The Piranha Configuration Tool prompts for a valid username
and password combination. However, because all of the data passed to the
Piranha Configuration Tool is in plain text, it is recommended
that you restrict access only to trusted networks or to the local
machine.
The easiest way to restrict access is to use the Apache HTTP Server's built in
access control mechanisms by editing
/etc/sysconfig/ha/web/secure/.htaccess. After
altering the file you do not have to restart the
piranha-gui service because the server checks the
.htaccess file each time it accesses the directory.
By default, the access controls for this directory allow
anyone to view the contents of the directory. Here is what the
default access looks like:
Order deny,allow
Allow from all |
To limit access of the Piranha Configuration Tool to only the
localhost change the .htaccess file to allow access
from only the loopback device (127.0.0.1). For more information on the
loopback device, see the chapter titled Network
Scripts in the Red Hat Enterprise Linux Reference Guide.
Order deny,allow
Deny from all
Allow from 127.0.0.1 |
You can also allow specific hosts or subnets as seen in this example:
Order deny,allow
Deny from all
Allow from 192.168.1.100
Allow from 172.16.57 |
In this example, only Web browsers from the machine with the IP
address of 192.168.1.100 and machines on the 172.16.57/24 network can
access the Piranha Configuration Tool.
| Caution |
---|
| Editing the Piranha Configuration Tool
.htaccess file limits access to the configuration
pages in the /etc/sysconfig/ha/web/secure/
directory but not to the login and the help pages in
/etc/sysconfig/ha/web/. To limit access to this
directory, create a .htaccess file in the
/etc/sysconfig/ha/web/ directory with
order, allow, and
deny lines identical to
/etc/sysconfig/ha/web/secure/.htaccess.
|