summaryrefslogtreecommitdiffstats
path: root/docs/html/configuration.html
diff options
context:
space:
mode:
Diffstat (limited to 'docs/html/configuration.html')
-rw-r--r--docs/html/configuration.html1245
1 files changed, 0 insertions, 1245 deletions
diff --git a/docs/html/configuration.html b/docs/html/configuration.html
deleted file mode 100644
index 295a76540..000000000
--- a/docs/html/configuration.html
+++ /dev/null
@@ -1,1245 +0,0 @@
-<HTML
-><HEAD
-><TITLE
->Configuration</TITLE
-><META
-NAME="GENERATOR"
-CONTENT="Modular DocBook HTML Stylesheet Version 1.76b+
-"><LINK
-REL="HOME"
-TITLE="The Bugzilla Guide - 2.17.7
- Development Release"
-HREF="index.html"><LINK
-REL="UP"
-TITLE="Installing Bugzilla"
-HREF="installing-bugzilla.html"><LINK
-REL="PREVIOUS"
-TITLE="Installation"
-HREF="installation.html"><LINK
-REL="NEXT"
-TITLE="Optional Additional Configuration"
-HREF="extraconfig.html"></HEAD
-><BODY
-CLASS="section"
-BGCOLOR="#FFFFFF"
-TEXT="#000000"
-LINK="#0000FF"
-VLINK="#840084"
-ALINK="#0000FF"
-><DIV
-CLASS="NAVHEADER"
-><TABLE
-SUMMARY="Header navigation table"
-WIDTH="100%"
-BORDER="0"
-CELLPADDING="0"
-CELLSPACING="0"
-><TR
-><TH
-COLSPAN="3"
-ALIGN="center"
->The Bugzilla Guide - 2.17.7
- Development Release</TH
-></TR
-><TR
-><TD
-WIDTH="10%"
-ALIGN="left"
-VALIGN="bottom"
-><A
-HREF="installation.html"
-ACCESSKEY="P"
->Prev</A
-></TD
-><TD
-WIDTH="80%"
-ALIGN="center"
-VALIGN="bottom"
->Chapter 2. Installing Bugzilla</TD
-><TD
-WIDTH="10%"
-ALIGN="right"
-VALIGN="bottom"
-><A
-HREF="extraconfig.html"
-ACCESSKEY="N"
->Next</A
-></TD
-></TR
-></TABLE
-><HR
-ALIGN="LEFT"
-WIDTH="100%"></DIV
-><DIV
-CLASS="section"
-><H1
-CLASS="section"
-><A
-NAME="configuration"
-></A
->2.2. Configuration</H1
-><DIV
-CLASS="warning"
-><P
-></P
-><TABLE
-CLASS="warning"
-WIDTH="100%"
-BORDER="0"
-><TR
-><TD
-WIDTH="25"
-ALIGN="CENTER"
-VALIGN="TOP"
-><IMG
-SRC="../images/warning.gif"
-HSPACE="5"
-ALT="Warning"></TD
-><TD
-ALIGN="LEFT"
-VALIGN="TOP"
-><P
->Poorly-configured MySQL and Bugzilla installations have
- given attackers full access to systems in the past. Please take the
- security parts of these guidelines seriously, even for Bugzilla
- machines hidden away behind your firewall.</P
-></TD
-></TR
-></TABLE
-></DIV
-><DIV
-CLASS="section"
-><H2
-CLASS="section"
-><A
-NAME="localconfig"
-></A
->2.2.1. localconfig</H2
-><P
->&#13; Once you run <TT
-CLASS="filename"
->checksetup.pl</TT
-> with all the correct
- modules installed, it displays a message about, and write out a
- file called,
- <TT
-CLASS="filename"
->localconfig</TT
->. This file contains the default
- settings for a number of Bugzilla parameters.
- </P
-><P
->Load this file in your editor. The only value you
- <EM
->need</EM
-> to change is $db_pass, the password for
- the user you will create for your database.
- Pick a strong password (for simplicity, it should not contain
- single quote characters) and put it here.
- </P
-><P
->&#13; The other options in the <TT
-CLASS="filename"
->localconfig</TT
-> file
- are documented by their accompanying comments. If you have a slightly
- non-standard MySQL setup, you may wish to change one or more of
- the other "$db_*" parameters.
