<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Limit service availability</title><link>https://sourceforge.net/p/guse/wiki/Limit%2520service%2520availability/</link><description>Recent changes to Limit service availability</description><atom:link href="https://sourceforge.net/p/guse/wiki/Limit%20service%20availability/feed" rel="self"/><language>en</language><lastBuildDate>Fri, 11 Apr 2014 06:22:59 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/guse/wiki/Limit%20service%20availability/feed" rel="self" type="application/rss+xml"/><item><title>Limit service availability modified by Zoltán Farkas</title><link>https://sourceforge.net/p/guse/wiki/Limit%2520service%2520availability/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -11,7 +11,7 @@
 MySQL access
 ============

-Restrict access to the MySQL databases used by gUSE (called 'guse' and 'liferay' when installed using the install wizard) as much as possible: grant access only from hosts where gUSE services are running.
+Restrict access to the MySQL databases used by gUSE (called &lt;tt&gt;guse&lt;/tt&gt; and &lt;tt&gt;liferay&lt;/tt&gt; when installed using the Install Wizard) as much as possible: grant access only from hosts where gUSE services are running.

 Applying firewalls
 ==================
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Zoltán Farkas</dc:creator><pubDate>Fri, 11 Apr 2014 06:22:59 -0000</pubDate><guid>https://sourceforge.netbfe532642bc3413dcd34b714b73eee4462006d4d</guid></item><item><title>Limit service availability modified by Zoltán Farkas</title><link>https://sourceforge.net/p/guse/wiki/Limit%2520service%2520availability/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -11,8 +11,85 @@
 MySQL access
 ============

+Restrict access to the MySQL databases used by gUSE (called 'guse' and 'liferay' when installed using the install wizard) as much as possible: grant access only from hosts where gUSE services are running.
+
 Applying firewalls
 ==================

+Apply the drop input packet acceptance policy by default, enable connection tracking, and open up only ports really necessary (HTTP, 8080, Globus TCP port range, etc.).
+
+
 Putting Tomcat behind a web server
 ==================================
+
+By putting Apache Tomcat behind an HTTP server (e.g. Apache) not only enables you to easily configure SSL/TLS-based access to your services, but also enables to limit the set of publicly accessible gUSE services, and enables you to run gUSE through standard HTTP and HTTPS ports.
+
+For this, do the followings:
+* enable the &lt;tt&gt;proxy_ajp&lt;/tt&gt; Apache module (&lt;tt&gt;a2enmod proxy_ajp&lt;/tt&gt;),
+* disable Apache Tomcat connector listening on port 8080. For this, edit Apache Tomcat's &lt;tt&gt;server.xml&lt;/tt&gt; file, and remove (or comment out) the &lt;tt&gt;Connector&lt;/tt&gt; tag bind to port 8080,
+* create a new site in Apache, that will proxy requests to Apache Tomcat's AJP. An example site setup is as follows (for HTTPS):
+
+    
+        ServerName      myportal.org
+        ServerAlias     myportal.org
+        ServerAdmin     admin@myportal.org
+        ServerSignature on
+
+        ErrorLog /var/log/apache2/myportal.org/error.log
+        CustomLog /var/log/apache2/myportal.org/access.log combined
+
+        # Possible values include: debug, info, notice, warn, error, crit,
+        # alert, emerg.
+        LogLevel warn
+
+        DocumentRoot /var/www/
+        
+                Options FollowSymLinks
+                AllowOverride None
+        
+        
+                Options Indexes FollowSymLinks MultiViews
+                AllowOverride None
+                Order allow,deny
+                allow from all
+        
+
+        SSLEngine on
+        SSLCertificateFile    /etc/ssl/certs/myportal.org.pem
+        SSLCertificateKeyFile /etc/ssl/private/myportal.org.key
+        SSLCertificateChainFile /etc/ssl/certs/myportal.org.chain.pem
+
+        
+                SSLOptions +StdEnvVars
+        
+        
+                SSLOptions +StdEnvVars
+        
+
+        BrowserMatch ".*MSIE.*" \
+                nokeepalive ssl-unclean-shutdown \
+                downgrade-1.0 force-response-1.0
+
+        RedirectMatch   permanent       ^/$     /liferay-portal-6.1.0
+
+        ProxyPass       /liferay-portal-6.1.0   ajp://myportal.org:8009/liferay-portal-6.1.0
+        ProxyPass       /wspgrade               ajp://myportal.org:8009/wspgrade
+        ProxyPass       /wfs                    ajp://myportal.org:8009/wfs
+        ProxyPass       /submitter              ajp://myportal.org:8009/submitter
+
+        
+                Order allow,deny
+                Allow from all
+        
+
+    
+
+* Finally, enable the new site in Apache using &lt;tt&gt;a2ensite&lt;/tt&gt;.
+
+As you can see, the following webapps must be proxied:
+* &lt;tt&gt;liferay-portal-6.1.0&lt;/tt&gt;: for Liferay
+* &lt;tt&gt;wspgrade&lt;/tt&gt;: for the portlets
+* &lt;tt&gt;wfs&lt;/tt&gt;: for the Graph Editor (&lt;b&gt;Note&lt;/b&gt;: if you are operating a portal where users are not intented to use the Graph Editor, you can skip the &lt;tt&gt;wfs&lt;/tt&gt; webapp)
+* &lt;tt&gt;submitter&lt;/tt&gt;: for some plugins of the DCI Bridge
+
+The other webapps (&lt;tt&gt;information&lt;/tt&gt;, &lt;tt&gt;storage&lt;/tt&gt;, &lt;tt&gt;wfi&lt;/tt&gt;, ...) are used only internally, so it is not necessary to make them publicly available.
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Zoltán Farkas</dc:creator><pubDate>Fri, 11 Apr 2014 06:20:56 -0000</pubDate><guid>https://sourceforge.netb95572fcbbb28ee7733eb6fe354d264ddb8687f3</guid></item><item><title>Limit service availability modified by Zoltán Farkas</title><link>https://sourceforge.net/p/guse/wiki/Limit%2520service%2520availability/</link><description>&lt;div class="markdown_content"&gt;&lt;h1 id="about"&gt;About&lt;/h1&gt;
&lt;p&gt;This page gives some guidelines for gUSE administrators on how to limit their deployment's services' availability. The goal is to make as few services available as possible.&lt;/p&gt;
&lt;h1 id="tomcat-admin-password"&gt;Tomcat admin password&lt;/h1&gt;
&lt;p&gt;The default Tomcat administrator username and password is &lt;tt&gt;admin&lt;/tt&gt;. You can change this by editing the &lt;tt&gt;apache-tomcat-*/conf/tomcat-users.xml&lt;/tt&gt; file under your deployment. The change will take effect once you restart Apache Tomcat.&lt;/p&gt;
&lt;h1 id="mysql-access"&gt;MySQL access&lt;/h1&gt;
&lt;h1 id="applying-firewalls"&gt;Applying firewalls&lt;/h1&gt;
&lt;h1 id="putting-tomcat-behind-a-web-server"&gt;Putting Tomcat behind a web server&lt;/h1&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Zoltán Farkas</dc:creator><pubDate>Wed, 09 Apr 2014 05:14:53 -0000</pubDate><guid>https://sourceforge.neta67f582100eba772345cba98937db4fff5e2765e</guid></item></channel></rss>