Managing Linux Systems with Webmin: System Administration and Module Development

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

I really like Webmin and use it often since I'm not a Linux geek. There is good information in the book and it is well edited and presented. The problem is, the book describes an outdated version of Webmin. The program has a completely new interface which is sufficiently different to make this book much less desirable as a guide to the program. In my view, this book contributes to understanding some of the Linux configurations for which Webmin provides an interface. But, if you are looking for help in using Webmin itself, you may be disappointed. I was. I probably won't return it, but I wouldn't have bought it had I known. I would love to see this book updated.

Author(s): Jamie Cameron
Publisher: Prentice Hall
Year: 2003

Language: English
Pages: 808

Cover......Page 3
Contents at a Glance......Page 5
Contents......Page 7
1.1 What is Webmin?......Page 17
1.2 Who Should Use Webmin?......Page 18
1.3 How and Why Was it Developed?......Page 19
1.5 Who Should Read this Book?......Page 20
1.7 Acknowledgments......Page 21
2.1 Downloading Webmin for Your System......Page 22
2.2 Installing the RPM Package......Page 23
2.3 Installing the tar. gz Package......Page 24
2.5 The Webmin User Interface......Page 26
2.7 Summary......Page 29
3.1 Network Security......Page 30
3.2 SSL Encryption......Page 31
3.3 Requesting a Valid SSL Certificate......Page 33
3.4 Summary......Page 34
4.1 Introduction to UNIX Users and Groups......Page 35
4.2 The Users and Groups Module......Page 36
4.3 Creating a New User......Page 37
4.4 Editing an Existing User......Page 39
4.5 Deleting a User......Page 40
4.6 Creating a New Group......Page 41
4.7 Editing an Existing Group......Page 42
4.9 Viewing Recent and Current Logins......Page 43
4.11 Creating Users from Batch Files......Page 44
4.12 Configuring the Users and Groups Module......Page 46
4.14 Module Access Control......Page 50
4.15 Other Operating Systems......Page 53
4.16 Summary......Page 54
5.1 Introduction to Filesystems......Page 55
5.3 Mounting an NFS Network Filesystem......Page 56
5.4 Mounting an SMBFS Windows Networking Filesystem......Page 59
5.5 Mounting a Local ext2 or ext3 Hard Disk Filesystem......Page 60
5.6 Mounting a Local Windows Hard Disk Filesystem......Page 61
5.7 Adding Virtual Memory......Page 62
5.8 Automounter Filesystems......Page 63
5.10 Listing Users of a Filesystem......Page 64
5.11 Module Access Control......Page 65
5.13 A Comparison of Filesystem Types......Page 66
5.14 Other Operating Systems......Page 67
5.15 Summary......Page 68
6.1 Introduction to File Sharing with NFS......Page 69
6.3 Exporting a Directory......Page 70
6.4 Editing or Deleting an NFS Export......Page 71
6.5 NFS on Solaris......Page 72
6.6 NFS on BSD, MacOS X, and OpenServer......Page 73
6.8 Summary......Page 75
7.1 Introduction to Disk Quotas......Page 76
7.2 The Disk Quotas Module......Page 77
7.4 Disabling Quotas for a Filesystem......Page 78
7.6 Copying Quotas to Multiple Users......Page 79
7.7 Setting Grace Times......Page 80
7.8 Setting Default Quotas for New Users......Page 81
7.11 Module Access Control......Page 82
7.12 Summary......Page 83
8.1 Introduction to Hard Disk Partitions......Page 84
8.2 The Partitions on Local Disks Module......Page 85
8.4 Creating a New Filesystem......Page 86
8.5 Partition Labels......Page 87
8.6 Deleting or Changing a Partition......Page 88
8.7 Module Access Control......Page 89
8.9 Introduction to RAID......Page 90
8.10 The Linux RAID Module......Page 91
