Book Image

Moodle 2 Administration

Book Image

Moodle 2 Administration

Overview of this book

Moodle has evolved from an academic project to the world's most popular virtual learning environment. During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.Moodle 2 Administration is a complete, practical guide to administering Moodle sites. It covers how to set up Moodle in any learning environment, configuration and day-to-day admin tasks, as well as advanced options for customizing and extending Moodle.The author, who has been administering systems for over 20 years, has adopted a problem-solution approach to bring the content in line with your day-to-day operations. The practical examples will help you to set up Moodle for large groups and small courses alike. This is a one-stop reference for any task you will ever come across when administering a Moodle site of any shape and size.
Table of Contents (24 chapters)
Moodle 2 Administration
Credits
About the Author
About the Reviewers
www.PacktPub.com
PacktLib.PacktPub.com
Preface

System security


In this section, we are dealing with configuration settings, login via secure HTTP, IP blocker, module security, and Safe Exam Browser integration.

Configuration security

There are a number of general configuration settings that potentially have an impact on the security of your system.

Accessibility of dataroot

In the Notifications screenshot at the beginning of the chapter, you must have probably spotted the warning that the dataroot directory is directly accessible via the Internet. Moodle requires additional space on a server to store uploaded files, such as, course documents and user pictures. The directory is called dataroot and must not be accessible via the Web. If this directory is accessible directly, unauthorized users can get access to content.

To prevent this, move your dataroot directory outside the web directory and modify config.php accordingly, by changing the $CFG->dataroot entry.

In externally-hosted environments, it is often not possible to locate the...