Red Hat Linux 7.1: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 13. Using Apache as a Secure Web Server | Next |
If you are installing Red Hat Linux and the secure Web server at the same time, follow the instructions provided in the installation manual appropriate for your architecture. If you are planning to use your Red Hat Linux system as a secure server, you will probably choose to perform a server- or custom-class installation. The various installation classes to choose from are as follows:
If you choose a server-class installation, the apache, mod_ssl and openssl packages will be selected automatically. The stunnel and openssh packages, which provide security-related functionalities, will also be selected.
If you choose a workstation-class installation (or a laptop-class installation, if available for your system), the secure server packages and the security-related packages will not be automatically selected for installation, but you can choose to install them during the package selection customization process.
If you choose a custom-class installation, since you have complete control over what packages are installed, you will need to select the secure server packages and any security-related packages you want.
Once you have chosen an installation class, continue following the installation instructions to partition and configure your system. When you reach the section on selecting package groups, or components, select the Web Server package group. Web Server includes the apache and mod_ssl packages that you must install to run the secure server. Since openssl is a dependency for the mod_ssl package, openssl will also be chosen for installation.
If you would like to install any of the additional security-related packages described in the section called An Overview of Security-Related Packages, you will need to identify their packages to the installation program. To do this, choose Select individual packages on the same Package Group Selection screen.
Select the security-related packages that you want to install according to the instructions provided in your installation manual. To help you find them, a table of their locations is provided as Table 13-1.
After making sure that the packages you need are selected, continue with the installation process. When you have finished installing Red Hat Linux and the secure server, see the section called An Overview of Certificates and Security.