8.11 Introduction to LVM......Page 93
8.12 The Logical Volume Management Module......Page 94
8.13 Creating a New Volume Group......Page 95
8.15 Creating and Deleting a Logical Volume......Page 96
8.16 Resizing a Logical Volume......Page 97
8.17 Creating a Snapshot......Page 98
8.18 Summary......Page 99
9.1 Introduction to the Linux Boot Process......Page 100
9.3 Configuring an Action to Start at Bootup......Page 101
9.4 Starting and Stopping Actions......Page 102
9.5 Adding a New Action......Page 103
9.8 Other Operating Systems......Page 105
9.9 The SysV Init Configuration Module......Page 107
9.10 Summary......Page 108
10. 2 The Scheduled Cron Jobs Module......Page 109
10. 3 Creating a New Cron Job......Page 110
10.4 Editing a Cron Job......Page 111
10. 7 Configuring the Scheduled Cron Jobs Module......Page 112
10. 9 The Scheduled Commands Module......Page 113
10. 11 Summary......Page 114
11. 2 The Running Processes Module......Page 115
11.3 Viewing, Killing, or Reprioritizing a Process......Page 117
11. 4 Searching for Processes......Page 118
11. 6 Module Access Control Options......Page 119
11.8 Summary......Page 120
12. 1 Introduction to Packages......Page 121
12.3 Installing a New Package......Page 123
12. 4 Finding and Removing a Package......Page 125
12. 5 Updating on Debian Linux......Page 126
12. 7 Other Operating Systems......Page 127
12.8 Summary......Page 128
13. 1 Introduction to Logging......Page 129
13. 3 Adding a New Log File......Page 131
13. 4 Editing or Deleting a Log File......Page 133
13. 5 Module Access Control......Page 134
13. 6 Other Operating Systems......Page 135
13.7 Summary......Page 136
14. 2 The Filesystem Backup Module......Page 137
14. 3 Adding a New Backup......Page 138
14.4 Making a Backup......Page 140
14.6 Restoring a Backup......Page 141
14. 7 Configuring the Filesystem Backup Module......Page 142
14.9 Summary......Page 144
15. 1 Introduction to Internet Services......Page 145
15. 2 The Internet Services and Protocols Module......Page 146
15.4 Creating Your Own Internet Service......Page 149
15.5 Creating and Editing RPC Programs......Page 151
15. 6 Configuring the Internet Services and Protocols Module......Page 152
15. 7 Other Operating Systems......Page 154
15. 8 The Extended Internet Services Module......Page 155
15.9 Enabling or Editing an Extended Internet Service......Page 156
15. 10 Creating an Extended Internet Service......Page 157
15. 11 Editing Default Options......Page 158
15. 12 Summary......Page 159
16. 1 Introduction to Linux Networking......Page 160
16. 2 Viewing and Editing Network Interfaces......Page 162
16. 3 Adding a Network Interface......Page 163
16.4 Configuring Routing......Page 165
16.5 Changing the Hostname or DNS Client Settings......Page 166
16. 6 Editing Host Addresses......Page 167
16. 7 Module Access Control......Page 168
16.9 Summary......Page 169
17. 1 Introduction to NIS......Page 170
17.2 Becoming an NIS Client......Page 171
17. 3 Setting Up an NIS Master Server......Page 173
17.4 Editing NIS Tables......Page 175
17. 5 Securing Your NIS Server......Page 176
17.8 NIS on Solaris......Page 179
17.9 Summary......Page 180
18.1 Introduction to PPP on Linux......Page 181
18.2 Configuring a PPP Server......Page 182
18.3 Managing PPP Accounts......Page 185
18. 4 Restricting Access by Caller ID......Page 187
18.6 Summary......Page 188
19.1 Introduction to Firewalling with IPtables......Page 189
19. 2 The Linux Firewall Module......Page 191
19. 3 Allowing and Denying Network Traffic......Page 193
19. 4 Changing a Chain’s Default Action......Page 197
19. 6 Creating Your Own Chain......Page 198
