Assumptions:
/usr/bin/ksh93
"./usr/sbin/htpasswd2
". Recommendations:
The kshAuth Directory Based Authorization System is distributed as a gzipped tarball and normally has a name such as:
kshAuth-X.XX.tar.gz
Where X.XX represents the version number.
To extract the utilities contained in the gzipped tarball - perform these tasks in the following order:
cd /usr/local/apache2
gzip -cd /tmp/kshAuth-X.XX.tar.gz | tar -xvf -
OR
cd /tmp
gunzip /tmp/kshAuth-X.XX.tar.gz
cd /usr/local/apache2
tar -xvf /tmp/kshAuth-X.XX.tar
egrep 'User|Group' /usr/local/apache2/conf/*.conf
For example purposes, the user "daemon" and the group "daemon" will be used in the following steps. Substitute this example user and group with your actual user and group name.
cd /usr/local/apache2
chown -R daemon:daemon ./kshAuth
chown -R daemon:daemon ./cgi-bin/kshAuth
chown -R daemon:daemon ./htdocs/kshAuth
chmod -R 775 ./kshAuth
chmod -R 555 ./cgi-bin/kshAuth
chmod -R 775 ./htdocs/kshAuth
The "./kshAuth" and "./htdocs/kshAuth" directories require "write" permission so the utilities can create/modify/delete password protection information.
AllowOverride All
/usr/local/apache2/htdocs/kshAuth
http://localhost/cgi-bin/kshAuth/utilities.cgi
Where "localhost" can be replaced by the name of your Apache web server.
If the directory administrator password does not work, you may need to regenerate the directory administrator password files. To do this, change directories into the top level kshAuth authorization directory and run the following commands:
cd /usr/local/apache2/kshAuth
/usr/sbin/htpasswd2 -c -b -s .diradmin admin password
/usr/sbin/htpasswd2 -c -b -s .AID_admin admin password