Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Wiki Markup
Note:  Next revision cycle, start building everything into
$HOME/\[app\]-\[version#\] and creating a symlink to $HOME/\[app\] so that there is
no question about what the current, in use, directory is.

Note: When downloading software to install in these instructions, always
download the source code, and avoid binary installers.  Binary installers tend
to make inaccurate assumptions about what libraries you have installed on your
system, as well as other problems.

1. download openssl 0.9.8a source from [http://www.openssl.org/source/]. follow
   the instruction in the INSTALL document, compile and install the
   binaries. the default location is /usr/local/ssl. If you want to change it,
   run config like this:

   cd /opt
   tar \-xzvf /root/openssl-0.9.8a.tar.gz
   cd openssl-0.9.8a
   ./config \--prefix=/usr/local/ssl \--openssldir=/usr/local/ssl
   make
   make install

2. set up certificates:

  2a:  get the mitca at [http://ca.mit.edu/mitClient.crt] and save it as
       /usr/local/ssl/certs/mitClient.crt

  2b:  convert mitCA.crt to pem format:

       openssl x509 \-in /usr/local/ssl/certs/mitClient.crt \-inform DER \-outform \
       PEM \-out /usr/local/ssl/certs/mitCA.pem

  2c: Generate rsa key

      This simply generates some random stuff:

    ps > /tmp/foo
    ps \-elf >> /tmp/foo
    cd /usr/local/ssl/bin
    ./openssl genrsa \-rand /tmp/foo 1024 >/usr/local/ssl/private/`hostname`-key.pem

  2d: Generate request for a certificate
   \--------------------------------\-

    cd /usr/local/ssl/bin
    ./openssl req \-key /usr/local/ssl/private/`hostname`-key.pem \-new \
        >../certs/`hostname`-req.pem

   send the file /usr/local/ssl/certs/`hostname`-req.pem to mitcert@mit.edu,

      Please be aware, the organization (O) is:
      Massachusetts Institute of Technology
      and the common name (CN) is the name of the server or
      service, including the domain name (.mit.edu).  Also, some servers, such
      as Thalia servers, can represent an entire subdomain.  These servers
      will need certificates issued with a wildcard in the domain name, such
      as \*.isda-thalia-1.mit.edu.  

   Remember, if the server is a Thalia server, if will need a wildcard
   certificate and DNS record for \*.\[hostname\], and if it is doing any type of
   authentication, it will need a joint client/server certificate to be able
   to connect to the Shibboleth server (and have end users connect to it as
   well).

   2db. To generate a self signed temporary certificate, add the x509 and
        nodes options to the openssl command line.

     cd /usr/local/ssl/bin
     ./openssl req \-key /usr/local/ssl/private/`hostname`-key.pem \-new \
       \-x509 \-nodes >../certs/`hostname`-temp.cert

  2e:When you receive a certificate from MIT Certificates, save it as
      /usr/local/ssl/certs/`hostname`-cert.pem

  2f:  to look at a request:
    openssl req \-in ./req.pem \-text
       to look at the private key:
    openssl rsa \-in /usr/local/ssl/private/`hostname`-key.pem \-text
       to look at the server certificate:
    openssl x509 \-in /usr/localx/ssl/certs/`hostname`-cert.pem \-text

3.  Setup local directory structure and users.

  3a.  Setup the www user.

         groupadd www
         useradd \-g www \-d /home/www \-m \-r \-s /bin/bash www

  3b.  If needed (if this system is going to hold an Alfresco instance, or something similar), setup the repository user.

         groupadd repos
         useradd \-g dbusr \-d /home/www \-m \-r \-s /bin/bash repos

  3c.  If needed, setup the database user.

         groupadd dbuser
         useradd \-g dbusr \-d /home/www \-m \-r \-s /bin/bash dbusr
 

4 set up apache-ssl
  4a: download Apache 2.2.4 from apache archive site at
      [http://archive.apache.org/dist/httpd/]

  4b: Unpack apache 2.2.4 (tar \-xzvf) and do "cd httpd-2.2.4"

      cd /opt
      tar \-xzvf /root/httpd-2.2.4.tar.gz
      cd httpd-2.2.4

  4c. compile apache following the instruction in the INSTALL file.
      To enable the SSL, do the following:

      ./configure \--prefix=/home/www/apache \--enable-ssl \
       \--with-ssl=/usr/local/ssl \
       \--enable-modules="most mod_rewrite"
      make
      make install

5. set up mod-jk

  5a. download mod-jk 1.2.21 source (previous versions have a security hole
      that could allow a remote attacker to execute arbitary code) from
      [http://tomcat.apache.org/connectors-doc/].

      cd /opt
      tar \-xzvf /root/tomcat-connectors-1.2.21-src.tar.gz
      cd tomcat-connectors-1.2.21-src

  5b. build and install binaries according to BUILD.txt. apxs is at
      /home/www/apache/bin/apxs. mod_jk.so will be put at /home/www/apache/modules

      cd native                              
      ./configure \--with-apxs=/home/www/apache/bin/apxs \--enable-ssl
      make
      make install

6. install jdk 1.6 which is required by tomcat 5.5.25

   6a. download jdk 1.6 binary at
    [http://java.sun.com/javase/downloads/index.jsp]

   6b. You may need to set the binary file to be executable:

       chmod u+x,u-w jdk-6-linux-i586.bin

   6c. execute the binary installer as root.  If it produces a rpm file,
       use rpm \-ivh to install it.  If you downloaded the straight binary
       installer, move to a directory with installed software, such as
       /usr/local.  Also, you will need to page through a licensing agreement
       and type yes to accept it.
 
       cd /usr/local
       /root/jdk-6-linux-i586.bin

       or

       ./jdk-6-linux-i586-rpm.bin
       rpm \-ivh jdk-6-linux-i586

   6d. create a file in /etc/profile.d named java_home.sh.  It should contain
        a line exporting a variable pointing to the Java home directory.  Then
        make this file world executable.:

       cat > /etc/profile.d/java_home.sh
       export JAVA_HOME=/usr/local/jdk1.6.0
       \^C
       chmod a+xr,a-w /etc/profile.d/java_home.sh

7. install the SASH Server   NOTE:  These instructions are written assuming version 2.0.3 of the SASH Server, but this version has been deprecated.  We are waiting on version 2.0.4 to become officially supported.

   7a. download sash-server-2.0.3-1.noarch.tar.gz from: [https://portal.sourcelabs.com/?module=download]You will need to register and login to the web site to be able to
         download the SASH Server.  Also, copy the modify-instance-file.sh and mit-worker-consolidater.sh out of the ISDA repository and onto the machine.

   7b. unzip and untar (gunzip , tar \-xvf) into your working
       directory, such as /home

       cd /home/www
       tar \-xzvf /root/sash-server-2.0.3-1.noarch.tar.gz
       ln \-s sash-server-2.0.3-1 sash-server
       cd sash-server-2.0.3-1

   7c.  Edit /etc/profile.d/sash_home.sh to export a home variable, and set it world executable.

       cat > /etc/profile.d/sash_home.sh
       export SASHSRV_HOME=/home/www.sash-server-2.0.3-1
       export LD_LIBRARY_PATH=/usr/lib:/home/www/weblib
       \^c
       chmod a-w,a+rx /etc/profile.d/sash_home.sh
       source /etc/profile.d/sash_home.sh

   7d.  Copy the modify instance file and the MIT worker consolidator file into the SASH server bin directory.

       cp /root/modify-instance-file.sh $SASHSRV_HOME/bin
       cp /root/mit-worker-consolidater.sh $SASHSRV_HOME/bin
       chmod ug+rx,a-w $SASHSRV_HOME/bin/modify-instance-file.sh $SASHSRV_HOME/bin/mit-worker-consolidater.sh

  7e.  Copy the sash-2.0-flattened-jars.zip file onto the server and update the commons-io jar file. 

       cd @SASHSRV_HOME/core/server/webapps/manager/WEB-INF/lib
       unzip /root/sash-2.0-flattened-jars.zip  commons-io-1.3.1-1.jar
 

