Project

General

Profile

Library req » History » Version 31

Refik Hadzialic, 11/16/2011 02:41 PM

1 1 Triatmoko -
h1. Library requirement
2 1 Triatmoko -
3 31 Refik Hadzialic
h3. PJSUA Library (installation required only on server computer)
4 1 Triatmoko -
5 1 Triatmoko -
pjsua is an open source command line SIP user agent (softphone) that is used as the reference implementation for PJSIP, PJNATH, and PJMEDIA. Despite its simple command line appearance, it does pack many features!
6 1 Triatmoko -
7 29 Refik Hadzialic
This library is used for the SIP handler. More information about this library can be found on this web site http://www.pjsip.org/pjsua.htm
8 1 Triatmoko -
9 1 Triatmoko -
How to use the SIP library and how to install it will be explain here: [[SIP| SIP Handler]]
10 3 Triatmoko -
11 31 Refik Hadzialic
h3. SSH (installation required on both sides, server computer and BeagleBoard)
12 6 Triatmoko -
13 29 Refik Hadzialic
Secure Shell (SSH) is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server (running an SSH server program) and a client (running an SSH client program).[1].
14 6 Triatmoko -
15 29 Refik Hadzialic
Type the following to install it:
16 1 Triatmoko -
<pre>
17 1 Triatmoko -
sudo apt-get install ssh
18 1 Triatmoko -
</pre>
19 1 Triatmoko -
20 29 Refik Hadzialic
We need to configure the ssh connections to the nanoBTS controller boxes without typing the password. We can achieve this by copying the public key to the nanoBTS boxes.
21 29 Refik Hadzialic
22 29 Refik Hadzialic
One has to create first the private and public keys on the local machine(i.e. server computer, where the test software runs):
23 29 Refik Hadzialic
<pre>
24 29 Refik Hadzialic
refik@ubuntu:$ [Note: You are on local-host here]
25 29 Refik Hadzialic
26 29 Refik Hadzialic
refik@ubuntu:$ ssh-keygen
27 29 Refik Hadzialic
Generating public/private rsa key pair.
28 29 Refik Hadzialic
Enter file in which to save the key (/home/refik/.ssh/id_rsa):[Enter key]
29 29 Refik Hadzialic
Enter passphrase (empty for no passphrase): [Press enter key]
30 29 Refik Hadzialic
Enter same passphrase again: [Press enter key]
31 29 Refik Hadzialic
Your identification has been saved in /home/refik/.ssh/id_rsa.
32 29 Refik Hadzialic
Your public key has been saved in /home/refik/.ssh/id_rsa.pub.
33 29 Refik Hadzialic
The key fingerprint is:
34 29 Refik Hadzialic
33:b3:fe:af:95:95:18:11:31:d5:de:96:2f:f2:35:f9 refik@ubuntu
35 29 Refik Hadzialic
</pre>
36 29 Refik Hadzialic
37 29 Refik Hadzialic
Then one needs to copy the public key to the remote machine (nanoBTS controller, i.e. BeagleBoard) using ssh-copy-id:
38 29 Refik Hadzialic
39 29 Refik Hadzialic
<pre>
40 29 Refik Hadzialic
refik@ubuntu:$ ssh-copy-id -i ~/.ssh/id_rsa.pub remote-host
41 29 Refik Hadzialic
refik@remote-host's password:
42 29 Refik Hadzialic
Now try logging into the machine, with "ssh 'remote-host'", and check in:
43 29 Refik Hadzialic
44 29 Refik Hadzialic
.ssh/authorized_keys
45 29 Refik Hadzialic
46 29 Refik Hadzialic
to make sure we haven't added extra keys that you weren't expecting. 
47 29 Refik Hadzialic
</pre>
48 29 Refik Hadzialic
49 29 Refik Hadzialic
After we have created the public and private keys, and coppied the public key on the machine to which we want to connect, we can test if we can make an SSH connection to the remote machine:
50 29 Refik Hadzialic
<pre>
51 29 Refik Hadzialic
refik@ubuntu:$ ssh remote-host
52 29 Refik Hadzialic
[Note: SSH did not ask for password.]