- </P
-><P
->&#13; You may also wish to change the names of
- the priorities, severities, operating systems and platforms for your
- installation. However, you can always change these after installation
- has finished; if you then re-run
- <TT
-CLASS="filename"
->checksetup.pl</TT
->, the changes will get picked up.
- </P
-></DIV
-><DIV
-CLASS="section"
-><H2
-CLASS="section"
-><A
-NAME="mysql"
-></A
->2.2.2. MySQL</H2
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="security-mysql"
-></A
->2.2.2.1. Security</H3
-><P
->MySQL ships as insecure by default.
- It allows anybody to on the local machine full administrative
- capabilities without requiring a password; the special
- MySQL root account (note: this is <EM
->not</EM
-> the same as
- the system root) also has no password.
- Also, many installations default to running
- <SPAN
-CLASS="application"
->mysqld</SPAN
-> as the system root.
- </P
-><P
-></P
-><OL
-TYPE="1"
-><LI
-><P
->To disable the anonymous user account
- and set a password for the root user, execute the following. The
- root user password should be different to the bugs user password
- you set in
- <TT
-CLASS="filename"
->localconfig</TT
-> in the previous section,
- and also different to
- the password for the system root account on your machine.
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="screen"
-> <TT
-CLASS="prompt"
->bash$</TT
-> mysql mysql
- <TT
-CLASS="prompt"
->mysql&#62;</TT
-> DELETE FROM user WHERE user = '';
- <TT
-CLASS="prompt"
->mysql&#62;</TT
-> UPDATE user SET password = password('<TT
-CLASS="replaceable"
-><I
->new_password</I
-></TT
->') WHERE user = 'root';
- <TT
-CLASS="prompt"
->mysql&#62;</TT
-> FLUSH PRIVILEGES;</PRE
-></FONT
-></TD
-></TR
-></TABLE
-><P
->From this point forward, to run the
- <TT
-CLASS="filename"
->mysql</TT
-> command-line client,
- you will need to type
- <B
-CLASS="command"
->mysql -u root -p</B
-> and enter
- <TT
-CLASS="replaceable"
-><I
->new_password</I
-></TT
-> when prompted.
- </P
-></LI
-><LI
-><P
->If you run MySQL on the same machine as your web server, you
- should disable remote access to MySQL by adding
- the following to your <TT
-CLASS="filename"
->/etc/my.conf</TT
->:
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="programlisting"
-> [myslqd]
- # Prevent network access to MySQL.
- skip-networking</PRE
-></FONT
-></TD
-></TR
-></TABLE
-></LI
-><LI
-><P
->Consult the documentation that came with your system for
- information on making <SPAN
-CLASS="application"
->mysqld</SPAN
-> run as an
- unprivileged user.
- </P
-></LI
-><LI
-><P
->For added security, you could also run MySQL, or even all
- of Bugzilla
- in a chroot jail; however, instructions for doing that are beyond
- the scope of this document.
- </P
-></LI
-></OL
-></DIV
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="install-setupdatabase"
-></A
->2.2.2.2. Allow large attachments</H3
-><P
->You need to configure MySQL to accept large packets, if you
- want to have attachments larger than 64K. Add the text
- below to your
- <TT
-CLASS="filename"
->/etc/my.conf</TT
->.
- There is also a parameter in Bugzilla
- for setting the maximum allowable attachment size, (default 1MB).
- Bugzilla will only accept attachments up to the lower of these two
- sizes.
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="screen"
-> [mysqld]
- # Allow packets up to 1M
- set-variable = max_allowed_packet=1M</PRE
-></FONT
-></TD
-></TR
-></TABLE
-></DIV
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="install-setupdatabase-adduser"
-></A
->2.2.2.3. Add a user to MySQL</H3
-><P
->You need to add a new MySQL user for
- Bugzilla to use. (It's not safe to have Bugzilla use the MySQL root
- account.) The following instructions assume the defaults in
- <TT
-CLASS="filename"
->localconfig</TT
->;
- if you changed those, you need to modify the
- SQL command appropriately. You will need the
- <TT
-CLASS="replaceable"
-><I
->$db_pass</I
-></TT
-> password you set in
- <TT
-CLASS="filename"
->localconfig</TT
-> in
- <A
-HREF="configuration.html#localconfig"
->Section 2.2.1</A
->.