7. Do the configuration:

  7a. SASH Server part: cd into the tomcat home directory

      cd $SASHSRV_HOME/conf/template
 
    7aa. enter the conf directory and create a jk directory

         cd conf
         mkdir jk
         cd jk

    7ab. copy the workers.properties file from
    /opt/tomcat-connectors-1.2.21-src/conf and put it in conf/jk

         cp /opt/tomcat-connectors-1.2.21-src/conf/workers.properties \
            $SASHSRV_HOME/conf/template/conf/jk

    7ac. make certain the following directives in workers.properties are set:

    workers.tomcat_home=%%CATALINA_BASE%%
    workers.java_home=/usr/local/jdk1.6.0
    ps=/
    worker.list=ajp13
    worker.ajp13.port=%%AJP_PORT%%
    worker.ajp13.host=localhost
    worker.ajp13.type=ajp13   
    worker.ajp13.lbfactor=1
    worker.loadbalancer.type=lb                  
    worker.loadbalancer.balanced_workers= ajp13  
                              
        comment out the ajp12 lines in workers.properties.
                                   
     7ad. edit conf/server.xml and add the following:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; after <Server port="%%SHUTDOWN_PORT%%" shutdown="SHUTDOWN">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; add&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <Listener className="org.apache.jk.config.ApacheConfig"
&nbsp; &nbsp; &nbsp; modJk="/home/www/apache/modules/mod_jk.so" jkDebug="info"
&nbsp;&nbsp;&nbsp; &nbsp; workersConfig="%%CATALINA_BASE%%/conf/jk/workers.properties"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; jkLog="%%CATALINA_BASE%%/logs/mod_jk.log"/>

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; after&nbsp; <Engine name="Catalina" defaultHost="localhost">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; add

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <Listener className="org.apache.jk.config.ApacheConfig" append="true" />

&nbsp;&nbsp;&nbsp;&nbsp; 7ae. If this is going to be a Web Services servers, disable direct
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; connections to the SASH Server and force communications to go through apache,
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; by commenting out the http port&nbsp; connector block in server.xml:

<\!-\-
&nbsp;&nbsp;&nbsp; <Connector port="%%HTTP_PORT%%"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; maxHttpHeaderSize="8192"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; enableLookups="false" redirectPort="8443" acceptCount="100"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; connectionTimeout="20000" disableUploadTimeout="true" />
\-->

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If this is going to be a Thalia server, skip this step.

&nbsp;&nbsp;&nbsp;&nbsp; 7af. Uncomment the AJP block in server.xml.

&nbsp;&nbsp; <\!-\- An AJP Connector - uncomment if needed \-->
&nbsp;&nbsp;&nbsp; <Connector port="%%AJP_PORT%%"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protocol="AJP/1.3" />

&nbsp;&nbsp;&nbsp;&nbsp; 7ag. edit tomcat_users.xml, and add the following user definition just
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; above the '</tomcat-users>' line:

&nbsp;&nbsp;&nbsp; <role rolename="manager"/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <user username="tomcat" password="zest2006" roles="tomcat,manager"/>

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be certain to change the password to be the password for the team
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the server is providing services to.&nbsp; A server for the Zest group
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (Web Services machines are usually for the Zest group) would be
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 'zest2006', and for the Thalia group, 'thalia2006'.

&nbsp;&nbsp;&nbsp;&nbsp; 7ah.&nbsp; Edit the sashsrv.conf file and add the base port information for JMX.&nbsp; Add it near the bottom, between the AJP base port and the max port range.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd $SASHSRV_HOME/conf
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vi sashsrv.conf

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # The base port for the JMX handlers - MIT addition
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; JMX_BASE=9000

&nbsp;&nbsp;&nbsp;&nbsp; 7ah.&nbsp; Add the JAVA_HOME location to $SASHSRV_HOME/conf/sashsrv.conf.&nbsp; Also
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; change the ACTIVE_PROBE_PLAN and LD_LIBRARY_PATH to have
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $SASH_HOME in their paths.&nbsp; The conf file is read by the startup
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; script, so putting the variables in will not work.&nbsp; They must be
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; fully qualified.&nbsp; Also add recursion to LD_LIBRARY_PATH.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LD_LIBRARY_PATH=/home/www/sash-server-2.0.4-BETA/lib:$
{LD_LIBRARY_PATH}
&nbsp;
\\

