service side 106:Install puppet source RPM-IVH "http://yum.puppetlabs.com/el/6/products/x86_64/puppetlabs-release-6-7.noarch.rpm"Installing the service-side program Yum Install-y puppet-serverStart Service puppetmaster startBoot Chkconfig puppetmaster on2) on client 111:Install puppet source RPM-IVH "http://yum.puppetlabs.com/el/6/products/x86_64/puppetlabs-release-6-7.noarch.rpm"Installing the client program Yum install-y puppetModify the configuration file vi/etc/puppet/puppet.conf//Add under
I. HTTPS description with the daily network, information security is more and more important, the traditional website is the HTTP protocol plaintext transmission, and the HTTPS protocol is built by the SSL+HTTP protocol can be encrypted transmission, authentication network protocol, than the HTTP protocol security.That HTTPS is how to open, with the question itself also understand the principle of HTTPS configuration and on the Ubuntu server turned on HTTPS. Second, the configuration certific
. Generate a signing certificateGenerate certificate private key to Dnscrypt-wrapper--gen-crypt-keypair--crypt-secretkey-file=1.key generate signing certificate, default 365 days, can use-- Cert-file-expire-days Specify a valid time Dnscrypt-wrapper--gen-cert-file--crypt-secretkey-file=1.key--provider-cert-file=1. Cert3. The dnscrypt-wrapper process runs, listeni
Installation certificate file Description: 1. Certificate file 214077101580586.pem, contains two pieces of content, please do not delete any piece of content. 2. If it is a CSR created by the certificate system, it also contains: Certificate private key File 214077101580586.key, certificate public key file Public.pem, certificate chain file CHAIN.PEM. (1) Create the CERT directory under Apache's installation directory and copy all downloaded files to
machine) deploying multiple domain Name services.Nginx supports SNI in a way that automatically opens. When a client user is encountered that does not support this feature, Nginx typically returns the server certificate for the default site. For example, the following case, the client does not support SNI, Nginx return serversuning.pem . It is not guaranteed that the certificate can be correctly matched, which will bring unnecessary trouble and distress. Therefore, mobile-side development shoul
First, make sure that your Apache compiles the SSL module, which is the necessary condition to support SSL certificate (if not, compile, "open Phpstudy" "Other options Menu", "php extension", "Php-openssl" in front of the check box).Create the CERT directory under Apache's installation directory, and copy all downloaded files to the Cert directory.Open the httpd.conf file in the Conf directory under the Apa
OpenSSL docs, implies--ssl). --ssl-cert=name X509 cert in PEM format (implies--ssl). --ssl-cipher=name SSL CIPher to use (implies--ssl). --ssl-key=name X509 key in PEM format (implies--ssl). --ssl-verify-server-cert Verify server ' s "Common Name" in its cert against host Name used when connecting. This option was
ca-key.pem-set_serial 01-out client-cert.pem # sign client certificateSignature OKSubject =/C = CN/ST = Shanghai/L = Shanghai/O = CH/CN = mysqlclientGetting CA Private Key# Verify after generationShell> openssl verify-CAfile ca-cert.pem server-cert.pem client-cert.pemServer-cert.pem: OKClient-cert.pem: OK
After the above steps, the following file is generated:
The ca-cert.pem both on the server side and on the client side uses-ssl-ca = ca-cert.pemServer-cert.pem, server-key.pem server end speci
--disable-reconnect. This option is enabled by default. -s, --silent Be more silent. Print results with a tab as separator, each row on new line. -S, --socket=name The socket file to use for connection. --ssl Enable SSL for connection (automatically enabled with other flags).Disable with --skip-ssl. --ssl-ca=name CA file in PEM format (check OpenSSL docs, implies --ssl). --ssl-c
CA directory (check OpenSSL docs, implies -- ssl ).
-- Ssl-cert = name X509 cert in PEM format (implies -- ssl ).
-- Ssl-cipher = name SSL cipher to use (implies -- ssl ).
-- Ssl-key = name X509 key in PEM format (implies -- ssl ).
-- Ssl-verify-server-cert
Verify server's "Common Name" in its cert against
Hostname us
free SSL certificates such as let's encrypt, or create self-signed SSL certificates by yourself. Here I use OpenSSL to create my self-signed SSL certificate.
Create a new directory for the SSL file:
mkdir -p /etc/nginx/cert/
Use openssl to generate a new SSL certificate.
The code is as follows:
openssl req -new -x509 -days 365 -nodes -out /etc/nginx/cert/nextcloud.crt -keyout /etc/nginx/
@localhost identified by ' nextclouduser@ '; flush privileges;
nextcloud_db Database and nextclouduser database user creation complete
Step 4-Generate a self-signed SSL certificate for Nextcloud
In the tutorial, I'll have the client run Nextcloud with an HTTPS connection. You can use a free SSL certificate such as Let's encrypt, or create your own self-signed signed SSL certificate. Here I use OpenSSL to create my own self-signed SSL certificate.
To create a new directory for the SSL file:
Mk
+ environment + oaO4 + b7dtdq2/environment + w5rG + environment + temperature = "http://www.2cto.com/uploadfile/Collfiles/20131211/2013121109360487.jpg" alt = "\">
5. make PEM files for SSL and private keys (required by the php server)
A. Make the SSL (cert file) and key (private key) p12 format files respectively, obtained through export. (Note)
B. run the shell command on the terminal to obtain two PEM files of SSL and key, and combine them into o
/environment + w5rG + environment + temperature = "http://www.Bkjia.com/uploadfile/Collfiles/20131211/2013121109360487.jpg" alt = "\">
5. make PEM files for SSL and private keys (required by the php server)
A. Make the SSL (cert file) and key (private key) p12 format files respectively, obtained through export. (Note)
B. run the shell command on the terminal to obtain two PEM files of SSL and key, and combine them into one.
The command paramet
Apns (Apple push notication service) is supported after IOS 3.0. The following describes how to configure the apns service. Apns consists of two parts: client and server: Client: 1. Create an app ID. If you are already a registered Apple user (at least a developer ). Log on to Apple Developer Program portal 2 and create an app ID. Click Configure. Select support apns and select your development certificate (CSR) according to the steps ). Download the CER file and double-click Install (Apple deve
cert for each website, delete the account user group, and add Cert to the guest user group. The password cannot be changed, and the password will never expire.
2. Set folder Permissions
1. Set non-site-related Directory Permissions
After windows is installed, many directories and files can be viewed, viewed, run, or even modified by default by everyone. This poses a great risk to server security. Here
because the attempt to import the private key has not been successful, and it does not matter for the time being. The replacement scheme for verifying the successful interaction will be discussed later.
2. Let's take a look at the RSA implementation scheme of OpenSSL. OpenSSL provides many padding methods,
Because CryptoAPI only provides PKCS1 and OAEP filling methods. PKCS1 is used by default, so PKCS1 is used for verification.
1) first, you need to import the certificate and private key for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.