System Administrator Guide
Before you begin, you must first install PrestaShop.
This guide will help you configure a walled Web server.
To configure PHP, you must edit the
php.ini file, found in your server PHP install (not in PrestaShop's folder). Not all host will allow you to edit this file, so contact your host if you cannot access it.
php.ini file requires you to change some values, most of the time from "On" to "Off" or vice versa. The file contains a lot of documentation for each line, be sure to read them in order to better understand your changes. Be careful of what you edit, as this has a direct impact on the way PHP runs, and therefore on your servers stability and even security.
register_globals directive, when enabled, defines all environment variables (GET, POST, COOKIE, SERVER...) as global variables. It is unsafe to use unset variables, because a user could easily set a value into this variable by using the GET method, for example. It is therefore imperative to set
register_globals to OFF.
magic_quotes directive automatically escapes (or "adds slashes") to all special character sequences (', ", \, NULL) for all environment variables (GET, POST, COOKIE, SERVER...). This option must be set to OFF because it will addslash each variable even if it does not need to be addslashed. Moreover, some Web applications overlook this option, so some variables could be addslashed twice, resulting in corrupted data.
allow_url_include directive is used to allow to include any file via the
include statements, even if it does not come from your Web server. This option must be set to OFF, because if one application on your web server suffers of "include vulnerability", users will be able to include any file from any server and those will be executed on your own server.
In short, it is imperative to find the following directives, and change their values to "Off":
- mysql.allow_persistent: Turn on if you want to enable mysql to have persistent connection (mysql will close its connections after several HTTP request)
- mysql.max_persistent: Put here the maximum number of persistent connections allowed by MySQL (-1 correspond to the maximum that system can offer)
- mysql.max_links: Put here the maximum number of connections allowed by MySQL (-1 correspond to the maximum that system can offer)
- mysql.connec_timeout: Put here the number of seconds MySQL must wait before declare connection as lost.
- mysql.trace_mode: When this mode is activated, MySQL will show errors when there is non-free ressources or a MySQL error.
- For more informations about MySQL directives:
- session.save_handler: Define the name of session’s handler. It will be used to save and read data.
- session.save_path: Put here the directory where session will be saved.
- session.use_cookie: Notice if server will use cookie to save customer’s sessions.
- session.name: Notice the name of session, which is used as cookie name.
- session.cookie_path: Specialize the path used during cookie creation.
- session.cookie_domain: Specialize the domain used during cookie creation (default: “/”). If it is empty, server’s host name will be used according to the cookie’s specifications.
- session.serialize_handler: Defines the name of the handler which is used to serialize/deserialize data.
- For more informations about session: http://fr.php.net/manual/en/session.configuration.php
The only problem is Safe Mode is included in PHP. If PHP machine is vulnerable then user could bypass this Safe Mode. If you have several web applications on the same server, or if you just want to protect your server by an other solution, I invite you to read the first paragraph of the recommendations part.
MySQL often has an administrator account as default ("root", "admin"...), which gives access to all of the databases' content, no matter who the database is managed by. The administrator has all the rights, and can do every possible actions. You therefore need to safekeep your databases, so as to prevent your web applications from succumbing to SQL injections (which can happen when a user succeeds in obtaining the admin password).
Each time you install a new web application on your server, you must create a new MySQL user when just the necessary rights to handle that application's data. Do NOT use the same username to handle the databases for all of your installed web applications.
Let's say we manage MySQL with user account that can create new users. Let's do just that, using the following command line:
...or using the following SQL query:
Note that your host might give you access to an online tool to do MySQL administration tasks more easily, such as cPanel. Do use that, since you probably won't have access to the command line in that case.
Now we have a username with just enough rights to connect to the local database.
We need to allow this user to use the 'prestashop' database, and configure his rights at the same time. Here is a template for the SQL query to do that:
We now have one user just for our 'prestashop' database. Remember to do this for each new web application you add to your server.
You can now install PrestaShop safely.
If you just installed MySQL, think to add a password for the root account, who has no password as default.
Basic authentication establishment (.htaccess)
In order to better protect your PrestaShop install, we need to establish a basic authentication on the admin directory.
One of the aim of the
.htaccess file is to protect your folders and all its sub-folders. It only works on Apache servers, and a few others. Make sure your web server is Apache before creating a
To achieve basic authentication on your admin folder, we need to add a
.htaccess file in that folder (for instance,
AuthUserFile: Shows the path to the file containing allowed users and their passwords.
.prestashop_adminis a text file.
AuthName: Defines the message to show when the authentication window pops up.
AuthType: Defines the authentication type.
Require: Requires users to log in in order to access the content.
valid-userenables multiple users to connect and access the folder.
Options: Defines the folder's options.
-Indexesdisables automatic generation of a directory index if no index file is available.
Here is a sample content for the
.prestashop_admin file, with a login and a password:
This file contains logins and hashed password who are allowed to access to the folder.
To hash password, you can follow this link: .htpasswd file generation.
It is strongly recommended to put this file into a directory that is inaccessible to your web applications, so before the
/openbase_dir folder. It prevents
.htpasswd file injection, in case one of yours web applications is vulnerable.
It is also possible to perform IP and domain restrictions using your
However, you should not put this kind of directive:
PHP's Safe Mode is deprecated in the latest version of PHP, and should not be used anymore.
Your applications' PHP code is the only vulnerable path to your server. It is therefore strongly recommended to always update your server's applications: PHP, MySQL, Apache and any other application on whic your website runs.
UNIX/BSD systems have the
cron command, which enables the recurring execution of command lines, based on configuration files (named
crontab). It enables you to automate application updates, and to backup your files and databases without needing an administrator to intervene.