&nbsp;&nbsp;&nbsp; 7ai.&nbsp; Update the www user.&nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; chown \-R www:www /home/www

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; And edit $SASHSRV_HOME/bin/setvars,&nbsp; $SASHSRV_HOME/bin/sash-server.init, and $SASHSRV_HOME/bin/sash-server-CS2.init, and change the&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SASHSRV_USER.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SASHSRV_USER="www"

&nbsp;&nbsp;&nbsp;&nbsp; 7aj.&nbsp; To progate the changes made to the config, delete the default
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; server container, and create a new one.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd $SASHSRV_HOME/servers
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; rm \-rf default
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd $SASHSRV_HOME/bin
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ./mkInstance \-N default
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd $SASHSRV_HOME/servers/default
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $SASHSRV_HOME/bin/modify-instance-file.sh /conf/jk/workers.properties $SASHSRV_HOME&nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Also create any other server containers that may be needed.&nbsp; Some of the common ones are mitid, roles, moira, sis, and misc.

&nbsp;&nbsp;&nbsp; 7ak.&nbsp; Run modify-instance.sh (or recursive-modify-instance.sh) to setup the local variables needed on these containers.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $SASHSRV_HOME/bin/modify-instance-file.sh /conf/jk/workers.properties $SASHSRV_HOME

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  $SASHSRV_HOME/bin/recursive-modify-instance-file.sh

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Running recursive-modify-instance-file.sh with a container name will only update the conf files in that container.&nbsp; Running modify-instance-file.sh only updates the
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; conf file specified on the command line, but does it to all of the containers.

&nbsp;&nbsp;&nbsp;&nbsp; 7al.&nbsp; Run the java_home.sh script and start the SASH Server

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; source /etc/profile.d/java_home.sh
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $SASHSRV_HOME/bin/sashctl all start

&nbsp;&nbsp;&nbsp;&nbsp; 7am.&nbsp; Tomcat creates a mod_jk.conf file in ./core/conf/auto/ directory
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the first time is runs.&nbsp; Correct it to point to where mod_jk.so
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; resides.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; change
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LoadModule jk_module "/usr/local/apache/libexec/mod_jk.so"
&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LoadModule jk_module "/home/www/apache/modules/mod_jk.so"

&nbsp;&nbsp;&nbsp; 7an.&nbsp; Create the www etc directory and setup the jmxremote.password file.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mkdir /home/www/etc
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cp /usr/local/jdk1.6.0/jre/lib/management/jmxremote.password.template /home/www/etc/jmxremote.password
&nbsp;

&nbsp; 7b. apache side: edit /home/www/apache/conf/httpd.conf
&nbsp;&nbsp; edit the following directives:

&nbsp;&nbsp; ServerRoot "/home/www/apache"&nbsp;&nbsp;&nbsp;&nbsp; # change to apache home directory
&nbsp;&nbsp; User www &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # change from daemon
&nbsp;&nbsp; Group www &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # change from daemon
&nbsp;&nbsp; Include conf/extra/httpd-vhosts.conf&nbsp;&nbsp;&nbsp;&nbsp; # Uncomment
&nbsp;&nbsp; Include conf/extra/httpd-ssl.conf&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # Uncomment

&nbsp; 7c. add to /home/www/apache/conf/httpd.conf, and the bottom of the other includes:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # SASH Server/mod_jk includes
&nbsp; &nbsp; &nbsp; &nbsp; Include /home/www/sash-server-2.0.4-BETA/core/conf/auto/mod_jk.conf

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <IfModule \!mod_rewrite.c>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; LoadModule rewrite_module "/home/apache/modules/mod_rewrite.so"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </IfModule>

&nbsp; 7d. edit /home/www/apache/conf/extra/httpd-vhosts.conf to have ONLY one of the
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; following VirtualHost blocks:

&nbsp;&nbsp;&nbsp;&nbsp; 7d1. Thalia:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NameVirtualHost \*:80

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <VirtualHost \*:80>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ServerName \*.isda-thalia2.mit.edu

