OwnCloud – more settings
In a anterior document we saw how to ride our corporate Dropbox, in this second document we OwnCloud see additional settings that should make for more features such as mailing links, putting corporate logos, Filter for groups AD, Castilian language default, HTTPS configuration, WebDAV connection and two interesting plugins to logear everything that users!
Configuring Mail,
We'll start with the basics, the mailing system can function so users can send emails when sharing files.
The first, We must enter a valid address as the source of emails from OwnCloud, editaremos ‘/var/www/owncloud/lib/public/util.php’ cambiaando '$ defaultEmailAddress =' noresponder@dorminio.esO'.
We configure the settings for sending mail '/var/www/owncloud/config/config.php', which indicate the host relay by which we get the mail and authentication type, Zimbra example against having the OwnCloud IP whitelist, We could also yet to authenticate:
'mail_smtpmode' => 'smtp', 'mail_smtphost' => '192.168.0.201', 'mail_smtpport' => 25, # 'mail_smtpsecure' => 'tls', 'mail_smtpauth' => false, # 'mail_smtpauthtype' => "LOGIN", 'mail_smtpname' => '', 'mail_smtppassword' => '',
If we want to see how to create a relay connector in Exchange, we can continue this guide.
Changing the language,
Once configured the mail, OwnCloud we can tell that all accounts are entering a default language, para ello editamos ‘/var/www/owncloud/lib/l10n.php’ and indicated in "$ language = 'is’ ;’ language.
Changing logos,
As for changing the logos, We can start with the main logo, default having a size of 166x123px. Change file 'owncloud-logo-medium-white.(png|svg)’ by which interests us we have uploaded this MV SCP in the files' /var/www/owncloud/apps/user_openid/templates/nomode.php’ y ‘/var/www/owncloud/core/templates/layout.guest.php’
And finally change the small logo in the portal OwnCloud in '/var/www/owncloud/core/templates/layout.user.php’ called 'core / img / logo-wide.(png|svg)’ default having 230x32px.
Enabling secure connections,
To enable HTTPS connections, we must first enable SSL on Apache running: ‘sudo a2enmod ssl’.
Then we generate a certificate request, send it to a Certificate Authority to finally finish installing the certificate Apache and secure requests to attend OwnCloud.
We generate the CSR (Certificate Signing Request) with: ‘openssl req -nodes -newkey rsa:2048 -keyout owncloud.tundra-it.com.key -out owncloud.tundra-it.com.csr’. We will conduct a series of questions that we will complete as is routinely generating certificates, these following examples are made with the domain 'owncloud.tundra-it.com’ and obviously everyone can use the name you want for certificates.
.csr we send the file to the CA or CA entity of our trust (commercial or our own DA) and obtain the certificate rename it to 'owncloud.tundra-it.com.crt’ and the main or intermediate entity certificates: CA.crt.
.csr we send the file to the CA or CA entity of our trust (commercial or our own DA) and obtain the certificate rename it to 'owncloud.tundra-it.com.crt’ and the main or intermediate entity certificates: CA.crt.
We will create the file to enable the setting of the new site with SSL: ‘/etc/apache2/conf.d/owncloud5-ssl.conf’
<VirtualHost *:443>
ServerName IP/NOMBRE_SERVIDOR
SSLEngine on
SSLCertificateFile /etc/apache2/ssl/owncloud.tundra-it.com.crt
#/etc/ssl/crt/apache-cert.pem
SSLCertificateKeyFile /etc/apache2/ssl/owncloud.tundra-it.com.key
#/etc/ssl/key/apache-key.pem
SSLCertificateChainFile /etc/apache2/ssl/CA.crt
DocumentRoot /var/www/owncloud
CustomLog /var/www/logs/ssl-access_log combined
ErrorLog /var/www/logs/ssl-error_log
</VirtualHost>
And restart Apache! and we can access by secure connection to files, Also in the administration menu we can force the connections are all https, or encrypt the contents of files.
If you want to filter users who want access, we can do it by a group of users of our Active Directory, configure the following filters:
– In 'Filter user logon’ place: ‘(&(memberof = cn = Users with access,Users or =,ou=Tundra IT,dc=tundra-it,dc=local)(sAMAccountName=%uid))’
– In 'Filter List User’ place: ‘(&(memberof = cn = Users with access,Users or =,ou=Tundra IT,dc=tundra-it,dc=local)(objectClass=person))’.
– In 'Filter List User’ place: ‘(&(memberof = cn = Users with access,Users or =,ou=Tundra IT,dc=tundra-it,dc=local)(objectClass=person))’.
Tracking users,
If we analyze what our users store files or which files they share with whom, we can use two ownCloud Apps that integrate in our facility, It would be 'SuperLog’ y ‘Share Watcher’.
First, SuperLog, It will allow us to know the files stored by users on our system OwnCloud, we can download, uncompress it in / var / www / owncloud / apps /
So you can download with wget, in this case we rename the Owncloud-Superlog-master / a superlog / directory and correct permissions to 'chown www-data:www-data superlog/ -R’.
Enter the portal as an administrator and the menu 'Applications’ activate the app.
We can see how we have a new section called 'SuperLog Activity’ in the menu 'Administration', where it will be registered everything that happens on our site OwnCloud, We see the files that users create, modify or delete.
If we also see the files you share and with whom, we will settle the App Share Watcher, also we can download with wget or copiarnosla with WinSCP or similar to / var / www / owncloud / apps /
Correct permissions to 'chown www-data:www-data files_share_watcher/ -R’.
Activate it once decompressed.
And we can see in these records also History!
WebDAV connection,
This would be another way to access content remotely, instead of keeping information synchronized we can attack it easily by WebDAV. To do so would be as easy as connecting a network drive in Windows or mount on a Mac / Linux.
And that would have access to all content equally. I encourage you to give yourselves a walk in the portal of Apps to see which most fits you!
Tidak ada komentar:
Posting Komentar