From: Michael R Sweet
-s SCOPE(S)
Specifies a space-delimited list of scope names to use when authorizing access.
-The default is to request authorization for all supported scopes.
+The default is to request authorization for all supported OpenID scopes.
Starts an authorization workflow with the default web browser. If a resource URI is specified, the authorization is specific to that resource. The access token is send to the standard output on success.
-Clears any authorization for the specified resource or for all resources if no resource URI is supplied.
-Output the current, unexpired access token, if any, to the standard output.
-Output the client ID string, if any, to the standard output.
-Get the OAuth/OpenID authorization server metadata and send it to the standard output. If a name is specified, the output is just the value for the specified metadata.
-Get the OpenID user ID information and send it to the standard output. If a name is specified, the output is just the named claim from the user ID.
-Set the access token (which is sometimes also called an API key) for the specified resource or for all resources.
-Set the client ID string and secret for an OAuth/OpenID authorization server.
CUPS uses a redirect URI of "http://127.0.0.1/" for all authorization on the local system.
TBD +
Register a client ID and secret for the OAuth server at "https://oauth.example.com/":
+cups-oauth -a https://oauth.example.com/ set-client-data CLIENT-ID CLIENT-SECRET ++
Save an access token (sometimes called an application or API key) for the OAuth server at "https://oauth.example.com/": +
+cups-oauth -a https://oauth.example.com/ set-access-token TOKEN ++
Authorize against the OAuth server at "https://oauth.example.com/" using your web browser: +
+cups-oauth -a https://oauth.example.com/ authorize +
cups(1)
diff --git a/doc/help/man-cups-x509.html b/doc/help/man-cups-x509.html index 8d0017cc22..987080fffe 100644 --- a/doc/help/man-cups-x509.html +++ b/doc/help/man-cups-x509.html @@ -58,7 +58,7 @@ -u USAGE ] -COMMAND +SUB-COMMAND [ARGUMENT(S)]Sign a certificate request for the specified common name.
-Create a CA certificate for the specified common name.
-Create a certificate for the specified common name.
-Connect to the specified URI and validate the server's certificate.
-Create a certificate signing request for the specified common name.
-Run a HTTPS test server that echos back the resource path for every GET request. If PORT is not specified, uses a port number from 8000 to 8999.
-Shows any stored credentials for the specified common name.
TBD +
Create a certificate signing request for a 384-bit ECDSA certificate for "server.example.com":
+cups-x509 csr -t ecdsa-p384 server.example.com ++
Install the certificate you get back from the CA for "server.example.com": +
+cups-x509 install server.example.com server.example.com.crt ++
Run a test server for "server.exmaple.com" on port 8080: +
+cups-x509 server SERVER-NAME:8080 ++
Test a HTTPS client connection to "www.example.com" with validation: +
+cups-x509 client --require-ca https://www.example.com/ +
cups(1)
diff --git a/man/cups-oauth.1 b/man/cups-oauth.1 index 7a7c0941aa..b2f34485bc 100644 --- a/man/cups-oauth.1 +++ b/man/cups-oauth.1 @@ -6,7 +6,7 @@ .\" Licensed under Apache License v2.0. See the file "LICENSE" for more .\" information. .\" -.TH cups-oauth 1 "CUPS" "2025-03-04" "OpenPrinting" +.TH cups-oauth 1 "CUPS" "2025-05-05" "OpenPrinting" .SH NAME cups-oauth \- interact with an oauth/openid authorization server .SH SYNOPSIS @@ -104,8 +104,8 @@ Specifies the OAuth/OpenID authorization server URL. .TP 5 \fB\-s \fISCOPE(S)\fR Specifies a space-delimited list of scope names to use when authorizing access. -The default is to request authorization for all supported scopes. -.SH COMMANDS +The default is to request authorization for all supported OpenID scopes. +.SH SUB-COMMANDS .SS authorize Starts an authorization workflow with the default web browser. If a resource URI is specified, the authorization is specific to that resource. @@ -137,7 +137,18 @@ environment variable sets the default OAuth/OpenID scopes as a space-delimited l .SH NOTES CUPS uses a redirect URI of "http://127.0.0.1/" for all authorization on the local system. .SH EXAMPLES -TBD +Register a client ID and secret for the OAuth server at "https://oauth.example.com/": +.nf + cups-oauth -a https://oauth.example.com/ set-client-data CLIENT-ID CLIENT-SECRET +.fi +Save an access token (sometimes called an application or API key) for the OAuth server at "https://oauth.example.com/": +.nf + cups-oauth -a https://oauth.example.com/ set-access-token TOKEN +.fi +Authorize against the OAuth server at "https://oauth.example.com/" using your web browser: +.nf + cups-oauth -a https://oauth.example.com/ authorize +.fi .SH SEE ALSO .BR cups (1) .SH COPYRIGHT diff --git a/man/cups-x509.1 b/man/cups-x509.1 index 2f42ab71b3..2695804c39 100644 --- a/man/cups-x509.1 +++ b/man/cups-x509.1 @@ -6,7 +6,7 @@ .\" Licensed under Apache License v2.0. See the file "LICENSE" for more .\" information. .\" -.TH cups-x509 1 "CUPS" "2025-03-04" "OpenPrinting" +.TH cups-x509 1 "CUPS" "2025-05-05" "OpenPrinting" .SH NAME cups-x509 \- description .SH SYNOPSIS @@ -58,7 +58,7 @@ cups-x509 \- description .B \-u .I USAGE ] -.I COMMAND +.I SUB-COMMAND .I [ARGUMENT(S)] .SH DESCRIPTION The @@ -121,7 +121,7 @@ Specify the certificate type - "rsa-2048" for 2048-bit RSA, "rsa-3072" for 3072- Specify the usage for the certificate as a comma-delimited list of uses. The supported uses are "digitalSignature", "nonRepudiation", "keyEncipherment", "dataEncipherment", "keyAgreement", "keyCertSign", "cRLSign", "encipherOnly", and "decipherOnly". The preset "default-ca" specifies those uses required for a Certificate Authority, and the preset "default-tls" specifies those uses required for TLS. -.SH COMMANDS +.SH SUB-COMMANDS .SS ca COMMON-NAME Sign a certificate request for the specified common name. .SS cacert COMMON-NAME @@ -138,7 +138,22 @@ If PORT is not specified, uses a port number from 8000 to 8999. .SS show COMMON-NAME Shows any stored credentials for the specified common name. .SH EXAMPLES -TBD +Create a certificate signing request for a 384-bit ECDSA certificate for "server.example.com": +.nf + cups-x509 csr -t ecdsa-p384 server.example.com +.fi +Install the certificate you get back from the CA for "server.example.com": +.nf + cups-x509 install server.example.com server.example.com.crt +.fi +Run a test server for "server.exmaple.com" on port 8080: +.nf + cups-x509 server SERVER-NAME:8080 +.fi +Test a HTTPS client connection to "www.example.com" with validation: +.nf + cups-x509 client --require-ca https://www.example.com/ +.fi .SH SEE ALSO .BR cups (1) .SH COPYRIGHT