- </P
-><P
->We use an SQL <B
-CLASS="command"
->GRANT</B
-> command to create a
- <SPAN
-CLASS="QUOTE"
->"bugs"</SPAN
->
- user. This also restricts the
- <SPAN
-CLASS="QUOTE"
->"bugs"</SPAN
->
- user to operations within a database called
- <SPAN
-CLASS="QUOTE"
->"bugs"</SPAN
->, and only allows the account to connect from
- <SPAN
-CLASS="QUOTE"
->"localhost"</SPAN
->.
- Modify it to reflect your setup if you will be connecting from
- another machine or as a different user.</P
-><P
->Run the <TT
-CLASS="filename"
->mysql</TT
-> command-line client and
- enter:</P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="screen"
-> <TT
-CLASS="prompt"
->mysql&#62;</TT
-> GRANT SELECT,INSERT,UPDATE,DELETE,INDEX,ALTER,CREATE,
- DROP,REFERENCES ON bugs.* TO bugs@localhost
- IDENTIFIED BY '<TT
-CLASS="replaceable"
-><I
->$db_pass</I
-></TT
->';
- <TT
-CLASS="prompt"
->mysql&#62;</TT
-> FLUSH PRIVILEGES</PRE
-></FONT
-></TD
-></TR
-></TABLE
-><DIV
-CLASS="note"
-><P
-></P
-><TABLE
-CLASS="note"
-WIDTH="100%"
-BORDER="0"
-><TR
-><TD
-WIDTH="25"
-ALIGN="CENTER"
-VALIGN="TOP"
-><IMG
-SRC="../images/note.gif"
-HSPACE="5"
-ALT="Note"></TD
-><TD
-ALIGN="LEFT"
-VALIGN="TOP"
-><P
->If you are using MySQL 4, you need to add
- the <TT
-CLASS="computeroutput"
->LOCK TABLES</TT
-> and
- <TT
-CLASS="computeroutput"
->CREATE TEMPORARY TABLES</TT
-> permissions
- to the list.
- </P
-></TD
-></TR
-></TABLE
-></DIV
-></DIV
-></DIV
-><DIV
-CLASS="section"
-><H2
-CLASS="section"
-><A
-NAME="AEN400"
-></A
->2.2.3. checksetup.pl</H2
-><P
->&#13; Next, rerun <TT
-CLASS="filename"
->checksetup.pl</TT
->. It reconfirms
- that all the modules are present, and notices the altered
- localconfig file, which it assumes you have edited to your
- satisfaction. It compiles the UI templates,
- connects to the database using the 'bugs'
- user you created and the password you defined, and creates the
- 'bugs' database and the tables therein.
- </P
-><P
->&#13; After that, it asks for details of an administrator account. Bugzilla
- can have multiple administrators - you can create more later - but
- it needs one to start off with.
- Enter the email address of an administrator, his or her full name,
- and a suitable Bugzilla password.
- </P
-><P
->&#13; <TT
-CLASS="filename"
->checksetup.pl</TT
-> will then finish. You may rerun
- <TT
-CLASS="filename"
->checksetup.pl</TT
-> at any time if you wish.
- </P
-></DIV
-><DIV
-CLASS="section"
-><H2
-CLASS="section"
-><A
-NAME="http"
-></A
->2.2.4. Web server</H2
-><P
->Configure your web server according to the instructions in the
- appropriate section. The Bugzilla Team recommends Apache.
- </P
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="http-apache"
-></A
->2.2.4.1. Apache <SPAN
-CLASS="productname"
->httpd</SPAN
-></H3
-><P
->Load <TT
-CLASS="filename"
->httpd.conf</TT
-> in your editor.</P
-><P
->Uncomment (or add) the following line.
- This configures Apache to run .cgi files outside the
- <TT
-CLASS="filename"
->cgi-bin</TT
-> directory.
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="programlisting"
-> AddHandler cgi-script .cgi</PRE
-></FONT
-></TD
-></TR
-></TABLE
-><P
->Apache uses <TT
-CLASS="computeroutput"
->&#60;Directory&#62;</TT
->
- directives to permit fine-grained permission setting.
- Add the following two lines to a
- <TT
-CLASS="computeroutput"
->&#60;Directory&#62;</TT
-> directive that
- applies either to the Bugzilla directory or one of its parents
- (e.g. the <TT
-CLASS="computeroutput"
->&#60;Directory /var/www/html&#62;</TT
->
- directive).
- This allows Bugzilla's <TT
-CLASS="filename"
->.htaccess</TT
-> files to
- override global permissions, and allows .cgi files to run in the
- Bugzilla directory.