19. 7 Setting Up Network Address Translation......Page 199
19. 8 Setting Up a Transparent Proxy......Page 200
19.9 Setting Up Port Forwarding......Page 201
19.10 Firewall Rule Conditions......Page 202
19. 12 Summary......Page 205
20. 1 The System Time Module......Page 207
20.3 Change the Hardware Time......Page 208
20. 6 Other Operating Systems......Page 209
20.7 Summary......Page 210
21. 1 Introduction to Boot Loaders......Page 211
21. 2 The Linux Bootup Configuration Module......Page 212
21.3 Booting a New Kernel with LILO......Page 213
21. 4 Booting Another Operating System with LILO......Page 214
21.5 Editing Global LILO Options......Page 215
21. 6 The GRUB Boot Loader Module......Page 216
21.7 Booting a New Linux Kernel or BSD with GRUB......Page 217
21.9 Editing Global GRUB Options......Page 218
21. 12 Summary......Page 219
22. 1 Introduction to Printing on Linux......Page 221
22.3 Adding a New Printer......Page 222
22.4 Editing an Existing Printer......Page 225
22. 5 Managing Print Jobs......Page 226
22. 6 Configuring the Printer Administration Module......Page 227
22. 7 Module Access Control......Page 228
22. 8 Other Operating Systems......Page 229
22.9 Summary......Page 230
23. 1 The Voicemail Server Module......Page 231
23.2 Configuring Your System as an Answering Machine......Page 232
23. 3 Listening to Recorded Messages......Page 234
23.5 Summary......Page 235
24. 2 Configuring the SSH/ Telnet Login Module......Page 236
24.3 The Command Shell Module......Page 238
24.5 Summary......Page 239
25. 1 The Custom Commands Module......Page 240
25. 2 Creating a New Command......Page 241
25.3 Parameter Types......Page 243
25.4 Creating a New File Editor......Page 245
25. 5 Module Access Control......Page 246
25.7 Summary......Page 247
26. 2 Navigating Directories and Viewing Files......Page 248
26.4 Creating and Editing Files......Page 250
26.5 Editing File Permissions......Page 251
26. 6 Creating Links and Directories......Page 252
26.8 Editing EXT File Attributes......Page 253
26.9 Editing XFS File Attributes......Page 254
26.10 Editing File ACLs......Page 255
26. 11 Sharing Directories......Page 256
26. 12 Module Access Control......Page 258
26. 13 Summary......Page 259
27. 1 Introduction to Perl Modules......Page 260
27. 3 Installing a Perl Module......Page 261
27. 4 Viewing and Removing a Perl Module......Page 263
27.6 Summary......Page 264
28. 1 The System and Server Status Module......Page 266
28. 2 Adding a New Monitor......Page 268
28.3 Monitor Types......Page 269
28. 4 Setting Up Scheduled Monitoring......Page 276
28. 6 Configuring the System and Server Status Module......Page 278
28.7 Summary......Page 279
29. 1 Introduction to Apache......Page 280
29. 2 The Apache Webserver Module......Page 281
29.4 Editing Pages on Your Web Server......Page 284
29. 5 Creating a New Virtual Host......Page 285
29. 6 Setting Per- Directory Options......Page 289
29. 7 Creating Aliases and Redirects......Page 292
29. 8 Running CGI Programs......Page 295
29.9 Setting Up Server- Side Includes......Page 298
29. 10 Configuring Logging......Page 300
29. 11 Setting Up Custom Error Messages......Page 303
29.12 Adding and Editing MIME Types......Page 304
29. 13 Password Protecting a Directory......Page 305
29. 14 Restricting Access by Client Address......Page 309
29. 15 Encodings, Character Sets, and Languages......Page 310
29. 16 Editing .htaccess Files......Page 313
29. 17 Setting Up User Web Directories......Page 315
29. 18 Configuring Apache as a Proxy Server......Page 317
29. 19 Setting Up SSL......Page 320
29. 20 Viewing and Editing Directives......Page 324