53 29 Refik Hadzialic
54 29 Refik Hadzialic
refik@remote-host:$ [Note: You are on remote-host here]
55 1 Triatmoko -
</pre>
56 29 Refik Hadzialic
57 30 Refik Hadzialic
We created this using the guide at: http://www.thegeekstuff.com/2008/11/3-steps-to-perform-ssh-login-without-password-using-ssh-keygen-ssh-copy-id/
58 29 Refik Hadzialic
59 31 Refik Hadzialic
h3. easy_install (installation required only on server computer)
60 1 Triatmoko -
61 30 Refik Hadzialic
Easy Install is a python module (easy_install) bundled with setuptools that lets you automatically download, build, install, and manage Python packages.
62 1 Triatmoko -
63 13 Konrad Meier
<pre>
64 13 Konrad Meier
sudo apt-get install python-setuptools python-dev build-essential
65 13 Konrad Meier
</pre>
66 13 Konrad Meier
67 31 Refik Hadzialic
h3. Setproctitle (installation required only on server computer)
68 3 Triatmoko -
69 5 Triatmoko -
The library allows a process to change its title (as displayed by system tools such as ps and top).
70 1 Triatmoko -
71 30 Refik Hadzialic
Changing the title is mostly useful in multi-process systems, for example when a master process is forked: changing the children's title allows to identify the task each process is busy with.
72 5 Triatmoko -
73 30 Refik Hadzialic
You can use easy_install (i.e. the module we previously installed) to install the module. To perform a system-wide installation use:
74 30 Refik Hadzialic
Preferred installation procedure:
75 5 Triatmoko -
<pre>
76 1 Triatmoko -
sudo easy_install setproctitle
77 5 Triatmoko -
</pre>
78 5 Triatmoko -
79 30 Refik Hadzialic
Not preferred installation procedure:
80 5 Triatmoko -
If you are an unprivileged user or you want to limit installation to a local environment, you can use the command:
81 5 Triatmoko -
<pre>
82 1 Triatmoko -
easy_install -d /target/path setproctitle
83 5 Triatmoko -
</pre>
84 5 Triatmoko -
Notice that easy_install requires /target/path to be in your PYTHONPATH.
85 5 Triatmoko -
86 30 Refik Hadzialic
More information about this library can be found at http://pypi.python.org/pypi/setproctitle
87 1 Triatmoko -
88 31 Refik Hadzialic
h3. Serial port library (installation required on both sides, server computer and BeagleBoard)
89 1 Triatmoko -
90 10 Triatmoko -
The serial port library is required for the cell phones to communicate with our software. The required library for Python can be installed by typing the following command (both on the server computer and the nanoBTS controller boxes i.e. BeagleBoards):
91 1 Triatmoko -
92 1 Triatmoko -
<pre>
93 1 Triatmoko -
sudo apt-get install python-serial
94 1 Triatmoko -
</pre>
95 1 Triatmoko -
96 31 Refik Hadzialic
h2. MySQL Database (installation required only on server computer)
97 1 Triatmoko -
98 31 Refik Hadzialic
MySQL is a fast, multi-threaded, multi-user, and robust SQL database server. It is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software.
99 31 Refik Hadzialic
100 31 Refik Hadzialic
To install MySQL, run the following command from a terminal prompt:
101 31 Refik Hadzialic
<pre>
102 31 Refik Hadzialic
sudo apt-get install mysql-server
103 31 Refik Hadzialic
</pre>
104 31 Refik Hadzialic
105 31 Refik Hadzialic
During the installation process you will be prompted to enter a password for the MySQL root user.
106 31 Refik Hadzialic
107 31 Refik Hadzialic
Once the installation is complete, the MySQL server should be started automatically. More information can be found at: https://help.ubuntu.com/11.04/serverguide/C/mysql.html
108 31 Refik Hadzialic
109 31 Refik Hadzialic
h3. MySQLdb (installation required only on server computer)
110 31 Refik Hadzialic
111 1 Triatmoko -
MySQLdb is an thread-compatible interface to the popular MySQL database server that provides the Python database API.
112 1 Triatmoko -
 _mysql is a low-level API similiar to the MySQL C API. ZMySQLDA is a Database Adapter for Zope2.