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="programlisting"
-> Options +ExecCGI +FollowSymLinks
- AllowOverride Limit</PRE
-></FONT
-></TD
-></TR
-></TABLE
-><P
->Add <TT
-CLASS="filename"
->index.cgi</TT
-> to the end
- of the <TT
-CLASS="computeroutput"
->DirectoryIndex</TT
->
- line.</P
-><P
-><TT
-CLASS="filename"
->checksetup.pl</TT
-> can set tighter permissions
- on Bugzilla's files and directories if it knows what user the
- webserver runs as. Look for the <TT
-CLASS="computeroutput"
->User</TT
->
- line in <TT
-CLASS="filename"
->httpd.conf</TT
->, and place that value in
- the <TT
-CLASS="replaceable"
-><I
->$webservergroup</I
-></TT
-> variable in
- <TT
-CLASS="filename"
->localconfig</TT
->. Then rerun
- <TT
-CLASS="filename"
->checksetup.pl</TT
->.
- </P
-></DIV
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="http-iis"
-></A
->2.2.4.2. Microsoft <SPAN
-CLASS="productname"
->Internet Information Services</SPAN
-></H3
-><P
->If you need, or for some reason even want, to use Microsoft's
- <SPAN
-CLASS="productname"
->Internet Information Services</SPAN
-> or
- <SPAN
-CLASS="productname"
->Personal Web Server</SPAN
-> you should be able
- to. You will need to configure them to know how to run CGI scripts.
- This is described in Microsoft Knowledge Base article
- <A
-HREF="http://support.microsoft.com/support/kb/articles/Q245/2/25.asp"
-TARGET="_top"
->Q245225</A
->
- for <SPAN
-CLASS="productname"
->Internet Information Services</SPAN
-> and
- <A
-HREF="http://support.microsoft.com/support/kb/articles/Q231/9/98.asp"
-TARGET="_top"
->Q231998</A
->
- for <SPAN
-CLASS="productname"
->Personal Web Server</SPAN
->.
- </P
-><P
->Also, and this can't be stressed enough, make sure that files such as
- <TT
-CLASS="filename"
->localconfig</TT
-> and your <TT
-CLASS="filename"
->data</TT
->
- directory are secured as described in <A
-HREF="configuration.html#security-access"
->Section 2.2.4.4</A
->.
- </P
-></DIV
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="http-aol"
-></A
->2.2.4.3. AOL Server</H3
-><P
->Ben FrantzDale reported success using AOL Server with Bugzilla. He
- reported his experience and what appears below is based on that.
- </P
-><P
->AOL Server will have to be configured to run
- <A
-HREF="glossary.html#gloss-cgi"
-><I
-CLASS="glossterm"
->CGI</I
-></A
-> scripts, please consult
- the documentation that came with your server for more information on
- how to do this.
- </P
-><P
->Because AOL Server doesn't support <TT
-CLASS="filename"
->.htaccess</TT
->
- files, you'll have to create a <A
-HREF="glossary.html#gloss-tcl"
-><I
-CLASS="glossterm"
->TCL</I
-></A
->
- script. You should create an <TT
-CLASS="filename"
->aolserver/modules/tcl/filter.tcl</TT
->
- file (the filename shouldn't matter) with the following contents (change
- <TT
-CLASS="computeroutput"
->/bugzilla/</TT
-> to the web-based path to
- your Bugzilla installation):
- </P
-><TABLE
-BORDER="0"
-BGCOLOR="#E0E0E0"
-WIDTH="100%"
-><TR
-><TD
-><FONT
-COLOR="#000000"
-><PRE
-CLASS="programlisting"
->&#13; ns_register_filter preauth GET /bugzilla/localconfig filter_deny
- ns_register_filter preauth GET /bugzilla/localconfig~ filter_deny
- ns_register_filter preauth GET /bugzilla/\#localconfig\# filter_deny
- ns_register_filter preauth GET /bugzilla/*.pl filter_deny
- ns_register_filter preauth GET /bugzilla/syncshadowdb filter_deny
- ns_register_filter preauth GET /bugzilla/runtests.sh filter_deny
- ns_register_filter preauth GET /bugzilla/data/* filter_deny
- ns_register_filter preauth GET /bugzilla/template/* filter_deny
-
- proc filter_deny { why } {
- ns_log Notice "filter_deny"
- return "filter_return"
- }
- </PRE
-></FONT
-></TD
-></TR
-></TABLE
-><DIV
-CLASS="warning"
-><P
-></P
-><TABLE
-CLASS="warning"
-WIDTH="100%"
-BORDER="0"
-><TR
-><TD
-WIDTH="25"
-ALIGN="CENTER"
-VALIGN="TOP"
-><IMG
-SRC="../images/warning.gif"
-HSPACE="5"
-ALT="Warning"></TD
-><TD
-ALIGN="LEFT"
-VALIGN="TOP"
-><P
->This probably doesn't account for all possible editor backup
- files so you may wish to add some additional variations of
- <TT
-CLASS="filename"
->localconfig</TT
->. For more information, see
- <A
-HREF="http://bugzilla.mozilla.org/show_bug.cgi?id=186383"
-TARGET="_top"
->&#13; bug 186383</A
-> or <A
-HREF="http://online.securityfocus.com/bid/6501"
-TARGET="_top"
->Bugtraq ID 6501</A
->.