29. 21 Module Access Control......Page 326
29. 22 Configuring the Apache Webserver Module......Page 327
29. 23 Summary......Page 330
30. 1 Introduction to the Domain Name System......Page 331
30.2 The BIND DNS Server Module......Page 334
30. 3 Creating a New Master Zone......Page 337
30. 4 Adding and Editing Records......Page 338
30.5 Record Types......Page 341
30. 6 Editing a Master Zone......Page 346
30. 7 Creating a New Slave Zone......Page 348
30.8 Editing a Slave Zone......Page 350
30. 9 Creating and Editing a Forward Zone......Page 352
30. 10 Creating a Root Zone......Page 353
30. 11 Editing Zone Defaults......Page 354
30. 12 Configuring Forwarding and Transfers......Page 356
30. 13 Editing Access Control Lists......Page 357
30. 14 Setting Up Partial Reverse Delegation......Page 358
30.15 Using BIND Views......Page 360
30. 16 Module Access Control......Page 362
30. 18 The BIND 4 DNS Server Module......Page 363
30. 19 Summary......Page 369
31. 2 The CVS Server Module......Page 370
31.3 Setting Up the CVS Server......Page 371
31. 5 Adding and Editing Users......Page 372
31. 6 Limiting User Access......Page 374
31.9 Configuring the CVS Server Module......Page 375
31. 10 Summary......Page 376
32. 1 Introduction to the Dynamic Host Configuration Protocol......Page 377
32.2 The ISC DHCP Server......Page 378
32. 3 The DHCP Server Module......Page 379
32. 4 Adding and Editing Subnets......Page 381
32. 5 Viewing and Deleting Leases......Page 385
32. 7 Adding and Editing Fixed Hosts......Page 386
32. 8 Adding and Editing Shared Networks......Page 388
32. 9 Adding and Editing Groups......Page 389
32. 10 Module Access Control......Page 390
32.11 Configuring the DHCP Server Module......Page 391
32. 12 Summary......Page 393
33. 1 Introduction to Fetchmail......Page 394
33.2 The Fetchmail Mail Retrieval Module......Page 395
33.3 Adding a New Mail Server to Check......Page 397
33. 5 Running the Fetchmail Daemon......Page 400
33.6 Editing Global Settings......Page 401
33.9 Summary......Page 402
34.1 Introduction to Mailing Lists and Majordomo......Page 404
34. 2 The Majordomo List Manager Module......Page 405
34.4 Creating a Mailing List......Page 407
34. 5 Managing List Members......Page 408
34. 6 Editing List Information, Headers, and Footers......Page 409
34.7 Editing Subscription Options......Page 411
34.8 Editing Forwarded Email Options......Page 412
34.9 Editing List Access Control......Page 413
34. 10 Moderating and Maintaining a Mailing List......Page 414
34. 12 Creating a Digest List......Page 415
34. 13 Editing Digest Options......Page 416
34. 15 Module Access Control......Page 417
34. 17 Summary......Page 418
35. 1 Introduction to MySQL......Page 421
35. 2 The MySQL Database Server Module......Page 422
35. 3 Creating a New Database......Page 423
35. 4 Creating a New Table......Page 424
35. 5 Adding and Editing Fields......Page 425
35. 7 Viewing and Editing Table Contents......Page 428
35. 8 Deleting Tables and Databases......Page 432
35. 10 Backing Up and Restoring a Database......Page 433
35. 11 Managing MySQL Users......Page 435
35. 12 Managing Database, Host, Table, and Field Permissions......Page 437
35. 13 Module Access Control......Page 439
35. 14 Configuring the MySQL Database Server Module......Page 440
35. 15 Summary......Page 443
36. 1 Introduction to PostgreSQL......Page 444
36. 2 The PostgreSQL Database Server Module......Page 445
36. 4 Creating a New Table......Page 447
36.6 Deleting a Field......Page 449
36. 7 Field Types......Page 450
36. 9 Deleting Tables and Databases......Page 452
36. 11 Backing Up and Restoring a Database......Page 453