113 7 Triatmoko -
114 1 Triatmoko -
If you want to write applications which are portable across databases, use MySQLdb, and avoid using this module directly. _mysql provides an interface which mostly implements the MySQL C API. For more information, see the MySQL documentation. The documentation for this module is intentionally weak because you probably should use the higher-level MySQLdb module. If you really need it, use the standard MySQL docs and transliterate as necessary.
115 7 Triatmoko -
116 31 Refik Hadzialic
<pre>
117 31 Refik Hadzialic
sudo apt-get install python-mysqldb
118 31 Refik Hadzialic
</pre>
119 7 Triatmoko -
120 31 Refik Hadzialic
h3. pChart library 
121 31 Refik Hadzialic
122 8 Triatmoko -
The pChart library is within our installation les and does not require to be installed individually. The library is only required if one uses the web interface and requires the generated resulting image. The library is open source and does not require any licensing. However, if one needs to learn how the library works, information can be found on the pChart web page http://www.pchart.net/
123 8 Triatmoko -
124 31 Refik Hadzialic
h2. PhpMyadmin (installation required only on server computer)
125 8 Triatmoko -
126 8 Triatmoko -
phpMyAdmin is a very famous MySQL mangement software package. To use it you should install and configure PHP, Apache and php mysql.
127 8 Triatmoko -
The easy way to install PhpMyadmin is installing from package using Apt-get command.
128 8 Triatmoko -
<pre>
129 8 Triatmoko -
sudo apt-get install phpmyadmin
130 8 Triatmoko -
</pre>
131 30 Refik Hadzialic
132 31 Refik Hadzialic
For detailed instructions on using repositories and package managers, please go to: https://help.ubuntu.com/community/phpMyAdmin
133 30 Refik Hadzialic
134 14 Konrad Meier
Now you can continue with the steps written by Konrad and at the end configure the server for _https_ and _.htaccess_. 
135 14 Konrad Meier
136 14 Konrad Meier
h1. Installation guide from Konrad
137 14 Konrad Meier
138 14 Konrad Meier
SSH
139 14 Konrad Meier
<pre>
140 14 Konrad Meier
apt-get install apache
141 14 Konrad Meier
</pre>
142 14 Konrad Meier
143 14 Konrad Meier
Python:
144 14 Konrad Meier
<pre>
145 14 Konrad Meier
apt-get install python python-serial python-setuptools python-dev build-essential
146 14 Konrad Meier
easy_install setproctitle
147 14 Konrad Meier
</pre>
148 16 Konrad Meier
149 1 Triatmoko -
Apache + php:
150 16 Konrad Meier
<pre>
151 16 Konrad Meier
apt-get install apache2 
152 17 Konrad Meier
apt-get install libapache2-mod-php5
153 17 Konrad Meier
a2enmod php5
154 14 Konrad Meier
/etc/init.d/apache2 restart
155 14 Konrad Meier
</pre>
156 14 Konrad Meier
157 14 Konrad Meier
MySQL:
158 21 Konrad Meier
<pre>
159 14 Konrad Meier
apt-get install mysql-server python-mysqldb php5-mysql php5-gd
160 15 Konrad Meier
</pre>
161 15 Konrad Meier
162 15 Konrad Meier
PJSUA
163 15 Konrad Meier
<pre>
164 15 Konrad Meier
wget http://www.pjsip.org/release/1.12/pjproject-1.12.tar.bz2
165 15 Konrad Meier
tar --bzip2 -xvf pjproject-1.12.tar.bz2
166 15 Konrad Meier
./configure && make dep && make
167 15 Konrad Meier
cd pjsip-apps/src/python/
168 1 Triatmoko -
make 
169 18 Konrad Meier
sudo make install
170 18 Konrad Meier
</pre>
171 18 Konrad Meier
172 18 Konrad Meier
173 18 Konrad Meier
Webserver-Config: 
174 18 Konrad Meier
(TODO)
175 18 Konrad Meier
see Report page 30 ff.