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteEngine On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteCond %
{HTTP_HOST}   \!^isda-thalia2\.mit\.edu \[NC\]
RewriteCond %{HTTP_HOST}
&nbsp;&nbsp; \!^test\.isda-thalia2\.mit\.edu \[NC\]
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteCond %
{HTTP_HOST}   \!^demo\.isda-thalia2\.mit\.edu \[NC\]
RewriteCond %{HTTP_HOST}
&nbsp;&nbsp; \!^hst\.isda-thalia2\.mit\.edu \[NC\]&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteCond %
{HTTP_HOST}
&nbsp;&nbsp; \!^ap\.isda-thalia2\.mit\.edu \[NC\]&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteRule \^/(.*)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; [http://isda-thalia2.mit.edu/$1] \[L,R\] &nbsp;
\\

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </VirtualHost>

&nbsp;&nbsp;&nbsp;&nbsp; 7d2. Web Services - edit for correct server name:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <VirtualHost \*:80>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteEngine On

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteRule \^/(.*)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; [https://finniganfen.mit.edu/$1] \[L,R\]

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </VirtualHost>

&nbsp;&nbsp;&nbsp; 7d3.&nbsp; To prevent some web applications (such as WarehouseServices) from being redirected to https, add an escape clause between "RewriteEngine On" and the
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteRule:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RewriteCond %
{REQUEST_URI}
&nbsp;&nbsp; \!\/WarehouseService
&nbsp;
\\

&nbsp; 7e. edit /home/www/apache/conf/extra/httpd-ssl.conf and alter the following
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; directives:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DocumentRoot "/home/sash-server-2.0.4-BETA/servers/"
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # points to directory with tomcat servers
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ServerName gybe.mit.edu:443
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # the servername of the server
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ServerAdmin dracus@mit.edu,dongq@mit.edu,dtanner@mit.edu
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # the admins of this server
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ErrorLog /home/www/apache/logs/error_log
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # error log file
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TransferLog /home/www/apache/logs/access_log
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # access log file
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLCertificateFile /usr/local/ssl/certs/gybe.mit.edu.pem
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # public server certificate
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLCertificateKeyFile /usr/local/ssl/private/https-key.pem
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # private server certificate
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLCACertificatePath /usr/local/ssl/certs
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #certificate path
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLCACertificateFile /usr/local/ssl/certs/mitCA.pem
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; # certificate authority key
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLVerifyClient require
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSLVerifyDepth&nbsp; 10

&nbsp;&nbsp; 7f. add the following after the '<Directory "/home/www/apache/cgi-bin">'
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; block in /home/www/apache/conf/extras/httpd-ssl.conf

&nbsp;&nbsp;&nbsp;&nbsp; SSLOptions \+StdEnvVars \+ExportCertData

8. to pass environment variables from apache to tomcat, add the following to
&nbsp;&nbsp; the end of httpd.conf (note, the name for those environment variables might
&nbsp;&nbsp; change between different apache versions. Apache comes with a cgi script in
&nbsp;&nbsp; cgi-bin/printenv. Run this script in your https enabled browser to verify
&nbsp;&nbsp; that these variables still holds).

&nbsp;&nbsp; &nbsp;JkEnvVar SSL_CLIENT_DN nodefault&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp; &nbsp;JkEnvVar SSL_CLIENT_S_DN_CN nodefault&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp; &nbsp;JkEnvVar SSL_CLIENT_S_DN_Email nodefault &nbsp;
&nbsp;&nbsp; &nbsp;JkEnvVar SSL_CLIENT_S_DN nodefault&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp; &nbsp;JkEnvVar HTTP_ACCEPT_LANGUAGE nodefault&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;
&nbsp;&nbsp;&nbsp; JkEnvVar SSL_CLIENT_CERT none &nbsp;

9.&nbsp; copy the following files to the noted locations.&nbsp; They should be in the ISDA software repository.

