This chapter explains what Webmin is, why it was written, and what you can expect from this book. What is Webmin? Webmin is a program that simplifies the process of managing a Linux or UNIX system. Traditionally, you have needed to manually edit configuration files and run commands to create accounts, set up web servers, or manage email forwarding. Webmin now lets you perform these tasks through an easy-to-use web interface, and automatically updates all of the required configuration files for you. This makes the job of administering your system much easier. Some of the things that you can do with Webmin include: Creating, editing, and deleting UNIX login accounts on your system Exporting files and directories to other systems with the NFS protocol Setting up disk quotas to control how much space users can take up with their files Installing, viewing, and removing software packages in RPM and other formats Changing your system's IP address, DNS settings, and routing configuration Setting up a firewall to protect your computer or give hosts on an internal LAN access to the Internet Creating and configuring virtual web sites for the Apache Web server Managing databases, tables, and fields in a MySQL or PostgreSQL database server Sharing files with Windows systems by configuring Samba These are just a few of the available functions. Webmin lets you configure almost all of the common services and popular servers on UNIX systems using a simple web interface. It protects you from the syntax errors and other mistakes that are often made when editing configuration files directly, and warns you before potentially dangerous actions. Because Webmin is accessed though a web browser, you can log in to it from any system that is connected to yours through a network. There is absolutely no difference between running it locally and running it remotely, and it is much easier to use over the network than other graphical configuration programs. Webmin has what is known as a modular design. This means that each of its functions is contained in a module that can generally be installed or removed independently from the rest of the program. Each module is responsible for managing some service or server, such as UNIX users, the Apache Web server, or software packages. If you have been manually configuring your system up till now, any existing settings will be recognized by Webmin. It always reads the standard configuration files on your system and updates them directly, instead of using its own separate database. This means that you can freely mix Webmin, manual configuration, and other programs or scripts that work in the same way. Even though this book is written for Linux users, Webmin can be used on many other flavors of UNIX as well, such as Solaris, FreeBSD, and HP/UX. One of its biggest strengths is its understanding of the differences between all these operating systems and the way it adjusts its user interface and behavior to fit your OS. This means that it can often hide the underlying differences between each UNIX variant and present a similar or identical interface no matter which one you are using. Webmin on its own is not particularly useful though-;it is only a configuration tool, so you must have programs installed for it to configure. For example, the Apache module requires that the actual Apache Web server be installed. Fortunately, all of the services and servers that Webmin manages are either included with most Linux distributions as standard, or can be freely downloaded and installed. Who Should Use Webmin? Webmin was written for use by people who have some Linux experience but are not familiar with the intricacies of system administration.
Author(s): Jamie Cameron
Series: Bruce Perens' Open source series
Publisher: Prentice Hall
Year: 2004
Language: English
Pages: 810
City: Upper Saddle River, NJ
Managing Linux Systems with Webmin......Page 1
Title Page......Page 4
Copyright - Open Publication License......Page 5
Contents at a Glance (linked)......Page 6