176 18 Konrad Meier
177 18 Konrad Meier
Database preparation:
178 18 Konrad Meier
<pre>
179 18 Konrad Meier
mysql -u root -p -h localhost
180 18 Konrad Meier
create databas gsmselftesting;
181 18 Konrad Meier
use mysql;
182 18 Konrad Meier
GRANT ALL PRIVILEGES ON gsmselftesting.* TO 'selftest'@'localhost' IDENTIFIED BY 'some_pass' WITH GRANT OPTION;
183 18 Konrad Meier
184 18 Konrad Meier
mysql -u selftest -p -h localhost -D gsmselftesting < gsmselftesting.sql
185 18 Konrad Meier
mysql -u selftest -p -h localhost -D gsmselftesting < InsertData.sql
186 18 Konrad Meier
</pre>
187 19 Konrad Meier
188 18 Konrad Meier
Change mysql login credentials in the code:
189 1 Triatmoko -
<pre>
190 19 Konrad Meier
vim Code/Server-Code/DbClass.py
191 19 Konrad Meier
</pre>
192 19 Konrad Meier
193 19 Konrad Meier
Chnage mysql login credentials in the website:
194 19 Konrad Meier
<pre>
195 15 Konrad Meier
vim /var/www-ssl/gsm-selftest/dbconnection.php
196 20 Konrad Meier
</pre>
197 20 Konrad Meier
198 20 Konrad Meier
199 20 Konrad Meier
200 20 Konrad Meier
Running the System:
201 20 Konrad Meier
<pre>
202 20 Konrad Meier
export DISPLAY=:0.0
203 20 Konrad Meier
./startSoftware.py
204 20 Konrad Meier
</pre>
205 20 Konrad Meier
206 20 Konrad Meier
<pre>
207 20 Konrad Meier
https://132.230.8.115
208 22 Refik Hadzialic
</pre>
209 22 Refik Hadzialic
210 22 Refik Hadzialic
211 22 Refik Hadzialic
h1. Configuring the web server to handle https and .htaccess files
212 22 Refik Hadzialic
213 23 Refik Hadzialic
h2. HTTPS
214 22 Refik Hadzialic
215 22 Refik Hadzialic
First we want to generate a server key by typing the following command:
216 22 Refik Hadzialic
<pre>
217 23 Refik Hadzialic
openssl genrsa −des3 −out server.key 4096
218 23 Refik Hadzialic
</pre>
219 23 Refik Hadzialic
220 23 Refik Hadzialic
221 23 Refik Hadzialic
This will generate a 4096 bit long private server key, one is asked to enter two times a password for the _server.key_. Using the generated private server key, we will create a certificate signing request, _server.csr_. We were prompted with a series of questions like country, state, organization name and etc which we had to enter to resume.
222 23 Refik Hadzialic
223 23 Refik Hadzialic
<pre>
224 22 Refik Hadzialic
openssl req -new -key server.key -out server.csr 
225 24 Refik Hadzialic
</pre>
226 24 Refik Hadzialic
227 24 Refik Hadzialic
In the next step we had to sign the certificate signing request and enter the amount of days for how long it should be valid. In our case we entered the duration of one year, one can make it for longer periods as well (i.e. the amount of 365 has to be changed).
228 24 Refik Hadzialic
229 24 Refik Hadzialic
<pre>
230 24 Refik Hadzialic
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
231 24 Refik Hadzialic
</pre>
232 24 Refik Hadzialic
233 24 Refik Hadzialic
We were asked to enter the password again for _server.key_. After we have completed this step we had to make a version of the _server.key_ which did not require a password, _server.key.insecure_ and we will rename the files appropriately. 
234 24 Refik Hadzialic
235 24 Refik Hadzialic
<pre>
236 24 Refik Hadzialic
openssl rsa -in server.key -out server.key.insecure
237 24 Refik Hadzialic
mv server.key server.key.secure
238 24 Refik Hadzialic
mv server.key.insecure server.key
239 24 Refik Hadzialic
</pre>
240 24 Refik Hadzialic
241 25 Refik Hadzialic
The generated files are very sensitive, since they are our keys. After these steps were completed, we had generated 4 files: _server.crt_, _server.csr_, _server.key_ and _server.key.secure_. Now we need to enable the SSL engine on the Apache web server. We copied _server.key_ and _server.crt_ into _/etc/appache2/ssl_. 