36. 12 Managing PostgreSQL Users......Page 455
36.14 Restricting Client Access......Page 457
36.15 Editing Object Privileges......Page 458
36. 16 Module Access Control......Page 459
36. 17 Configuring the PostgreSQL Database Server Module......Page 460
36. 18 Summary......Page 463
37. 1 Introduction to Internet Email......Page 464
37. 2 The Sendmail Configuration Module......Page 465
37.3 Editing Local Domains and Domain Masquerading......Page 467
37.4 Managing Email Aliases......Page 468
37.5 Configuring Relaying......Page 471
37. 6 Managing Virtual Address Mappings......Page 472
37.7 Configuring Domain Routing......Page 473
37.8 Editing Global Sendmail Options......Page 474
37.9 Viewing the Mail Queue......Page 476
37. 10 Reading Users’ Email......Page 477
37. 11 Adding Sendmail Features with M4......Page 479
37. 12 Creating Autoreply Aliases......Page 481
37. 13 Creating Filter Aliases......Page 482
37. 14 Sendmail Module Access Control......Page 484
37. 15 Configuring the Sendmail Configuration Module......Page 485
37. 16 Summary......Page 491
38. 1 Introduction to Qmail......Page 492
38.2 The Qmail Configuration Module......Page 493
38.3 Editing Local Domains......Page 494
38.4 Managing Email Aliases......Page 495
38.5 Configuring Relaying......Page 496
38. 6 Managing Virtual Mappings......Page 497
38.7 Configuring Domain Routing......Page 499
38.9 Editing Mail User Assignments......Page 500
38. 11 Reading Users’ Email......Page 502
38. 12 Configuring the Qmail Configuration Module......Page 504
38. 13 Summary......Page 506
39. 1 The Webalizer Logfile Analysis Module......Page 507
39.2 Editing Report Options......Page 508
39. 4 Reporting on Schedule......Page 512
39. 5 Adding Another Log File......Page 513
39. 7 Module Access Control......Page 514
39.8 Summary......Page 515
40. 1 Introduction to FTP and ProFTPD......Page 516
40. 2 The ProFTPD Server Module......Page 517
40. 3 Running ProFTPD from inetd or xinetd......Page 519
40. 4 Using the ProFTPD Server Module......Page 520
40.5 Creating Virtual Servers......Page 521
40.6 Setting Up Anonymous FTP......Page 522
40. 7 Restricting Users to Their Home Directories......Page 523
40. 8 Limiting Who Can Log In......Page 524
40. 9 Setting Directory Listing Options......Page 526
40. 10 Message and Readme Files......Page 527
40. 11 Setting Per- Directory Options......Page 528
40. 12 Restricting Access to FTP Commands......Page 530
40. 13 Configuring Logging......Page 533
40. 14 Limiting Concurrent Logins......Page 535
40.15 Restricting Clients by IP Address......Page 536
40. 16 Limiting Uploads......Page 537
40. 18 Configuring the ProFTPD Server Module......Page 539
40. 19 Summary......Page 540
41. 1 Introduction to WU- FTPD......Page 541
41.2 The WU- FTPD Server Module......Page 542
41. 3 Limiting Who Can Log In......Page 544
41.4 Setting Up Anonymous FTP......Page 545
41. 5 Managing User Classes......Page 547
41. 6 Denying Access to Files......Page 548
41.7 Setting Up Guest Users......Page 550
41.8 Editing Directory Aliases......Page 551
41. 9 Message and Readme Files......Page 552
41. 10 Configuring Logging......Page 554
41. 11 Limiting Concurrent Logins......Page 556
41. 13 Restricting Access to FTP Commands......Page 557
41. 14 Configuring the WU- FTPD Server Module......Page 558
41. 15 Summary......Page 559
42. 1 Introduction to SSH......Page 560
42. 3 Restricting Access to the SSH Server......Page 561
42.4 Network Configuration......Page 563
42. 5 Authentication Configuration......Page 565
42.6 Editing Client Host Options......Page 567
42.7 Setting Up SSH for New Users......Page 568
42.9 Summary......Page 569