II System Modules......Page 8
III Server Modules......Page 12
IV Cluster Modules......Page 15
V Webmin Modules......Page 16
VI Developer's Guide......Page 17
1.1 What is Webmin?......Page 18
1.2 Who Should Use Webmin?......Page 19
1.3 How and Why Was it Developed?......Page 20
1.5 Who Should Read this Book?......Page 21
1.7 Acknowledgments......Page 22
2.1 Downloading Webmin for Your System......Page 23
2.2 Installing the RPM Package......Page 24
2.3 Installing the tar.gz Package......Page 25
2.5 The Webmin User Interface......Page 27
2.7 Summary......Page 30
3.1 Network Security......Page 31
3.2 SSL Encryption......Page 32
3.3 Requesting a Valid SSL Certificate......Page 34
3.4 Summary......Page 35
4.1 Introduction to UNIX Users and Groups......Page 36
4.2 The Users and Groups Module......Page 37
4.3 Creating a New User......Page 38
4.4 Editing an Existing User......Page 40
4.5 Deleting a User......Page 41
4.6 Creating a New Group......Page 42
4.7 Editing an Existing Group......Page 43
4.9 Viewing Recent and Current Logins......Page 44
4.11 Creating Users from Batch Files......Page 45
4.12 Configuring the Users and Groups Module......Page 47
4.14 Module Access Control......Page 51
4.15 Other Operating Systems......Page 54
4.16 Summary......Page 55
5.1 Introduction to Filesystems......Page 56
5.3 Mounting an NFS Network Filesystem......Page 57
5.4 Mounting an SMBFS Windows Networking Filesystem......Page 60
5.5 Mounting a Local ext2 or ext3 Hard Disk Filesystem......Page 61
5.6 Mounting a Local Windows Hard Disk Filesystem......Page 62
5.7 Adding Virtual Memory......Page 63
5.8 Automounter Filesystems......Page 64
5.10 Listing Users of a Filesystem......Page 65
5.11 Module Access Control......Page 66
5.13 A Comparison of Filesystem Types......Page 67
5.14 Other Operating Systems......Page 68
5.15 Summary......Page 69
6.1 Introduction to File Sharing with NFS......Page 70
6.3 Exporting a Directory......Page 71
6.4 Editing or Deleting an NFS Export......Page 72
6.5 NFS on Solaris......Page 73
6.6 NFS on BSD, MacOS X, and OpenServer......Page 74
6.8 Summary......Page 76
7.1 Introduction to Disk Quotas......Page 77
7.2 The Disk Quotas Module......Page 78
7.4 Disabling Quotas for a Filesystem......Page 79
7.6 Copying Quotas to Multiple Users......Page 80
7.7 Setting Grace Times......Page 81
7.8 Setting Default Quotas for New Users......Page 82
7.11 Module Access Control......Page 83
7.12 Summary......Page 84
8.1 Introduction to Hard Disk Partitions......Page 85
8.2 The Partitions on Local Disks Module......Page 86
8.4 Creating a New Filesystem......Page 87
8.5 Partition Labels......Page 88
8.6 Deleting or Changing a Partition......Page 89
8.7 Module Access Control......Page 90
8.9 Introduction to RAID......Page 91
8.10 The Linux RAID Module......Page 92
8.11 Introduction to LVM......Page 94
8.12 The Logical Volume Management Module......Page 95
8.13 Creating a New Volume Group......Page 96
8.15 Creating and Deleting a Logical Volume......Page 97
8.16 Resizing a Logical Volume......Page 98
8.17 Creating a Snapshot......Page 99
8.18 Summary......Page 100
9.1 Introduction to the Linux Boot Process......Page 101
9.3 Configuring an Action to Start at Bootup......Page 102
9.4 Starting and Stopping Actions......Page 103
9.5 Adding a New Action......Page 104
9.8 Other Operating Systems......Page 106
9.9 The SysV Init Configuration Module......Page 108
9.10 Summary......Page 109
10.2 The Scheduled Cron Jobs Module......Page 110
10.3 Creating a New Cron Job......Page 111
10.4 Editing a Cron Job......Page 112
10.7 Configuring the Scheduled Cron Jobs Module......Page 113
10.9 The Scheduled Commands Module......Page 114
10.11 Summary......Page 115
11.2 The Running Processes Module......Page 116
11.3 Viewing, Killing, or Reprioritizing a Process......Page 118
11.4 Searching for Processes......Page 119
11.6 Module Access Control Options......Page 120
11.8 Summary......Page 121
12.1 Introduction to Packages......Page 122
12.3 Installing a New Package......Page 124