242 25 Refik Hadzialic
243 25 Refik Hadzialic
<pre>
244 25 Refik Hadzialic
refik@ubuntu:/etc/apache2$ sudo mkdir ssl
245 25 Refik Hadzialic
cp server.key /etc/apache2/ssl
246 25 Refik Hadzialic
cp server.crt /etc/apache2/ssl
247 25 Refik Hadzialic
</pre>
248 25 Refik Hadzialic
249 25 Refik Hadzialic
Then we enabled SSL by typing in _a2enmod ssl_, "it is simply a general purpose utility to establish a symlink between a module in _/etc/apache2/mods-available_ to _/etc/apache2/mods-enabled_ (or give a message to the effect that a given module does not exist or that it is already symlink-ed for loading)".
250 25 Refik Hadzialic
251 25 Refik Hadzialic
<pre>
252 25 Refik Hadzialic
refik@ubuntu:/etc/apache2/ssl$ sudo a2enmod ssl
253 25 Refik Hadzialic
Enabling module ssl.
254 25 Refik Hadzialic
See /usr/share/doc/apache2.2-common/README.Debian.gz on how to configure SSL and create self-signed certificates.
255 25 Refik Hadzialic
Run '/etc/init.d/apache2 restart' to activate new configuration!
256 26 Refik Hadzialic
</pre>
257 26 Refik Hadzialic
258 26 Refik Hadzialic
In the next procedure we had to establish a symlink from the 'available' default-ssl file to the 'enabled' file. Then we created a folder where our secured PHP files will be located (e.g. https://some-domain-name.com/test-software).
259 26 Refik Hadzialic
260 26 Refik Hadzialic
<pre>
261 26 Refik Hadzialic
refik@ubuntu:/etc/apache2/ssl$ sudo ln -s /etc/apache2/sites-available/default-ssl /etc/apache2/sites-enabled/000-default-ssl 
262 26 Refik Hadzialic
refik@ubuntu:/etc/apache2/ssl$ cd /var/
263 26 Refik Hadzialic
refik@ubuntu:/var$ sudo mkdir www-ssl
264 26 Refik Hadzialic
</pre>
265 26 Refik Hadzialic
266 26 Refik Hadzialic
We had backed up our old configuration files for the virtual hosts, for the case if we damage the Apache configuration files. Then we edited the _default-ssl_ file.
267 26 Refik Hadzialic
268 26 Refik Hadzialic
<pre>
269 26 Refik Hadzialic
refik@ubuntu:/var$ cd /etc/apache2/sites-available
270 26 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$ sudo cp default default_original
271 26 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$ sudo cp default-ssl default-ssl_original
272 26 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$ sudo vim default-ssl
273 26 Refik Hadzialic
</pre>
274 26 Refik Hadzialic
275 26 Refik Hadzialic
Only the beginning of the file is listed here and we have modified the line starting with _DocumentRoot_ and _<Directory /var/www/>_ from _DocumentRoot /var/www_ to _DocumentRoot /var/www-ssl_ and from _<Directory /var/www/>_ to _<Directory /var/www-ssl/>_ (i.e. we had to redefine the location of our SSL directory).
276 26 Refik Hadzialic
277 26 Refik Hadzialic
<pre>
278 26 Refik Hadzialic
<IfModule mod_ssl.c>
279 26 Refik Hadzialic
<VirtualHost _default_:443>
280 26 Refik Hadzialic
        ServerAdmin webmaster@localhost
281 26 Refik Hadzialic
282 26 Refik Hadzialic
        DocumentRoot /var/www-ssl
283 26 Refik Hadzialic
        <Directory />
284 26 Refik Hadzialic
                Options FollowSymLinks
285 26 Refik Hadzialic
                AllowOverride None
286 26 Refik Hadzialic
        </Directory>
287 26 Refik Hadzialic
        <Directory /var/www-ssl/>
288 26 Refik Hadzialic
                Options Indexes FollowSymLinks MultiViews
289 26 Refik Hadzialic
                AllowOverride None
290 26 Refik Hadzialic
                Order allow,deny
291 26 Refik Hadzialic
                allow from all
292 26 Refik Hadzialic
        </Directory>
293 27 Refik Hadzialic
</pre>
294 27 Refik Hadzialic
295 27 Refik Hadzialic
One should keep in mind that the port 443 should be free for Apache to use it. In the proceeding step we had to ensure that Apache listens on the given port for a _https_ connection. One could test that by going into the _/etc/apache2/ports.conf_.
