WASD Hypertext Services - Technical Overview

18 - Server Administration

18.1 - Access Without Configuration
18.2 - Access Configuration
18.3 - Server Instances
18.4 - HTTPd Server Reports
18.5 - HTTPd Server Revise
18.6 - HTTPd Server Action
[next] [previous] [contents] [full-page]

The online Server Administration facility provides a rich collection of functionality, including server control, reports and configuration. Some of these are intended as general administration tools while other provide more detailed information intended for server debugging and development purposes.

[graphic]  Server Administration Graphic

The value of the WATCH facility 19 - WATCH Facility as a general configuration and problem-solving tool cannot be overstated.

All server configuration files, with the execption of the authentication databases, are plain text and may be modified with any prefered editor. However the majority of these can also be administered online through a browser. In addition the update facility allows some administration of file system portions of the Web. See 22 - HTTPd Web Update.

Access to many portions of the package is constrained by file protections and directory listing access files. See 15.10.8 - SYSUAF Profile For Full Site Access for a method for circumventing these restrictions.


18.1 - Access Without Configuration

It is often a significant advantage for the inexperienced administrator on a new and largely unconfigured installation to be able to gain access to the facilities offered by Server Administration, particularly the WATCH facility (19 - WATCH Facility). This can be done quite simply by using the authentication skeleton-key (15.11 - Skeleton-Key Authentication). This allows the site administrator to register a username and password from the commnd-line that can be used to gain access to the server. In addition, the server ensures that requesting an otherwise non-authorized Server Administration facility generates a challenge which invokes a username/password dialog at the browser allowing the user to enter the previously registered username and password and gain access.


Method


18.2 - Access Configuration

One established the site should make the Server Administration facility a configured facility of the site. The value of it's facilities cannot be overstated. The section 14.1 - SYSUAF/Identifier Authentication provides a short guide to setting up authorization for server administration purposes.

It is also recommended that for production sites the path to these reports be controlled via authentication and authorization, using both host and username restrictions, similar to the following:

  [WHATEVER-REALM]
  /httpd/-/admin/*  host.ip.addr,~WebMaster,~WhoEverElse,r+w

If a full authorization environment is not required but administration via browser is still desired restrict access to browsers executing on the server system itself, using an appropriate SYSUAF-authenticated username. Provision of a VMS account for server administration only is quite feasable, see 15.10.5 - Nil-Access VMS Accounts.

  [VMS]
  /httpd/-/admin/*  #localhost,~username,r+w

If SSL is in use (17 - Secure Sockets Layer) then username/password privacy is inherently secured via the encrypted communications. To restrict server administration functions to this secure environment add the following to the HTTPD$MAP configuration file:

  /httpd/-/admin/*  "403 Access denied."  ![sc:https]

When using the revise capability of the Server Administration facility is necessary to comply with all the requirements for Web update of files. This is discussed in general terms in 22 - HTTPd Web Update. Revision of server configuration files requires path permissions allowing write access for the username(s) doing the administration, as well as the required ACL on the target directory (in the following example HT_ROOT:[LOCAL]).

  [VMS]
  /httpd/-/admin/*  #localhost,~username,r+w
  /ht_root/local/*  #localhost,~username,r+w

It is possible to allow general access to the Server Administration facility and reports while restricting the ability to initiate server actions such as a restart! Using the WORLD realm against the path is necessary, for the obvious security reason, the server administration module will not allow itself to be used without an authenticated username, provided as a pseudo-authenticated "WORLD".

  [VMS]
  /httpd/-/admin/control/*  #localhost,~username,r+w
  [WORLD]
  /httpd/-/admin/* r


18.3 - Server Instances

With a single instance (6.2 - Server Instances) access to Server Administration reports, etc. is always serviced by the one server process. If multiple instances are configured in common with all requests administration requests will be serviced by any one of the associated processes depending on the indeterminate current state of the round-robin distribution.

There are many circumstances where it is preferable to access only the one server. This can be accomplished for two differing objectives.