12.4 Finding and Removing a Package......Page 126
12.5 Updating on Debian Linux......Page 127
12.7 Other Operating Systems......Page 128
12.8 Summary......Page 129
13.1 Introduction to Logging......Page 130
13.3 Adding a New Log File......Page 132
13.4 Editing or Deleting a Log File......Page 134
13.5 Module Access Control......Page 135
13.6 Other Operating Systems......Page 136
13.7 Summary......Page 137
14.2 The Filesystem Backup Module......Page 138
14.3 Adding a New Backup......Page 139
14.4 Making a Backup......Page 141
14.6 Restoring a Backup......Page 142
14.7 Configuring the Filesystem Backup Module......Page 143
14.9 Summary......Page 145
15.1 Introduction to Internet Services......Page 146
15.2 The Internet Services and Protocols Module......Page 147
15.4 Creating Your Own Internet Service......Page 150
15.5 Creating and Editing RPC Programs......Page 152
15.6 Configuring the Internet Services and Protocols Module......Page 153
15.7 Other Operating Systems......Page 155
15.8 The Extended Internet Services Module......Page 156
15.9 Enabling or Editing an Extended Internet Service......Page 157
15.10 Creating an Extended Internet Service......Page 158
15.11 Editing Default Options......Page 159
15.12 Summary......Page 160
16.1 Introduction to Linux Networking......Page 161
16.2 Viewing and Editing Network Interfaces......Page 163
16.3 Adding a Network Interface......Page 164
16.4 Configuring Routing......Page 166
16.5 Changing the Hostname or DNS Client Settings......Page 167
16.6 Editing Host Addresses......Page 168
16.7 Module Access Control......Page 169
16.9 Summary......Page 170
17.1 Introduction to NIS......Page 171
17.2 Becoming an NIS Client......Page 172
17.3 Setting Up an NIS Master Server......Page 174
17.4 Editing NIS Tables......Page 176
17.5 Securing Your NIS Server......Page 177
17.8 NIS on Solaris......Page 180
17.9 Summary......Page 181
18.1 Introduction to PPP on Linux......Page 182
18.2 Configuring a PPP Server......Page 183
18.3 Managing PPP Accounts......Page 186
18.4 Restricting Access by Caller ID......Page 188
18.6 Summary......Page 189
19.1 Introduction to Firewalling with IPtables......Page 190
19.2 The Linux Firewall Module......Page 192
19.3 Allowing and Denying Network Traffic......Page 194
19.4 Changing a Chain’s Default Action......Page 198
19.6 Creating Your Own Chain......Page 199
19.7 Setting Up Network Address Translation......Page 200
19.8 Setting Up a Transparent Proxy......Page 201
19.9 Setting Up Port Forwarding......Page 202
19.10 Firewall Rule Conditions......Page 203
19.12 Summary......Page 206
20.1 The System Time Module......Page 208
20.3 Change the Hardware Time......Page 209
20.6 Other Operating Systems......Page 210
20.7 Summary......Page 211
21.1 Introduction to Boot Loaders......Page 212
21.2 The Linux Bootup Configuration Module......Page 213
21.3 Booting a New Kernel with LILO......Page 214
21.4 Booting Another Operating System with LILO......Page 215
21.5 Editing Global LILO Options......Page 216
21.6 The GRUB Boot Loader Module......Page 217
21.7 Booting a New Linux Kernel or BSD with GRUB......Page 218
21.9 Editing Global GRUB Options......Page 219
21.12 Summary......Page 220
22.1 Introduction to Printing on Linux......Page 222
22.3 Adding a New Printer......Page 223
22.4 Editing an Existing Printer......Page 226
22.5 Managing Print Jobs......Page 227
22.6 Configuring the Printer Administration Module......Page 228
22.7 Module Access Control......Page 229
22.8 Other Operating Systems......Page 230
22.9 Summary......Page 231
23.1 The Voicemail Server Module......Page 232
23.2 Configuring Your System as an Answering Machine......Page 233
23.3 Listening to Recorded Messages......Page 235
23.5 Summary......Page 236
24.2 Configuring the SSH/Telnet Login Module......Page 237
24.3 The Command Shell Module......Page 239
24.5 Summary......Page 240
25.1 The Custom Commands Module......Page 241
25.2 Creating a New Command......Page 242
25.3 Parameter Types......Page 244
25.4 Creating a New File Editor......Page 246