296 27 Refik Hadzialic
297 28 Refik Hadzialic
<pre>
298 27 Refik Hadzialic
<IfModule mod_ssl.c>
299 27 Refik Hadzialic
    # If you add NameVirtualHost *:443 here, you will also have to change
300 27 Refik Hadzialic
    # the VirtualHost statement in /etc/apache2/sites-available/default-ssl
301 27 Refik Hadzialic
    # to <VirtualHost *:443>
302 27 Refik Hadzialic
    # Server Name Indication for SSL named virtual hosts is currently not
303 27 Refik Hadzialic
    # supported by MSIE on Windows XP.
304 28 Refik Hadzialic
    Listen 443
305 27 Refik Hadzialic
</IfModule>
306 27 Refik Hadzialic
</pre>
307 27 Refik Hadzialic
308 27 Refik Hadzialic
In our case it was set up correctly, since the command: _Listen 443_ was present. In our last configuration step we had to edit _default-ssl_ file to define the correct locations of our keys and to ensure the SSL engine was turned on.
309 27 Refik Hadzialic
310 27 Refik Hadzialic
<pre>
311 27 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$ sudo vim default-ssl
312 27 Refik Hadzialic
</pre>
313 27 Refik Hadzialic
314 27 Refik Hadzialic
The following part of the file had to be found and modified according to our key path locations:
315 27 Refik Hadzialic
<pre>
316 27 Refik Hadzialic
SSLEngine on
317 27 Refik Hadzialic
318 27 Refik Hadzialic
       #   A self-signed (snakeoil) certificate can be created by installing
319 27 Refik Hadzialic
       #   the ssl-cert package. See
320 27 Refik Hadzialic
       #   /usr/share/doc/apache2.2-common/README.Debian.gz for more info.
321 27 Refik Hadzialic
       #   If both key and certificate are stored in the same file, only the
322 27 Refik Hadzialic
       #   SSLCertificateFile directive is needed.
323 27 Refik Hadzialic
       SSLCertificateFile    /etc/apache2/ssl/server.crt
324 27 Refik Hadzialic
       SSLCertificateKeyFile /etc/apache2/ssl/server.key
325 27 Refik Hadzialic
326 27 Refik Hadzialic
       #   Server Certificate Chain:
327 27 Refik Hadzialic
       #   Point SSLCertificateChainFile at a file containing the
328 27 Refik Hadzialic
</pre>
329 27 Refik Hadzialic
330 28 Refik Hadzialic
Finally we had configured our server and can proceed with the restart of the apache web server. We created a test web site _/var/www-ssl/index.php_ and navigated our browser to _https://localhost_. The test was successful! 
