X-Git-Url: http://git.freeside.biz/gitweb/?p=freeside.git;a=blobdiff_plain;f=sql-ledger%2Fdoc%2Ffaq.html;h=5a26f64e31a6ac0d6126b6ea0f76dc3ac0234d87;hp=0f6f237cae16ba205539f564fcae1d46bca6806a;hb=32306b5f8ffe4ce594409aa6e89626740b225a39;hpb=52072fcd26f2faf57923f598c358e7f47c4e2643 diff --git a/sql-ledger/doc/faq.html b/sql-ledger/doc/faq.html index 0f6f237ca..5a26f64e3 100644 --- a/sql-ledger/doc/faq.html +++ b/sql-ledger/doc/faq.html @@ -1,56 +1,119 @@ @@ -696,7 +497,8 @@ $language. If your language specific files are in 'locales/cc', enter 'cc' and access control which makes it fairly safe out of the box to run even in front of a firewall. Some precautions which are out of our control must be taken though. -It matters where you install SL and how you configure your web and SQL server. +It matters where you install SL and how you configure your web server and +SQL server.
   Typical setups:
@@ -720,13 +522,19 @@ It matters where you install SL and how you configure your web and SQL server.
 The location for the users directory can be specified in sql-ledger.conf
 
 

  • Set permission for the users and templates directory to 711 -(most restrictive)

  • If you do not want anyone to change the templates with the built-in editor set the files in templates/directory/ to read only or disable the menu item to edit the templates. -

  • For PostgreSQL you can set who has access to the server in the file +

  • You may setup a read-only environment if you disable the menu items +to add data. i.e 'Add Transaction' if unchecked you will not be able to add +a transaction or repost a transaction. You may look at it but nothing else. + +

  • There are various settings for audit control and you may disable +reposting entirely or up to a certain date. + +

  • For PostgreSQL you may also set who has access to the server in the file pg_hba.conf
    Authentication crypt does not work because not all SQL servers accept encrypted passwords. @@ -734,8 +542,9 @@ accept encrypted passwords.

  • in addition you can secure the tables from unauthorized access by setting up a different database user and GRANT rights. For instance, users without DELETE rights will still be able to use the program, change -customers or vendors but will not be able to delete transactions. -To lock all the tables GRANT SELECT rights only. +customers and vendors, add transactions but will not be able to delete or +repost transactions. +
    To lock all the tables to create a RO system GRANT SELECT rights only.

  • Other security options include a secure shell, your webserver's authentication system, SSL, encrypted tunnels, ...