25.5 Module Access Control......Page 247
25.7 Summary......Page 248
26.2 Navigating Directories and Viewing Files......Page 249
26.4 Creating and Editing Files......Page 251
26.5 Editing File Permissions......Page 252
26.6 Creating Links and Directories......Page 253
26.8 Editing EXT File Attributes......Page 254
26.9 Editing XFS File Attributes......Page 255
26.10 Editing File ACLs......Page 256
26.11 Sharing Directories......Page 257
26.12 Module Access Control......Page 259
26.13 Summary......Page 260
27.1 Introduction to Perl Modules......Page 261
27.3 Installing a Perl Module......Page 262
27.4 Viewing and Removing a Perl Module......Page 264
27.6 Summary......Page 265
28.1 The System and Server Status Module......Page 267
28.2 Adding a New Monitor......Page 269
28.3 Monitor Types......Page 270
28.4 Setting Up Scheduled Monitoring......Page 277
28.6 Configuring the System and Server Status Module......Page 279
28.7 Summary......Page 280
29.1 Introduction to Apache......Page 281
29.2 The Apache Webserver Module......Page 282
29.4 Editing Pages on Your Web Server......Page 285
29.5 Creating a New Virtual Host......Page 286
29.6 Setting Per-Directory Options......Page 290
29.7 Creating Aliases and Redirects......Page 293
29.8 Running CGI Programs......Page 296
29.9 Setting Up Server-Side Includes......Page 299
29.10 Configuring Logging......Page 301
29.11 Setting Up Custom Error Messages......Page 304
29.12 Adding and Editing MIME Types......Page 305
29.13 Password Protecting a Directory......Page 306
29.14 Restricting Access by Client Address......Page 310
29.15 Encodings, Character Sets, and Languages......Page 311
29.16 Editing .htaccess Files......Page 314
29.17 Setting Up User Web Directories......Page 316
29.18 Configuring Apache as a Proxy Server......Page 318
29.19 Setting Up SSL......Page 321
29.20 Viewing and Editing Directives......Page 325
29.21 Module Access Control......Page 327
29.22 Configuring the Apache Webserver Module......Page 328
29.23 Summary......Page 331
30.1 Introduction to the Domain Name System......Page 332
30.2 The BIND DNS Server Module......Page 335
30.3 Creating a New Master Zone......Page 338
30.4 Adding and Editing Records......Page 339
30.5 Record Types......Page 342
30.6 Editing a Master Zone......Page 347
30.7 Creating a New Slave Zone......Page 349
30.8 Editing a Slave Zone......Page 351
30.9 Creating and Editing a Forward Zone......Page 353
30.10 Creating a Root Zone......Page 354
30.11 Editing Zone Defaults......Page 355
30.12 Configuring Forwarding and Transfers......Page 357
30.13 Editing Access Control Lists......Page 358
30.14 Setting Up Partial Reverse Delegation......Page 359
30.15 Using BIND Views......Page 361
30.16 Module Access Control......Page 363
30.18 The BIND 4 DNS Server Module......Page 364
30.19 Summary......Page 370
31.2 The CVS Server Module......Page 371
31.3 Setting Up the CVS Server......Page 372
31.5 Adding and Editing Users......Page 373
31.6 Limiting User Access......Page 375
31.9 Configuring the CVS Server Module......Page 376
31.10 Summary......Page 377
32.1 Introduction to the Dynamic Host Configuration Protocol......Page 378
32.2 The ISC DHCP Server......Page 379
32.3 The DHCP Server Module......Page 380
32.4 Adding and Editing Subnets......Page 382
32.5 Viewing and Deleting Leases......Page 386
32.7 Adding and Editing Fixed Hosts......Page 387
32.8 Adding and Editing Shared Networks......Page 389
32.9 Adding and Editing Groups......Page 390
32.10 Module Access Control......Page 391
32.11 Configuring the DHCP Server Module......Page 392
32.12 Summary......Page 394
33.1 Introduction to Fetchmail......Page 395
33.2 The Fetchmail Mail Retrieval Module......Page 396
33.3 Adding a New Mail Server to Check......Page 398
33.5 Running the Fetchmail Daemon......Page 401
33.6 Editing Global Settings......Page 402
33.9 Summary......Page 403
34.1 Introduction to Mailing Lists and Majordomo......Page 405
34.2 The Majordomo List Manager Module......Page 406
34.4 Creating a Mailing List......Page 408
34.5 Managing List Members......Page 409