331 28 Refik Hadzialic
332 28 Refik Hadzialic
<pre>
333 28 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$ sudo /etc/init.d/apache2 restart
334 28 Refik Hadzialic
 * Restarting web server apache2                                                                                                                                        [Sat Oct 08 21:52:51 2011] [warn] _default_ VirtualHost overlap on port 443, the first has precedence
335 28 Refik Hadzialic
 ... waiting [Sat Oct 08 21:52:52 2011] [warn] _default_ VirtualHost overlap on port 443, the first has precedence [ OK ]
336 28 Refik Hadzialic
refik@ubuntu:/etc/apache2/sites-available$
337 28 Refik Hadzialic
</pre>
338 28 Refik Hadzialic
339 28 Refik Hadzialic
h2. Configuring the password protection for the web site (using .htaccess)
340 28 Refik Hadzialic
341 28 Refik Hadzialic
However, to enable the use of Apache _.htaccess_ files, we will have to reconfigure the Apache configuration files again. _root_ access will be required. First we have to edit the _/etc/apache2/sites-available/default-ssl_ file. Find the following lines and modify the _AllowOverride None_ to _AllowOverride All_
342 28 Refik Hadzialic
like in the given configuration segment:
343 28 Refik Hadzialic
344 28 Refik Hadzialic
<pre>
345 28 Refik Hadzialic
        <Directory /var/www-ssl/>
346 28 Refik Hadzialic
                Options Indexes FollowSymLinks MultiViews
347 28 Refik Hadzialic
                AllowOverride All
348 28 Refik Hadzialic
                Order allow,deny
349 28 Refik Hadzialic
                allow from all
350 28 Refik Hadzialic
        </Directory>
351 28 Refik Hadzialic
</pre>
352 28 Refik Hadzialic
353 28 Refik Hadzialic
This will tell Apache web server that it is okay to allow _.htaccess_ files to over-ride previous directives. We must reload the Apache web server before the changes can take effect. We can do it by typing:
354 28 Refik Hadzialic
355 28 Refik Hadzialic
<pre>
356 28 Refik Hadzialic
sudo /etc/init.d/apache2 reload
357 28 Refik Hadzialic
</pre>
358 28 Refik Hadzialic
359 28 Refik Hadzialic
The next step is to go to the directory where our test software web page is located (e.g. _/var/www-ssl/testsoftware_) and to create a file called _.htaccess_.
360 28 Refik Hadzialic
Please insert the following code segment inside the created _.htaccess_ file where _/var/www-ssl/testsoftware/.htpasswd_ is your full path address to _.htpasswd_:
361 28 Refik Hadzialic
362 28 Refik Hadzialic
<pre>
363 28 Refik Hadzialic
AuthUserFile /var/www-ssl/testsoftware/.htpasswd
364 28 Refik Hadzialic
AuthName "Authorization Required"
365 28 Refik Hadzialic
AuthType Basic
366 28 Refik Hadzialic
require valid-user 
367 28 Refik Hadzialic
</pre>
368 28 Refik Hadzialic
369 28 Refik Hadzialic
Then in the next step, create another file called _.htpasswd_. After you have created it, we will add the usernames that should have access to the web site. We do that by typing the following command, where you can replace _konrad_ with any other combination of letters which will represent your username:
370 28 Refik Hadzialic
371 28 Refik Hadzialic
<pre>
372 28 Refik Hadzialic
refik@ubuntu:/var/www-ssl/testsoftware$ sudo htpasswd -c .htpasswd konrad
373 28 Refik Hadzialic
</pre>
374 28 Refik Hadzialic
375 28 Refik Hadzialic
Afterwards, you will be required to type twice the same password for the username you want to create, in this case _konrad_. "The -c flag is used only when you 
376 28 Refik Hadzialic
are creating a new file. After the first time, you will omit the -c flag, when you are adding new users to an already-existing password file. Otherwise you will overwrite the file!". You can add as many users as you wish, do not forget to remove the -c flag when you do it. In the last step, we have to modify the _/etc/apache2/apache2.conf_ file and to add at the end of it the following code segment where _/vaw/www-ssl/testsoftware_ is the full path to your web page directory where you put the _.htpasswd_ file:
377 28 Refik Hadzialic
378 28 Refik Hadzialic
<pre>
379 28 Refik Hadzialic
<Directory /vaw/www-ssl/testsoftware>
380 28 Refik Hadzialic
AllowOverride All
381 28 Refik Hadzialic
</Directory>
382 28 Refik Hadzialic
</pre>
383 28 Refik Hadzialic
384 28 Refik Hadzialic
We are done with editing. All we have to do now is to restart the Apache web server. We
385 28 Refik Hadzialic
can do that by typing:
386 28 Refik Hadzialic
387 28 Refik Hadzialic
<pre>
388 28 Refik Hadzialic
sudo /etc/init.d/apache2 restart
389 28 Refik Hadzialic
</pre>
390 28 Refik Hadzialic
391 1 Triatmoko -
You can test it now by opening a new browser tab and navigating to _https://localhost/testsoftware_ (keep in mind to replace _testsoftware_ with your name of the folder where the web page is located). If you configured everything properly, you should get a dialog where you can enter your created username and password and try to login.