Security Configuration
Prev
Next

Security Configuration

The dialog to configure the CUPS server security settings for any of the defined server locations is shown here. It contains the following settings, which may be defined separately for any valid resource (or location) of the CUPS server:

Valid resources (or locations) of the CUPS server are:


dialog to configure the CUPS server security settings for
any of the defined server locations

Note

For all locations that are not defined separately the setting of the location “above” it is valid.

For example, you have a printer named infotec_P450 with no set security options. Then the security of the location /printers will take the responsibility for this printer as it is a sub-location of/printers. If, in turn there is no security set for /printers, then the security for / (the general security) of the server takes responsibility. Either you have set this for your purpose or the compiled-in default value takes over.

SystemGroup

The group name for System or printer administration access. The default varies depending on the operating system, but will be lpadmin, system or root (checked for in that order).

Access Permissions

Access permissions for each folder served by the scheduler. Locations are relative to the document root.

Authorization Type

The authorization to use:

None

Perform no authentication.

Basic

Perform authentication using the HTTP Basic method.

Digest

Perform authentication using the HTTP Digest method.

Note

Local certificate authentication can be substituted by the client for Basic or Digest, when connecting to the localhost interface.

Authorization Class

The authorization class. Currently only “Anonymous”, “User”, “System” (valid user belonging to the group set as system group), and “group” (valid user belonging to the specified group) are supported.

Authorization Group Name

The group name for “Group” authorization

Encryption

Whether or not to use encryption. This depends on having the OpenSSL linked into the CUPS library and scheduler.

Possible values are:

Always

Always use encryption (SSL)

Never

Never use encryption.

Required

Use TLS encryption upgrade.

IfRequested

Use encryption if the server requests it.

Allow

Allows access from the specified hostname, domain, IP address or network. Possible values are:

  • All

  • None

  • *.domain.com

  • .domain.com

  • host.domain.com

  • nnn.*

  • nnn.nnn.*

  • nnn.nnn.nnn.*

  • nnn.nnn.nnn.nnn

  • nnn.nnn.nnn.nnn/mmm

  • nnn.nnn.nnn.nnn/mmm.mmm.mmm.mmm

The host and domain address require that you enable hostname lookups, as described earlier.

Deny

Denies access from the specified hostname, domain, IP address or network. Possible values are:

  • All

  • None

  • *.domain.com

  • .domain.com

  • host.domain.com

  • nnn.*

  • nnn.nnn.*

  • nnn.nnn.nnn.*

  • nnn.nnn.nnn.nnn

  • nnn.nnn.nnn.nnn/mmm

  • nnn.nnn.nnn.nnn/mmm.mmm.mmm.mmm

The host and domain address require that you enable hostname lookups, as described earlier.

Order

The order of the allow and deny processing.

Prev
Next
Home


Would you like to comment or contribute an update to this page?
Send feedback to the TDE Development Team