Really? Because that's not what the manual (https://wiki.contribs.org/SME_Server:Documentation:User_Manual:Chapter1)
you are right I was mixing with user-manager
And no, none of them have static IPs.
still you might not want to open this page to the whole internet, and you could start by checking their usual ip adresses and make a whois on those to obtain the ip block you need to add to a whitelist
seeing at /etc/e-smith/templates/etc/httpd/conf/httpd.conf/VirtualHosts/27ManagerProxyPass
you might be able to do some changes
mkdir -p /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/VirtualHosts
cp /etc/e-smith/templates/etc/httpd/conf/httpd.conf/02externalSSLAccessString /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/02externalSSLAccessStringUserPassword
cp /etc/e-smith/templates/etc/httpd/conf/httpd.conf/VirtualHosts/27ManagerProxyPass /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/VirtualHosts/
then start editing
/etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/02externalSSLAccessStringUserPassword to get this
{
#---------------------------------------------------------------------
# Grab UserPasswordValidFrom access list property of httpd-admin
# SSL enabled virtual hosts should only allow access from IP's in
# this list, as well as local networks.
#---------------------------------------------------------------------
$externalSSLAccess = '';
$OUT = '';
my $UserPasswordValidFrom = ${'httpd-admin'}{'UserPasswordValidFrom'};
return unless defined $UserPasswordValidFrom;
$UserPasswordValidFrom =~ s/,/ /g;
$UserPasswordValidFrom =~ s:/255.255.255.255::g;
$UserPasswordexternalSSLAccess = $UserPasswordValidFrom;
}
then update /etc/e-smith/templates-custom/etc/httpd/conf/httpd.conf/VirtualHosts/27ManagerProxyPass ; change this
elsif (($haveSSL eq 'yes') && (($port eq $sslPort) || ($plainTextAccess ne 'yes')))
{
$OUT .= " allow from $localAccess $externalSSLAccess\n";
} else {
elsif (($haveSSL eq 'yes') && (($port eq $sslPort) || ($plainTextAccess ne 'yes')))
{
if ($place eq 'user-password')
{
$OUT .= " allow from $localAccess $externalSSLAccess $UserPasswordexternalSSLAccess\n";
}
else
{
$OUT .= " allow from $localAccess $externalSSLAccess\n";
}
} else {
finally you just have to fill the ip block you want (replace with what is needed):
config setprop httpd-admin UserPasswordValidFrom ip.ip.ip.ip/255.255.0.0,ip.ip.ip.ip/255.255.0.0
and
signal-event remoteaccess-update
it might do the trick; another approach would be to simply "allow from all" for user-manager if UserPasswordValidFrom eq all