34.6 Editing List Information, Headers, and Footers......Page 410
34.7 Editing Subscription Options......Page 412
34.8 Editing Forwarded Email Options......Page 413
34.9 Editing List Access Control......Page 414
34.10 Moderating and Maintaining a Mailing List......Page 415
34.12 Creating a Digest List......Page 416
34.13 Editing Digest Options......Page 417
34.15 Module Access Control......Page 418
34.17 Summary......Page 419
35.1 Introduction to MySQL......Page 422
35.2 The MySQL Database Server Module......Page 423
35.3 Creating a New Database......Page 424
35.4 Creating a New Table......Page 425
35.5 Adding and Editing Fields......Page 426
35.7 Viewing and Editing Table Contents......Page 429
35.8 Deleting Tables and Databases......Page 433
35.10 Backing Up and Restoring a Database......Page 434
35.11 Managing MySQL Users......Page 436
35.12 Managing Database, Host, Table, and Field Permissions......Page 438
35.13 Module Access Control......Page 440
35.14 Configuring the MySQL Database Server Module......Page 441
35.15 Summary......Page 444
36.1 Introduction to PostgreSQL......Page 445
36.2 The PostgreSQL Database Server Module......Page 446
36.4 Creating a New Table......Page 448
36.6 Deleting a Field......Page 450
36.7 Field Types......Page 451
36.9 Deleting Tables and Databases......Page 453
36.11 Backing Up and Restoring a Database......Page 454
36.12 Managing PostgreSQL Users......Page 456
36.14 Restricting Client Access......Page 458
36.15 Editing Object Privileges......Page 459
36.16 Module Access Control......Page 460
36.17 Configuring the PostgreSQL Database Server Module......Page 461
36.18 Summary......Page 464
37.1 Introduction to Internet Email......Page 465
37.2 The Sendmail Configuration Module......Page 466
37.3 Editing Local Domains and Domain Masquerading......Page 468
37.4 Managing Email Aliases......Page 469
37.5 Configuring Relaying......Page 472
37.6 Managing Virtual Address Mappings......Page 473
37.7 Configuring Domain Routing......Page 474
37.8 Editing Global Sendmail Options......Page 475
37.9 Viewing the Mail Queue......Page 477
37.10 Reading Users’ Email......Page 478
37.11 Adding Sendmail Features with M4......Page 480
37.12 Creating Autoreply Aliases......Page 482
37.13 Creating Filter Aliases......Page 483
37.14 Sendmail Module Access Control......Page 485
37.15 Configuring the Sendmail Configuration Module......Page 486
37.16 Summary......Page 492
38.1 Introduction to Qmail......Page 493
38.2 The Qmail Configuration Module......Page 494
38.3 Editing Local Domains......Page 495
38.4 Managing Email Aliases......Page 496
38.5 Configuring Relaying......Page 497
38.6 Managing Virtual Mappings......Page 498
38.7 Configuring Domain Routing......Page 500
38.9 Editing Mail User Assignments......Page 501
38.11 Reading Users’ Email......Page 503
38.12 Configuring the Qmail Configuration Module......Page 505
38.13 Summary......Page 507
39.1 The Webalizer Logfile Analysis Module......Page 508
39.2 Editing Report Options......Page 509
39.4 Reporting on Schedule......Page 513
39.5 Adding Another Log File......Page 514
39.7 Module Access Control......Page 515
39.8 Summary......Page 516
40.1 Introduction to FTP and ProFTPD......Page 517
40.2 The ProFTPD Server Module......Page 518
40.3 Running ProFTPD from inetd or xinetd......Page 520
40.4 Using the ProFTPD Server Module......Page 521
40.5 Creating Virtual Servers......Page 522
40.6 Setting Up Anonymous FTP......Page 523
40.7 Restricting Users to Their Home Directories......Page 524
40.8 Limiting Who Can Log In......Page 525
40.9 Setting Directory Listing Options......Page 527
40.10 Message and Readme Files......Page 528
40.11 Setting Per-Directory Options......Page 529
40.12 Restricting Access to FTP Commands......Page 531
40.13 Configuring Logging......Page 534
40.14 Limiting Concurrent Logins......Page 536
40.15 Restricting Clients by IP Address......Page 537
40.16 Limiting Uploads......Page 538
40.18 Configuring the ProFTPD Server Module......Page 540
40.19 Summary......Page 541
