Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | RSS feed
# phpMyAdmin - Web based MySQL browser written in php## Allows only localhost by default## But allowing phpMyAdmin to anyone other than localhost should be considered# dangerous unless properly secured by SSLAlias /phpMyAdmin /usr/share/phpMyAdminAlias /phpmyadmin /usr/share/phpMyAdmin<Directory /usr/share/phpMyAdmin/>AddDefaultCharset UTF-8<IfModule mod_authz_core.c># Apache 2.4<RequireAny>Require ip 127.0.0.1Require ip ::1</RequireAny></IfModule><IfModule !mod_authz_core.c># Apache 2.2Order Deny,AllowDeny from AllAllow from 127.0.0.1Allow from ::1Allow from 10.192.25.0/24</IfModule></Directory><Directory /usr/share/phpMyAdmin/setup/><IfModule mod_authz_core.c># Apache 2.4<RequireAny>Require ip 127.0.0.1Require ip ::1</RequireAny></IfModule><IfModule !mod_authz_core.c># Apache 2.2Order Deny,AllowDeny from AllAllow from 127.0.0.1Allow from ::1Allow from 10.192.25.0/24</IfModule></Directory># These directories do not require access over HTTP - taken from the original# phpMyAdmin upstream tarball#<Directory /usr/share/phpMyAdmin/libraries/>Order Deny,AllowDeny from AllAllow from None</Directory><Directory /usr/share/phpMyAdmin/setup/lib/>Order Deny,AllowDeny from AllAllow from None</Directory><Directory /usr/share/phpMyAdmin/setup/frames/>Order Deny,AllowDeny from AllAllow from None</Directory># This configuration prevents mod_security at phpMyAdmin directories from# filtering SQL etc. This may break your mod_security implementation.##<IfModule mod_security.c># <Directory /usr/share/phpMyAdmin/># SecRuleInheritance Off# </Directory>#</IfModule>