&nbsp;&nbsp;&nbsp;&nbsp; 9a. MitIdService.jar&nbsp;&nbsp; moves to $SASHSRV_HOME/core/shared/lib

&nbsp;&nbsp;&nbsp;&nbsp; cp /root/MitIdService.jar $SASHSRV_HOME/core/shared/lib

&nbsp;&nbsp;&nbsp;&nbsp; 9b. rolesApplicationContext.xml&nbsp;&nbsp; moves to $SASHSRV_HOME/core/shared/classes

&nbsp;&nbsp;&nbsp;&nbsp; cp /root/rolesApplicationContext.xml $SASHSRV_HOME/core/shared/classes/

&nbsp;&nbsp;&nbsp;&nbsp; 9c.&nbsp; rootauth&nbsp; moves to /root

10. install the web init script into /etc/init.d, and place starter links into
&nbsp;&nbsp;&nbsp; the /etc/rc.d/ runlevel directories.&nbsp; It should be bundled with this
&nbsp;&nbsp;&nbsp; document.

&nbsp; 10a.&nbsp; edit the variables in the top section of the web file to use the
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; directories and binaries correct for this system

&nbsp;&nbsp; 10b.&nbsp; be certain to check if apache is using a httpdctl or apachectl starter
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; program, usually contained in /home/www/apache/bin, and set the apachectl
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; variable accordingly

&nbsp;&nbsp;&nbsp; 10c.&nbsp; set web to be executable

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; chmod a+rx,a-w /etc/init.d/web

&nbsp;&nbsp;&nbsp;&nbsp; 10d.&nbsp; link startweb and stopweb to the web program, from wherever it is
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; located, and link start scripts in /etc/init.d:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /root/startweb
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /root/stopweb
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc1.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc2.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc3.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc4.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc5.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc6.d/K15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc2.d/S15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc3.d/S15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc4.d/S15web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/web /etc/rc.d/rc5.d/S15web

&nbsp;&nbsp;&nbsp; 10e.&nbsp; Copy the SASH Server init file into /etc/init.d

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cp $SASHSRV_HOME/bin/sash-server.init /etc/init.d/sash-server
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; chmod a+rx,a-w /etc/init.d/sash-server

&nbsp;&nbsp;&nbsp; 10f.&nbsp; Link the SASH Server init file to runlevels.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc1.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc2.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc3.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc4.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc5.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc6.d/K16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc2.d/S16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc3.d/S16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc4.d/S16web
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ln \-s /etc/init.d/sash-server /etc/rc.d/rc5.d/S16web

&nbsp;&nbsp;&nbsp; 10g.&nbsp; Edit /etc/init.d/sash-server and correct the value of SASHSRV_HOME.

11. Add line to /var/spool/cron/root to cause rootauth to run every 15 min, and
&nbsp;&nbsp;&nbsp; freshen the Kerberos tickets.

&nbsp;&nbsp;&nbsp; cat >> /var/spool/cron/root
&nbsp;&nbsp;&nbsp; 0,15,30,45 * * * * /root/rootauth
&nbsp;&nbsp;&nbsp; \^C

12. update paths in /etc/profile, by adding the following line in the path
&nbsp;&nbsp;&nbsp; manipulation code block (you can find it by searching for /usr/local/sbin)

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; pathmunge /usr/local/bin
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; pathmunge /usr/kerberos/bin

13. If this is an upgrade on a server that had previously had a tomcat on it,
&nbsp;&nbsp;&nbsp; there are additional steps to move necessay files and code to the new
&nbsp;&nbsp;&nbsp; directories.

&nbsp; 13a.&nbsp; copy the webapps from the old deploy of tomcat to the new one.&nbsp; Be certain
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to restart the server if it was running previously.

&nbsp;&nbsp;&nbsp; cd /home/www/sash-server-2.0.4-BETA/servers/$SERVER/webapps

&nbsp;&nbsp;&nbsp; cp \-a geows\* mapws\* mitidws\* uaws\* testcert\* TestRemoteAlfresco\* \
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; /home/www/sash-server-2.0.4-BETA/servers/$SERVER/webapps

&nbsp;&nbsp;&nbsp; to see the applications deployed on a server that are not part of the
&nbsp;&nbsp;&nbsp; default tomcat install, get a listing of the directory:

&nbsp;&nbsp;&nbsp; ls \-1 \--hide=balancer \--hide ROOT \--hide=jsp-examples \
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \--hide=servlets-examples \--hide=tomcat-docs \--hide=webdav

