Skip to main content

how to set up webDAV on Mac OS X

The following is how to set up webDAV on Mac OS X

1. Start Apache Server ( Go to System Preferences > Sharing, and turn on the box labeled Web Sharing.)

2. Enable WebDAV support in Apache. Edit the file /etc/apache2/httpd.conf, (remember to use sudo to edit it) and locate this line:

LoadModule dav_module libexec/apache2/mod_dav.so
Make sure it is not commented. Then locate this line (towards the bottom of the file):
Include /private/etc/apache2/extra/httpd-dav.conf
Again, make sure it is not commented out. It is disabled by default, so you need to remove the "#" from this line.

3. Configure WebDAV.

Edit the file /etc/apache2/extra/httpd-dav.conf. Add a section as below in it to create our new WebDAV share.


Alias /webdav "/Library/WebServer/WebDAV"



Dav On
Order Allow,Deny
Allow from all
AuthType Basic
AuthName WebDAV-Realm
AuthUserFile "/usr/webdav.passwd"


require user admin (where admin is YourUserName)





4. Create user accounts and passwords. Use the htpasswd tool to create your password file.

sudo htpasswd -c /usr/webdav.passwd admin (where admin is YourUserName)
New password:
Re-type new password:
Adding password for user admin

5. Create the necessary directories.

sudo mkdir -p /Library/WebServer/WebDAV
sudo mkdir -p /usr/var

6. Setup permissions correctly.

sudo chown -R www:www /Library/WebServer/WebDAV
sudo chown -R www:www /usr/var
sudo chgrp www /usr/webdav.passwd

7. Restart Apache gracefully.

sudo apachectl graceful

8. Test if your Apache configuration is correct by running:

sudo apachectl -t

9. Test your WebDAV Server

Test your WebDAV Serverwith litmus test tool available at http://www.webdav.org/neon/litmus/

10. Download

Download litmus-x.x.x.tar.gz package. UnArchive it
Compile and build as below.
$> ./configure
$> make
Test the webDAV server with below command
make URL=http://your-webDAV-ip/webdav CREDS=”admin password” check
Type below command to install litmus on to your mac (Optional)
$> make install

11. Use Goliath( http://www.webdav.org/goliath/ ) - Carbon Application or CyberDuck( http://cyberduck.ch/ ) - Cocoa Application to connect to your webDAV Server.

Comments

Popular posts from this blog

How to extract signing certificates from macOS binary files

Code signing is a macOS security technology that you use to certify that an app was created by you. Once an app is signed, the system can detect any change to the app—whether the change is introduced accidentally or by malicious code. As Apple Developer site says ( click here for more details  on code signing) : code signing allows the operating system to: Ensure that a piece of code has not been altered since it was signed.  The system can detect even the smallest change, whether it was intentional (by a malicious attacker, for example) or accidental (as when a file gets corrupted). When a code signature is intact, the system can be sure the code is as the signer intended. Identify code as coming from a specific source (a developer or signer).  The code signature includes cryptographic information that unambiguously points to a particular author. Determine whether code is trustworthy for a specific purpose.  Among other things, a developer can use a ...

How to find firmware or boot ROM version in Mac OS X

Firmware and boot ROM version of your mac can be found in two ways. Way 1 : 1. From "Apple" menu , choose "About This Mac" menu item. 2. Click " More Info " to open "System Profiler" application. 3. Under Contents -> Select Hardware Tree item. On the right side panel Under hardware overview section, we can see Boot ROM Version and SMC (Firmware) Version. Way 2 : Run the below command in terminal to get boot ROM version and SMC(firmware) version : $ system_profiler SPHardwareDataType | grep -i "Version" | awk -F ':' '{print $1 $2}'

How to get a certificate fingerprint as SHA-256, SHA-1 or MD5 using OpenSSL on mac

As per my old post ( http://anandmpandit.blogspot.in/2016/11/how-to-extract-signing-certificates.html ) , we can extract the binary signing certificates on mac using codesign tool. If you needed to get fingerprint details of the certificate in MD5, SHA1 or SHA256 format then you have run below steps on the extracted certificate file on macOS. SHA256: SHA256 Fingerprint=D3:0A:32:6C:77:77:93:B5:45:20:AC:C0:D4:7E:3A:84:34:50:96:54:08:7F:7D:63:4C:3E:06:3B:E8:1F:C1:90 SHA1: SHA1 Fingerprint=BF:2C:93:1F:BD:88:E5:4C:96:D8:86:D5:F1:E6:9B:B7:DE:76:51:62 MD5: MD5 Fingerprint=3C:A3:3B:76:6D:AE:3F:4B:4E:B2:AA:66:97:55:B8:76