- </P
-></TD
-></TR
-></TABLE
-></DIV
-><DIV
-CLASS="note"
-><P
-></P
-><TABLE
-CLASS="note"
-WIDTH="100%"
-BORDER="0"
-><TR
-><TD
-WIDTH="25"
-ALIGN="CENTER"
-VALIGN="TOP"
-><IMG
-SRC="../images/note.gif"
-HSPACE="5"
-ALT="Note"></TD
-><TD
-ALIGN="LEFT"
-VALIGN="TOP"
-><P
->If you are using webdot from research.att.com (the default
- configuration for the <TT
-CLASS="option"
->webdotbase</TT
-> paramater), you
- will need to allow access to <TT
-CLASS="filename"
->data/webdot/*.dot</TT
->
- for the reasearch.att.com machine.
- </P
-><P
->If you are using a local installation of <A
-HREF="http://www.graphviz.org"
-TARGET="_top"
->GraphViz</A
->, you will need to allow
- everybody to access <TT
-CLASS="filename"
->*.png</TT
->,
- <TT
-CLASS="filename"
->*.gif</TT
->, <TT
-CLASS="filename"
->*.jpg</TT
->, and
- <TT
-CLASS="filename"
->*.map</TT
-> in the
- <TT
-CLASS="filename"
->data/webdot</TT
-> directory.
- </P
-></TD
-></TR
-></TABLE
-></DIV
-></DIV
-><DIV
-CLASS="section"
-><H3
-CLASS="section"
-><A
-NAME="security-access"
-></A
->2.2.4.4. Web Server Access Controls</H3
-><P
->Users of Apache can skip this section because
- Bugzilla ships with <TT
-CLASS="filename"
->.htaccess</TT
-> files which
- restrict access in the manner required.
- Users of other webservers, read on.
- </P
-><P
->There are several files in the Bugzilla directory
- that should not be accessible from the web. You need to configure
- your webserver so they they aren't. Not doing this may reveal
- sensitive information such as database passwords.
- </P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->In the main Bugzilla directory, you should:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block:
- <TT
-CLASS="filename"
->*.pl</TT
->, <TT
-CLASS="filename"
->*localconfig*</TT
->, <TT
-CLASS="filename"
->runtests.sh</TT
->
- </P
-></LI
-><LI
-><P
->But allow:
- <TT
-CLASS="filename"
->localconfig.js</TT
->, <TT
-CLASS="filename"
->localconfig.rdf</TT
->
- </P
-></LI
-></UL
-></LI
-><LI
-><P
->In <TT
-CLASS="filename"
->data</TT
->:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-><LI
-><P
->But allow:
- <TT
-CLASS="filename"
->duplicates.rdf</TT
->
- </P
-></LI
-></UL
-></LI
-><LI
-><P
->In <TT
-CLASS="filename"
->data/webdot</TT
->:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->If you use a remote webdot server:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-><LI
-><P
->But allow
- <TT
-CLASS="filename"
->*.dot</TT
->
- only for the remote webdot server</P
-></LI
-></UL
-></LI
-><LI
-><P
->Otherwise, if you use a local GraphViz:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-><LI
-><P
->But allow:
- <TT
-CLASS="filename"
->*.png</TT
->, <TT
-CLASS="filename"
->*.gif</TT
->, <TT
-CLASS="filename"
->*.jpg</TT
->, <TT
-CLASS="filename"
->*.map</TT
->
- </P
-></LI
-></UL
-></LI
-><LI
-><P
->And if you don't use any dot:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-></UL
-></LI
-></UL
-></LI
-><LI
-><P
->In <TT
-CLASS="filename"
->Bugzilla</TT
->:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-></UL
-></LI
-><LI
-><P
->In <TT
-CLASS="filename"
->template</TT
->:</P
-><P
-></P
-><UL
-COMPACT="COMPACT"
-><LI
-><P
->Block everything</P
-></LI
-></UL
-></LI
-></UL
-><P
->You should test to make sure that the files mentioned above are
- not accessible from the Internet, especially your
- <TT
-CLASS="filename"
->localconfig</TT
-> file which contains your database
- password. To test, simply point your web browser at the file; for
- example, to test mozilla.org's installation, we'd try to access
- <A
-HREF="http://bugzilla.mozilla.org/localconfig"
-TARGET="_top"
->http://bugzilla.mozilla.org/localconfig</A
->. You should
- get a <SPAN
-CLASS="errorcode"
->403</SPAN
-> <SPAN
-CLASS="errorname"
->Forbidden</SPAN
->
- error.