43. 1 Introduction to SMB and Samba......Page 570
43. 3 Managing Samba Users......Page 572
43.4 Adding a New File Share......Page 575
43.5 Adding a New Printer Share......Page 576
43. 6 Viewing and Disconnecting Clients......Page 578
43.7 Editing Share Security Options......Page 579
43.8 Editing File Permission Settings......Page 580
43.9 Editing File Naming Options......Page 581
43.10 Editing Other File Share Options......Page 582
43. 11 Editing Printer Share Options......Page 583
43. 13 Configuring Networking......Page 584
43. 14 Configuring Authentication......Page 587
43. 15 Configuring Printers......Page 588
43. 17 Module Access Control......Page 589
43. 18 Configuring the Samba Windows File Sharing Module......Page 590
43. 19 Summary......Page 592
44. 1 Introduction to Proxying and Squid......Page 593
44. 2 The Squid Proxy Server Module......Page 594
44. 3 Changing the Proxy Ports and Addresses......Page 596
44. 4 Adding Cache Directories......Page 597
44.5 Editing Caching and Proxy Options......Page 599
44. 6 Introduction to Access Control Lists......Page 600
44.7 Creating and Editing ACLs......Page 602
44. 8 Creating and Editing Proxy Restrictions......Page 608
44. 9 Setting Up Proxy Authentication......Page 609
44. 10 Configuring Logging......Page 611
44. 11 Connecting to Other Proxies......Page 612
44. 12 Clearing the Cache......Page 614
44. 14 Viewing Cache Manager Statistics......Page 615
44. 15 Analyzing the Squid Logs......Page 616
44. 17 Configuring the Squid Proxy Server Module......Page 617
44. 18 Summary......Page 620
45. 1 Introduction to Procmail......Page 621
45.3 Setting Up Sendmail......Page 622
45. 4 Creating and Editing Actions......Page 624
45. 5 Creating and Editing Variable Assignments......Page 627
45. 6 Conditional Blocks and Include Files......Page 628
45. 7 Filtering Spam with SpamAssassin......Page 629
45.9 Summary......Page 630
46. 1 Introduction to SSL and STunnel......Page 631
46. 2 The SSL Tunnels Module......Page 632
46. 3 Creating and Editing SSL Tunnels......Page 633
46. 4 Configuring the SSL Tunnels Module......Page 634
46.5 Summary......Page 635
47. 1 Introduction to Usermin......Page 636
47. 3 Starting and Stopping Usermin......Page 637
47. 4 Restricting Access to Usermin......Page 638
47.6 Configuring the Usermin User Interface......Page 639
47.7 Installing Usermin Modules......Page 640
47.9 Upgrading Usermin......Page 641
47. 10 Configuring Authentication......Page 642
47. 11 Editing Categories and Moving Modules......Page 644
47. 12 Changing and Installing Themes......Page 645
47. 13 Turning on SSL......Page 646
47. 14 Configuring Usermin Modules......Page 647
47. 15 Restricting Access to Modules......Page 648
47. 16 Limiting Who Can Log In......Page 652
47. 17 About the Usermin Modules......Page 654
47. 18 Configuring the Usermin Configuration Module......Page 657
47. 19 Summary......Page 658
48. 1 Introduction to Webmin Clustering......Page 659
48. 2 The Cluster Software Packages Module......Page 660
48.3 Registering a Server......Page 661
48. 5 Searching for Packages......Page 662
48. 7 Exploring and Removing a Server......Page 663
48. 10 Summary......Page 664
49. 1 The Cluster Users and Groups Module......Page 665
49.2 Registering a Server......Page 666
49. 3 Creating a New User......Page 667
49.4 Editing an Existing User......Page 668
49.5 Deleting a User......Page 669
49.7 Editing an Existing Group......Page 670
49. 10 Synchronizing Users and Groups......Page 672
49. 11 Listing and Removing a Server......Page 674
49. 13 Summary......Page 675
50. 1 The Cluster Webmin Configuration Module......Page 676
