Implementation of WEB-httpd user authentication control and https on httpd in CentOS
We can configure httpd by setting user authentication and implementing https encrypted transmission experiments. The following are the requirements of this
Httpd-2.2 and httpd-2.4 Build Secure http service based on VirtualHost
Directory:I. CentOS6 use httpd-2.2 to build httpd service based on Domain NameIi. centos7 use httpd2.4 to build httpd services based on domain names3. centos6 compile and install
Objective:Location of HTTP in the OSI:In the OSI seven-tier model, HTTP (Hyper Text Tranfer protocol) is located on the seventh tier of the application layer, a protocol that is local to the network host connection, partly based on the TCP protocol
Environment deployment:
this experiment to redhat6.5 system as the installation object, (CentOS other series can also) install Apache source Package httpd-2.4.29.tar.bz2 Dependency Package pcre-8.41.tar.gz, apr-1.6.3.tar.bz2,
SELinux is short for security-enhanced Linux. The traditional Linux permission controls the owner, group, and other rwx of files and directories, while SELinux uses the delegated access control, that is to say, to control the access of a process to
The book on the back, although some of the previously written on the httpd-2.2 on the common configuration has become very comprehensive, but there are some configurations we can not ignore:13. Status PageLoadModule Status_module
The purpose of this experiment is to CentOS7 the system, httpd-2.4 configuration of two virtual hosts , the following requirements:(1) Provide two name-based virtual hosts:www1.stuX.com, the page file directory is/WEB/VHOSTS/WWW1; The error log
Web website Service:Apache the famous open source Web Service software, maintenance operations by the ASF Free Software FundOfficial site: http://httpd.apache.org/http://www.netcraft.com/ for various Web detailed statistics on the market share of
Four machines in this article: Centos6.0
Lv1 and lv2 are used as the httpd frontend and keepalived for high availability. A virtual vip is provided for the client to access.
Node1 and node2 use the drbd technology to implement file image storage,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.