- </P
-></DIV
-></DIV
-><DIV
-CLASS="section"
-><H2
-CLASS="section"
-><A
-NAME="install-config-bugzilla"
-></A
->2.2.5. Bugzilla</H2
-><P
->&#13; Your Bugzilla should now be working. Access
- <TT
-CLASS="filename"
->http://&#60;your-bugzilla-server&#62;/</TT
-> -
- you should see the Bugzilla
- front page. If not, consult the Troubleshooting section,
- <A
-HREF="troubleshooting.html"
->Section 2.5</A
->.
- </P
-><P
->&#13; Log in with the administrator account you defined in the last
- <TT
-CLASS="filename"
->checksetup.pl</TT
-> run. You should go through
- the parameters on the Edit Parameters page
- (see link in the footer) and see if there are any you wish to
- change.
- They key parameters are documented in <A
-HREF="parameters.html"
->Section 3.1</A
->;
- you should certainly alter
- <B
-CLASS="command"
->maintainer</B
-> and <B
-CLASS="command"
->urlbase</B
->;
- you may also want to alter
- <B
-CLASS="command"
->cookiepath</B
-> or <B
-CLASS="command"
->requirelogin</B
->.
- </P
-><P
->&#13; This would also be a good time to revisit the
- <TT
-CLASS="filename"
->localconfig</TT
-> file and make sure that the
- names of the priorities, severities, platforms and operating systems
- are those you wish to use when you start creating bugs. Remember
- to rerun <TT
-CLASS="filename"
->checksetup.pl</TT
-> if you change it.
- </P
-><P
->&#13; Bugzilla has several optional features which require extra
- configuration. You can read about those in
- <A
-HREF="extraconfig.html"
->Section 2.3</A
->.
- </P
-></DIV
-></DIV
-><DIV
-CLASS="NAVFOOTER"
-><HR
-ALIGN="LEFT"
-WIDTH="100%"><TABLE
-SUMMARY="Footer navigation table"
-WIDTH="100%"
-BORDER="0"
-CELLPADDING="0"
-CELLSPACING="0"
-><TR
-><TD
-WIDTH="33%"
-ALIGN="left"
-VALIGN="top"
-><A
-HREF="installation.html"
-ACCESSKEY="P"
->Prev</A
-></TD
-><TD
-WIDTH="34%"
-ALIGN="center"
-VALIGN="top"
-><A
-HREF="index.html"
-ACCESSKEY="H"
->Home</A
-></TD
-><TD
-WIDTH="33%"
-ALIGN="right"
-VALIGN="top"
-><A
-HREF="extraconfig.html"
-ACCESSKEY="N"
->Next</A
-></TD
-></TR
-><TR
-><TD
-WIDTH="33%"
-ALIGN="left"
-VALIGN="top"
->Installation</TD
-><TD
-WIDTH="34%"
-ALIGN="center"
-VALIGN="top"
-><A
-HREF="installing-bugzilla.html"
-ACCESSKEY="U"
->Up</A
-></TD
-><TD
-WIDTH="33%"
-ALIGN="right"
-VALIGN="top"
->Optional Additional Configuration</TD
-></TR
-></TABLE
-></DIV
-></BODY
-></HTML
-> \ No newline at end of file