Thanks, this helps. I assume you put the statements in a .htaccess
file? I don't remember what security features PHPMyAdmin offers. I
only looked at it briefly and found it confusing, but I guess if it's
that or nothing, I'll learn it. It would be nice to just have the same
basic functionality in a curses interface that would run on the local
server and avoid the issue but I guess there is no such thing. I should
add that the MySQL Monitor has readline support and works fine from a
shell but requires knowledge of the SQL syntax. The reference manual is
huge as I found out when I was looking at it.
John G. Heim wrote:
Yeah, you probably don't want your phpMyAdmin installation accessible
from just anywhere. Making it accessible only from localhost was just
an idea I had predicated on the assumption that you weren't already
running a web server.
Volumes can and have been written on securing apache. I haven't putzed
with phpMyAdmin for a while and I don't recall what security features
it offers. But some of the things you could do via apache are:
1. Make the phpMyAdmin site accessible only to certain IP addresses
2. Require a user ID and password to connect
Point #1 above would include making it accessible only from the
localhost. Or you could tell apache to allow access only from the
localhost and some static IP address like that of your workstation.
Here is how I restrict access to server status reports on an apache
server to computers at the University of Wisconsin Math Department and
to my machine at home:
<Location /server-status>
Order deny,allow
Deny from all
Allow from .math.wisc.edu lambeau.johnheim.com
</Location>#
_______________________________________________
Blinux-list mailing list
Blinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/blinux-list