50.2 Registering a Server......Page 677
50.4 Editing or Deleting a Webmin User......Page 678
50.6 Editing or Deleting a Webmin Group......Page 680
50. 7 Editing the User or Group ACL for a Module......Page 681
50. 8 Installing a Module or Theme......Page 682
50. 10 Refreshing User and Module Lists......Page 683
50. 13 Summary......Page 684
51. 2 Restricting Access to Webmin......Page 685
51. 3 Changing the Port and Address......Page 686
51. 4 Setting Up Logging......Page 687
51.6 Configuring the Webmin User Interface......Page 688
51.7 Installing and Deleting Webmin Modules......Page 689
51. 8 Cloning a Webmin Module......Page 690
51. 9 Changing Your Operating System......Page 691
51. 11 Changing Webmin’s Language......Page 692
51.12 Editing Main Menu Settings......Page 693
51. 13 Upgrading Webmin......Page 694
51. 14 Installing Updates to Webmin......Page 695
51. 15 Configuring Authentication......Page 697
51. 16 Editing Categories and Moving Modules......Page 698
51. 17 Changing and Installing Themes......Page 699
51. 18 Referrer Checking......Page 700
51. 19 Allowing Unauthenticated Access to Modules......Page 701
51. 21 Setting Up a Certificate Authority......Page 702
51. 22 Summary......Page 703
52. 1 Introduction to Webmin Users, Groups, and Permissions......Page 704
52. 3 Creating a New Webmin User......Page 705
52.4 Editing a Webmin User......Page 707
52. 5 Editing Module Access Control......Page 708
52. 6 Creating and Editing Webmin Groups......Page 710
52.7 Requesting a Client SSL Key......Page 711
52. 9 Module Access Control......Page 713
52. 10 Configuring the Webmin Users Module......Page 714
52. 11 Summary......Page 715
53.1 The Webmin Servers Index Module......Page 716
53.2 Adding a Webmin Server......Page 717
53.4 Using Server Tunnels......Page 719
53.6 How RPC Works......Page 720
53. 7 Module Access Control......Page 721
53.9 Summary......Page 722
54. 1 Introduction to Logging......Page 723
54. 3 Displaying Logs......Page 724
54.4 Summary......Page 725
55. 1 Introduction......Page 726
55.2 Required Files......Page 727
55. 3 Module CGI Programs......Page 728
55. 4 Module Configuration......Page 731
55. 5 Look and Feel......Page 733
55.7 Online Help......Page 734
55. 8 Module Packaging......Page 735
55. 9 Summary and Learning More......Page 736
56. 1 Module Access Control......Page 737
56.3 Internationalization......Page 739
56.4 File Locking......Page 741
56. 5 Action Logging......Page 742
56. 7 Functions in Other Modules......Page 744
56.8 Remote Procedure Calls......Page 746
56. 9 Creating Usermin Modules......Page 748
56. 10 Summary......Page 749
57. 1 Module Design and CGI Programs......Page 750
57.2 The cron- lib. pl Library Script......Page 751
57. 3 Module Configuration Settings......Page 753
57. 5 The acl_ security. pl Access Control Script......Page 754
57. 6 The log_ parser. pl Log Reporting Script......Page 755
57.8 Summary......Page 756
58. 1 Introduction to Themes......Page 757
58. 2 Overriding Images and Programs......Page 759
58. 3 Theme Functions......Page 760
58.4 Summary......Page 762
59. 1 Theme Design and Graphics......Page 763
59. 3 The theme_ header Function......Page 764
59. 4 The theme_ footer Function......Page 765
59.5 Summary......Page 766
60. 1 API Functions......Page 767
60.2 Summary......Page 781
A......Page 783
B......Page 784
C......Page 785
D......Page 787
E......Page 788
F......Page 789
H......Page 791
I......Page 792
L......Page 793
M......Page 794
N......Page 796
O......Page 797
P......Page 798
Q......Page 800
S......Page 801
T U......Page 805
V......Page 806
W......Page 807
Z......Page 808