Book Image

Moodle 2 Administration

Book Image

Moodle 2 Administration

Overview of this book

Moodle has evolved from an academic project to the world's most popular virtual learning environment. During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.Moodle 2 Administration is a complete, practical guide to administering Moodle sites. It covers how to set up Moodle in any learning environment, configuration and day-to-day admin tasks, as well as advanced options for customizing and extending Moodle.The author, who has been administering systems for over 20 years, has adopted a problem-solution approach to bring the content in line with your day-to-day operations. The practical examples will help you to set up Moodle for large groups and small courses alike. This is a one-stop reference for any task you will ever come across when administering a Moodle site of any shape and size.
Table of Contents (24 chapters)
Moodle 2 Administration
Credits
About the Author
About the Reviewers
www.PacktPub.com
PacktLib.PacktPub.com
Preface

Networking prerequisites and security


Moodle networking requires a number of additional components, that deal with secure communication and safe data exchange, to be installed on your servers.

Required PHP extensions

The following elements have to be installed on all Moodle servers that are participating in the network:

  • curl: A PHP library of calls that are specifically designed to safely fetch data from remote sites. If not installed, you will have to recompile PHP and add --with curl when running configure script.

  • openssl: Another PHP library that provides encryption functionality without the need to purchase an SSL certificate (--with openssl).

  • xmlrpc: A PHP library that supports remote procedure calls via XML (--with xmlrpc).

    It is possible to add trusted hosts to Moodle, which allows them to execute calls via XML-RPC to any part of the Moodle API (Networking | XML-RPC hosts). This is potentially very dangerous and is only meant for developers. In this book, we will not be dealing...