTORY for directories BLANKICON for blank lines to format the list correctly a file extension a wildcard expression a partial filename or a complete filename Examples AddIcon IMG icons image xbm png jpg xbm AddIcon icons dir xbm DIRECTORY AddIcon icons backup xbm AddIconByType should be used in preference to AddIcon when possible AddIconByEncoding Directive Description Icon to display next to files selected by MIME content encoding Syntax AddIconByEncoding icon MIME encoding MIME encoding Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex This sets the icon to display next to files with FancyIndexing Icon is either a escaped relative URL to the icon or of the format alttext url where alttext is the text tag given for an icon for non graphical browsers MIME encoding is a wildcard expression matching required the content encoding Example AddIconByEncoding icons compress xbm x compress AddIconByType Directive Description Icon to display next to files selected by MIME content type Syntax AddIconByType icon MIME type MIME type Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex This sets the icon to display next to files of type MIME type for FancyIndexing Icon is either a escaped relative URL to the icon or of the format alttext url where alttext is the text tag given for an icon for non graphical browsers MIME type is a wildcard expression matching required the mime types Example AddIconByType IMG icons image xbm image DefaultIcon Directive Description Icon to display for files when no specific icon is configured Syntax DefaultIcon url path Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex The DefaultIcon directive sets the icon to display for files when no specific icon is known for FancyIndexing Url path is a escaped relative URL to the icon Example DefaultIcon icon unknown xbm HeaderName Directive Description Name of the file that will be inserted at the top of the index listing Syntax HeaderName filename Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex The HeaderName directive sets the name of the file that will be inserted at the top of the index listing Filename is the name of the file to include Example HeaderName HEADER html Both HeaderName and ReadmeName now treat Filename as a URI path relative to the one used to access the directory being indexed If Filename begins with a slash it will be taken to be relative to the DocumentRoot Example HeaderName include HEADER html Filename must resolve to a document with a major content type of text e g text html text plain etc This means that filename may refer to a CGI script if the script s actual file type as opposed to its output is marked as text html such as with a directive like AddType text html cgi Content negotiation will be performed if Options MultiViews is in effect If filename resolves to a static text html document not a CGI script and either one of the options Includes or IncludesNOEXEC is enabled the file will be processed for server side includes see the mod include documentation If the file specified by HeaderName contains the beginnings of an HTML document html head etc then you will probably want to set IndexOptions SuppressHTMLPreamble so that these tags are not repeated IndexIgnore Directive Description Adds to the list of files to hide when listing a directory Syntax IndexIgnore file file Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex The IndexIgnore directive adds to the list of files to hide when listing a directory File is a file extension partial filename wildcard expression or full filename for files to ignore Multiple IndexIgnore directives add to the list rather than the replacing the list of ignored files By default the list contains the current directory IndexIgnore README htaccess IndexOptions Directive Description Various configuration settings for directory indexing Syntax IndexOptions option option Context server config virtual host directory htaccess Override Indexes Status Base Module mod autoindex The IndexOptions directive specifies the behavior of the directory indexing Option can be one of DescriptionWidth n Apache 2 0 23 and later The DescriptionWidth keyword allows you to specify the width of the description column in characters DescriptionWidth or unset allows mod autoindex to calculate the best width DescriptionWidth n fixes the column width to n bytes wide DescriptionWidth grows the column to the width necessary to accommodate the longest description string See the section on AddDescription for dangers inherent in truncating descriptions FancyIndexing This turns on fancy indexing of directories FoldersFirst Apache 2 0 23 and later If this option is enabled subdirectory listings will always appear first followed by normal files in the directory The listing is basically broken into two components the files and the subdirectories and each is sorted separately and then displayed subdirectories first For instance if the sort order is descending by name and FoldersFirst is enabled subdirectory Zed will be listed before subdirectory Beta which will be listed before normal files Gamma and Alpha This option only has an effect if FancyIndexing is also enabled HTMLTable Experimental Apache 2 0 23 and later This experimental option with FancyIndexing constructs a simple table for the fancy directory listing Note this will confuse older browsers It is particularly necessary if file names or description text will alternate between left to right and right to left reading order as can happen on WinNT or other utf 8 enabled platforms IconsAreLinks This makes the icons part of the anchor for the filename for fancy indexing IconHeight pixels Presence of this option when used with IconWidth will cause the server to include height and width attributes in the img tag for the

    Original URL path: http://ama09.obspm.fr/manual-2.0/mod/mod_autoindex.html (2015-11-16)
    Open archived version from archive



  •