Notes:
# Ignore certificate issues LDAPVerifyServerCert off <Location /protected/> # Match the regex, which is currently these subnets: # 192.168.0.50 (PC for testing) # 123.45.67. (Network to allow) SetEnvIf X-Forwarded-For ^(10\.65\.136\.80|129\.78\.77\.) acl Order allow,deny Allow from env=acl Satisfy any # If we don't match the above, ask for Unikey Require valid-user AuthType Basic AuthBasicProvider ldap AuthName "Protected Realm" AuthLDAPURL "ldaps://ldapserver/OU=People,DC=newioit,DC=com,DC=au?cn?sub?(objectClass=*)" SSL AuthLDAPBindDN "cn=linuxbind,ou=services,DC=newioit,DC=com,DC=au" AuthLDAPBindPassword "supasecret" AuthzLDAPAuthoritative off </Location>
Notes:
<Location /> AuthType Basic AuthBasicProvider ldap AuthName "Some Realm" AuthLDAPURL "ldap://adserver:3268/DC=newioit,DC=com,DC=au?sAMAccountName?sub?(objectClass=*)" NONE AuthLDAPBindDN "CN=LDAPUser,OU=Users,DC=newioit,DC=com,DC=au" AuthLDAPBindPassword "xxxxxxxx" require valid-user </Location>
Requires http-devel (apxs), libxml2 and libxml2-devel
cd /usr/src unzip mod_proxy_html.zip cd mod_proxy_html ln -s /usr/include/libxml2/libxml/ /usr/include/libxm apxs -I. -i -c mod_proxy_html.c
yum install httpd mod_ssl openssl crypto-utils genkey ee-app-pro-01.ucc.usyd.edu.au #Keys get stored in #/etc/pki/tls/private/ee-app-pro-01.ucc.usyd.edu.au.key #/etc/pki/tls/certs/ee-app-pro-01.ucc.usyd.edu.au.cert