&nbsp; 13b.&nbsp; Move the /home/https/weblib directory into /home/www

&nbsp;&nbsp;&nbsp; mv /home/https/weblib/ /home/www/weblib
&nbsp;&nbsp;&nbsp; ln \-s /home/www/weblib /home/https/weblib

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Alternatively, if there is not /home/https/weblib, create a
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; /home/www/weblib directory

&nbsp;&nbsp;&nbsp; mkdir /home/www/weblib

&nbsp; 13c.&nbsp; Edit /etc/init.d/web to have the following global variable:

&nbsp;&nbsp;&nbsp; export LD_LIBRARY_PATH=/usr/lib:/home/www/weblib

&nbsp; 13d.&nbsp; Copy the libMitIdNativeClient.so into /home/www/weblib

&nbsp;&nbsp;&nbsp; cp /root/libMitIdNativeClient.so&nbsp; /home/www/weblib

&nbsp; 13e.&nbsp; Restart web services and tomcat

&nbsp;&nbsp;&nbsp; /etc/init.d/web restart

14. If this is a Web Services system, install an AFS client, or check that a client is installed.&nbsp; ThaliaSet systemsup dokerberos notdaemon need this.

&nbsp; 14a. Check if an AFS client is installed by looking at the root directory.principle and service ACLs for the system.

&nbsp;&nbsp;&nbsp; 14a.&nbsp;&nbsp;&nbsp; If a client is installed, the afs directory will be near the top.
 Send email to accounts@mit.edu and ask for a kerberos principle in the format of daemon.\[hostname\].krb5.keytab.&nbsp; When you receive it, install it in /home/www/etc/krb.

&nbsp;&nbsp;&nbsp; 14b.&nbsp; Send email to Mark Silis&nbsp; or Jim Repa and request that the kerberos principle above (daemon/\[hostname\].mit.edu@ATHENA.MIT.EDU) be added to the access control
&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; list for the databases on Illinois that the web service will be using (often mitid or roles).
&nbsp;

15. If this is a Web Services system, install an AFS client, or check that a client is installed.&nbsp; Thalia systems do not need this.

&nbsp; 15a. Check if an AFS client is installed by looking at the root directory.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If a client is installed, the afs directory will be near the top.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ls \-l /

&nbsp; 14b15b. If an AFS client is not installed, download these packages from the MIT
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Athena or Thalia software lockers:

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mit-openafs-setup-1.2-3.noarch.rpm
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mit-krb-config-1.0-3.noarch.rpm
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mit-openafs-package.patch

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unless the server is a virtual server.&nbsp; If this is the case, email server ops to have the virtualized AFS kernel module installed.
&nbsp;

&nbsp; 14c15c. Use rpm to install these packages, installing the Kerberos
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; configuration package first.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; rpm \-ivh mit-krb-config-1.0-3.noarch.rpm
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; rpm \-ivh mit-openafs-setup-1.2-3.noarch.rpm

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Please note: There are no paths in these commands.&nbsp; Store them in a
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; conveinent install directory, and cd to it first.

&nbsp; 14d15d. Go to the OpenAFS client binary directory and execute the setup
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; script.&nbsp; It will ask if you want the AFS client to be started at boot
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; time.&nbsp; Type yes.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd /opt/mit-openafs-setup/bin
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ./setup

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If system is a SMP (multiprocessor) machine, apply the SMP patch before compiling.

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd /opt/mit-openafs-setup/bin
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; patch < /root/mit-openafs-package.patch
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ./setup

1516. If this is a Web Services system, install version of moira that uses Kerberos 5.&nbsp; Thalia systems do not need this.

&nbsp; 15a16a. upload moira-rhel4-clients.tar.gz onto the server, and untar to
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; /usr/local

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cd /usr/local
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; tar \-xzvf /root/moira-rhel4-clients.tar.gz

1617. To start and stop tomcat and apache, use the initialization scripts in
&nbsp;&nbsp;&nbsp; /etc/init.d.&nbsp; Be certain to leave them running when you are finished.

&nbsp;&nbsp; starting
&nbsp;&nbsp;&nbsp;&nbsp; /etc/init.d/web start

&nbsp;&nbsp; stopping
&nbsp;&nbsp;&nbsp;&nbsp; /etc/init.d/web stop