  1. To facilitate access to a specific instance's Server Administration page, including instance-specific reports etc. This is provided through the use of an administration service port (Administration Services) available from the Server Administration page.

  2. The Server Administration page (Control Section) and the command-line (5.5.2.6 - Instances) provides the capability to explicitly set the number of instances supported, overriding any configuration directive. After explicitly setting this using either means the server must be restarted. The explicit startup setting remains in effect until it's changed to "max" allowing the HTTPD$CONFIG configuration directive [InstanceMax] to once again determine the number of instances required.

The latter approach is particularly useful when performing detailed WATCH activities (19 - WATCH Facility).

When multiple per-node instances are executing the Server Administration pages and reports all include an indication of which process serviced the request. When accessing no instance in particular the process name is presented in parentheses after the page title

  HTTPd wasd.dsto.defence.gov.au:80
  Server Administration  (HTTPd:80)
When a particular instance's administration service port is being used the process name is separated from the page title by a hyphen
  HTTPd wasd.dsto.defence.gov.au:80
  Server Administration - HTTPd:80


18.4 - HTTPd Server Reports

The server provides a number of internally generated reports. Some of these are of general interest. Others are more for evaluating WASD behaviour and performance for development purposes. These are listed in the approximate order in which they occur top-to-bottom, left-to-right in the menu layout.

It is possible to use this facility standalone, without configuring authorization (18.1 - Access Without Configuration).


18.5 - HTTPd Server Revise

The server provides a comprehensive configuration revision facility.


Enabling Server Access

Many of the server activites listed above require server account write access to the directory in which the configuration files are stored. Where an autononmous scripting account is in use (7.5 - Scripting) this poses minimal threat to server configuration integrity.

  1. Specifically map the /ht_root/local/ path and mark it as access always requiring authorization (ensure this is one on the first mappings in the file and certainly before any other /ht_root/ ones).
      # HTTPD$MAP
      pass /ht_root/local/* auth=all
    

  2. Add appropriate authorization rules (example from 14.1 - SYSUAF/Identifier Authentication).
      # HTTPD$AUTH
      ["Web Admin"=WASD_WEBADMIN=id]
      /httpd/-/admin/* r+w
      /ht_root/local/* r+w
    

  3. Update access to the directory can be applied using the SECHAN utility (23.11 - SECHAN Utility).
      $ SECHAN /WRITE HT_ROOT:[000000]LOCAL.DIR
      $ SECHAN /WRITE HT_ROOT:[LOCAL]
    

  4. Load the new mapping and authorization rules.
      $ HTTPD /DO=MAP
      $ HTTPD /DO=AUTH=LOAD
    


Alternative Using /PROFILE

If a site is using SYSUAF authentication and security profiles enabled using the /PROFILE startup qualifier (15.10.7 - SYSUAF Security Profile) then a more restrictive set up is possible, retaining the default no-access to the [LOCAL] directory. This relies on the administering account(s) having read and write access to the [LOCAL] directory. It is then not necessary to grant that to the server account. It is possible to limit the application of VMS user profiles. This is an example.

  # HTTPD$MAP
  set /ht_root/local/* profile auth=all
  set * noprofile

To use this approach perform steps 1, 2 and 4 from above, substituting the following for step 3.

  $ SECHAN /PACKAGE HT_ROOT:[000000]LOCAL.DIR
  $ SECHAN /PACKAGE HT_ROOT:[LOCAL]
  $ SECHAN /CONTROL HT_ROOT:[000000]LOCAL.DIR


18.6 - HTTPd Server Action

The server allows certain run-time actions to be initiated. Many of these functions can also be initiated from the command line, see 5.5.2 - Server Command Line Control.

When multiple servers are executing on a single node or within a cluster a JavaScript-driven checkbox appears in the bottom left of the administration menu. Checking that box applies any subsequently selected action to all servers!


Control Section


Configuration Action Section


[next] [previous] [contents] [full-page]