41.1 Introduction to WU-FTPD......Page 542
41.2 The WU-FTPD Server Module......Page 543
41.3 Limiting Who Can Log In......Page 545
41.4 Setting Up Anonymous FTP......Page 546
41.5 Managing User Classes......Page 548
41.6 Denying Access to Files......Page 549
41.7 Setting Up Guest Users......Page 551
41.8 Editing Directory Aliases......Page 552
41.9 Message and Readme Files......Page 553
41.10 Configuring Logging......Page 555
41.11 Limiting Concurrent Logins......Page 557
41.13 Restricting Access to FTP Commands......Page 558
41.14 Configuring the WU-FTPD Server Module......Page 559
41.15 Summary......Page 560
42.1 Introduction to SSH......Page 561
42.3 Restricting Access to the SSH Server......Page 562
42.4 Network Configuration......Page 564
42.5 Authentication Configuration......Page 566
42.6 Editing Client Host Options......Page 568
42.7 Setting Up SSH for New Users......Page 569
42.9 Summary......Page 570
43.1 Introduction to SMB and Samba......Page 571
43.3 Managing Samba Users......Page 573
43.4 Adding a New File Share......Page 576
43.5 Adding a New Printer Share......Page 577
43.6 Viewing and Disconnecting Clients......Page 579
43.7 Editing Share Security Options......Page 580
43.8 Editing File Permission Settings......Page 581
43.9 Editing File Naming Options......Page 582
43.10 Editing Other File Share Options......Page 583
43.11 Editing Printer Share Options......Page 584
43.13 Configuring Networking......Page 585
43.14 Configuring Authentication......Page 588
43.15 Configuring Printers......Page 589
43.17 Module Access Control......Page 590
43.18 Configuring the Samba Windows File Sharing Module......Page 591
43.19 Summary......Page 593
44.1 Introduction to Proxying and Squid......Page 594
44.2 The Squid Proxy Server Module......Page 595
44.3 Changing the Proxy Ports and Addresses......Page 597
44.4 Adding Cache Directories......Page 598
44.5 Editing Caching and Proxy Options......Page 600
44.6 Introduction to Access Control Lists......Page 601
44.7 Creating and Editing ACLs......Page 603
44.8 Creating and Editing Proxy Restrictions......Page 609
44.9 Setting Up Proxy Authentication......Page 610
44.10 Configuring Logging......Page 612
44.11 Connecting to Other Proxies......Page 613
44.12 Clearing the Cache......Page 615
44.14 Viewing Cache Manager Statistics......Page 616
44.15 Analyzing the Squid Logs......Page 617
44.17 Configuring the Squid Proxy Server Module......Page 618
44.18 Summary......Page 621
45.1 Introduction to Procmail......Page 622
45.3 Setting Up Sendmail......Page 623
45.4 Creating and Editing Actions......Page 625
45.5 Creating and Editing Variable Assignments......Page 628
45.6 Conditional Blocks and Include Files......Page 629
45.7 Filtering Spam with SpamAssassin......Page 630
45.9 Summary......Page 631
46.1 Introduction to SSL and STunnel......Page 632
46.2 The SSL Tunnels Module......Page 633
46.3 Creating and Editing SSL Tunnels......Page 634
46.4 Configuring the SSL Tunnels Module......Page 635
46.5 Summary......Page 636
47.1 Introduction to Usermin......Page 637
47.3 Starting and Stopping Usermin......Page 638
47.4 Restricting Access to Usermin......Page 639
47.6 Configuring the Usermin User Interface......Page 640
47.7 Installing Usermin Modules......Page 641
47.9 Upgrading Usermin......Page 642
47.10 Configuring Authentication......Page 643
47.11 Editing Categories and Moving Modules......Page 645
47.12 Changing and Installing Themes......Page 646
47.13 Turning on SSL......Page 647
47.14 Configuring Usermin Modules......Page 648
47.15 Restricting Access to Modules......Page 649
47.16 Limiting Who Can Log In......Page 653
47.17 About the Usermin Modules......Page 655
47.18 Configuring the Usermin Configuration Module......Page 658
47.19 Summary......Page 659
48.1 Introduction to Webmin Clustering......Page 660
48.2 The Cluster Software Packages Module......Page 661
48.3 Registering a Server......Page 662
48.5 Searching for Packages......Page 663
48.7 Exploring and Removing a Server......Page 664
48.10 Summary......Page 665
49.1 The Cluster Users and Groups Module......Page 666
49.2 Registering a Server......Page 667
49.3 Creating a New User......Page 668
49.4 Editing an Existing User......Page 669
49.5 Deleting a User......Page 670
49.7 Editing an Existing Group......Page 671
49.10 Synchronizing Users and Groups......Page 673
49.11 Listing and Removing a Server......Page 675
49.13 Summary......Page 676
50.1 The Cluster Webmin Configuration Module......Page 677
50.2 Registering a Server......Page 678
50.4 Editing or Deleting a Webmin User......Page 679
50.6 Editing or Deleting a Webmin Group......Page 681
50.7 Editing the User or Group ACL for a Module......Page 682
50.8 Installing a Module or Theme......Page 683
50.10 Refreshing User and Module Lists......Page 684
50.13 Summary......Page 685
51.2 Restricting Access to Webmin......Page 686
51.3 Changing the Port and Address......Page 687
51.4 Setting Up Logging......Page 688
51.6 Configuring the Webmin User Interface......Page 689
51.7 Installing and Deleting Webmin Modules......Page 690
51.8 Cloning a Webmin Module......Page 691
51.9 Changing Your Operating System......Page 692
51.11 Changing Webmin’s Language......Page 693
51.12 Editing Main Menu Settings......Page 694
51.13 Upgrading Webmin......Page 695
51.14 Installing Updates to Webmin......Page 696
51.15 Configuring Authentication......Page 698
51.16 Editing Categories and Moving Modules......Page 699
51.17 Changing and Installing Themes......Page 700
51.18 Referrer Checking......Page 701
51.19 Allowing Unauthenticated Access to Modules......Page 702
51.21 Setting Up a Certificate Authority......Page 703
51.22 Summary......Page 704
52.1 Introduction to Webmin Users, Groups, and Permissions......Page 705
52.3 Creating a New Webmin User......Page 706
52.4 Editing a Webmin User......Page 708
52.5 Editing Module Access Control......Page 709
52.6 Creating and Editing Webmin Groups......Page 711
52.7 Requesting a Client SSL Key......Page 712
52.9 Module Access Control......Page 714
52.10 Configuring the Webmin Users Module......Page 715
52.11 Summary......Page 716
53.1 The Webmin Servers Index Module......Page 717
53.2 Adding a Webmin Server......Page 718
53.4 Using Server Tunnels......Page 720
53.6 How RPC Works......Page 721
53.7 Module Access Control......Page 722
53.9 Summary......Page 723
54.1 Introduction to Logging......Page 724
54.3 Displaying Logs......Page 725
54.4 Summary......Page 726
55.1 Introduction......Page 727
55.2 Required Files......Page 728
55.3 Module CGI Programs......Page 729
55.4 Module Configuration......Page 732
55.5 Look and Feel......Page 734
55.7 Online Help......Page 735
55.8 Module Packaging......Page 736
55.9 Summary and Learning More......Page 737
56.1 Module Access Control......Page 738
56.3 Internationalization......Page 740
56.4 File Locking......Page 742
56.5 Action Logging......Page 743
56.7 Functions in Other Modules......Page 745
56.8 Remote Procedure Calls......Page 747
56.9 Creating Usermin Modules......Page 749
56.10 Summary......Page 750
57.1 Module Design and CGI Programs......Page 751
57.2 The cron-lib.pl Library Script......Page 752
57.3 Module Configuration Settings......Page 754
57.5 The acl_security.pl Access Control Script......Page 755
57.6 The log_parser.pl Log Reporting Script......Page 756
57.8 Summary......Page 757
58.1 Introduction to Themes......Page 758
58.2 Overriding Images and Programs......Page 760
58.3 Theme Functions......Page 761
58.4 Summary......Page 763
59.1 Theme Design and Graphics......Page 764
59.3 The theme_header Function......Page 765
59.4 The theme_footer Function......Page 766
59.5 Summary......Page 767
60.1 API Functions......Page 768
60.2 Summary......Page 782
A......Page 784
B......Page 785
C......Page 786
D......Page 788
E......Page 789
F......Page 790
H......Page 792
I......Page 793
L......Page 794
M......Page 795
N......Page 797
O......Page 798
P......Page 799
Q......Page 801
S......Page 802
T U......Page 806
V......Page 807
W......Page 808
Z......Page 809
Back Cover......Page 810