System configuration screen
The System configuration screen lets you configure the basic settings for your Content Management system.
To access the System configuration screen
-
Click
-
Click System configuration from the menu.
The System configuration screen loads.
To edit any of the settings values on the screen, perform the following steps:
-
Click the Edit button.
This acquires editing locks for the page.
System administrators cannot edit every available setting presented.
Some settings can only be changed by the root user.
In the tables following, the User column lists the minimum user permissions required to edit the setting.
-
Edit the settings values as desired.
Although most settings have a default value, some do not.
In the tables following, the Default value column uses the string, [blank], to denote settings that have no default value.
-
Click the Save button.
The new settings values are applied.
System settings
System settings effect the entire Squiz Content Management system.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
System name |
The system |
The name of the system. This name is shown in the header section of the HTML source code created for the site. The name is also displayed at the bottom of all emails sent to Squiz Content Management editors and administrators. |
|||
System owner |
[blank] |
The owner of the system. The owner’s name is shown in the header section of the HTML source code created for the site. It is also displayed at the bottom of all emails sent to Squiz Content Management editors and administrators, so they know who to contact for assistance. |
|||
Admin mode suffix |
_admin |
When this string is appended to a site URL, the admin UI is launched when the URL is loaded. + If the user is not logged-in, the sign-in page is loaded. |
|||
Inline edit mode suffix |
_edit |
When this string is appended to a URL, the inline edit interface is launched when the URL is loaded. Users with Content editor permissions or greater can access inline edit. If the user is not logged-in, the sign-in page is loaded. |
|||
System sign-in suffix |
_login |
When this string is appended to a site URL the login screen is presented when the URL is loaded. After logging in, instead of going to the administration or inline edit mode, you will be returned to the page you were viewing. |
|||
System bypass cache suffix |
_nocache |
When this string is appended to a site URL, the Using this suffix forces Squiz Content Management to serve the most recent version of the page to the user. |
|||
System bypass proxy cache suffix |
_noproxycache |
When this string is appended to a site URL, the Using this suffix forces Squiz Content Management to ignore any Send cacheable headers settings. As well, the system will not send relevant headers (such as |
|||
System clear cache suffix |
_recache |
When this string is appended to a site URL, the Squiz Content Management cache for the page is cleared and re-populated when the URL is loaded.
|
|||
System performance mode suffix |
_performance |
When this string is appeneded to a site URL, the Squiz Content Management performance mode is accessed when the URL is loaded. |
|||
System timezone |
Australia/Sydney |
Sets the time-zone for the system. |
|||
Disable matrix attribution in designs |
No (Off) |
When set to Yes, the running Matrix attribution is removed from the site’s source HTML.
|
|||
Enforce same origin frame security for backend |
Yes (On) |
When set to Yes, the Squiz Content Management system adds the Only pages hosted on the same domain as the system can nest the admin or edit mode interfaces using frames. Keeping this option enabled is strongly recommended. |
|||
Enforce same origin frame security for frontend |
Yes (On) |
When set to Yes, the Squiz Content Management system adds the Only pages hosted on the same domain as the system can be nested using frames. Keeping this option enabled is strongly recommended. |
|||
Render time threshold |
30 |
The number of seconds the Content Management System waits to bypass asset rendering. The threshold is timed fromm the initial http request for the asset. |
|||
Indexable content size limit |
2000000 |
The number of bytes that constitute the maximum amount of content than can be indexed. If the content exceeds this number, it will be truncated down the limit. |
|||
Allow trashing without lock |
No (Off) |
When set to Yes, the Content Management System allows users to move assets to the trash without the user acquiring editing lock on the to-be-deleted asset. |
System URL settings
System URL settings control the behaviour of system URLs.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
System root URLs |
[blank] |
This field defines the list of URLs that can access Squiz Content Management. All site assets created within Squiz Content Management need a URL applied based on a URL listed in this field. System root URLs must be added here before they (or any more specific URLs) can be used by a site asset. You can enter as many URLs as you need. Put each URL on a new line.
|
|||
System parent domains |
[blank] |
Parent domains are examined when the system is setting the session cookie, and are useful if several system root URLs have a common parent domain. If the current URL’s FQDN ends with one of the parent domains then the cookie will be set on the parent domain instead. As a consequence the user’s session will persist across the parent domain and all its subdomains. The common parent must be only one level up. For example
will share a session cookie (which is created for By contrast
will not share a session cookie because their common parent domain is two levels up. |
|||
System static URL |
[blank] |
By default, Squiz Content Management rewrites URLs for publicly accessible and live file-based assets to be readable without loading PHP. By entering a system static URL, you can tell Squiz Content Management to rewrite those URLs to an alternative location, which could be a different (and lightweight) piece of web server software on the same machine as the Squiz Content Management install or a completely different machine. Leave this field blank to use the default Squiz Content Management behavior.
|
|||
Restricted file extensions through static root domain |
[blank] |
This field sets the file extension types that will not be served through the system’s static URL, as specified in the previous system static URL field. All file types specified in this field will not use the system’s static root domain (that is, \www.example.com) instead of the Squiz Content Management system root URL. The System static URL will serve any file types not specified in this field. Multiple file extensions listed in this field must be comma-separated. |
|||
Allow HTTP for static URL |
Yes (On) |
When set to Yes static URLs for live, publicly-readable files can be served using the (insecure) HTTP protocol. When set to No, static URLs for live, publicly-readable files will be served through a HTTPS (Secure HTTP) protocol, even if the connection for the asset referencing them is insecure.
|
|||
Allow secure HTTP (HTTPS) for static URL |
Yes (On) |
When set to Yes static URLs for live, publicly-readable files can be served using the HTTPS (Secure HTTP) protocol. When set to No, static URLs for live, publicly-readable files will be served through a (insecure) HTTP protocol even if the connection for the asset referencing them is secure.
|
|||
System web path separator |
- |
Sets the character used to replace spaces in an assets’ name when automatically generating URLs. For example, consider an asset named Contact us. On a system using the default System web path separator this asset will be represented in a generated URL as |
|||
Redirect URL with trailing slash |
Yes (On) |
When set to Yes, trailing slashes on frontend requested URLs will automatically be removed and the request will automatically be redirect to a URL with no trailing slash. The system will serve content at one URL instead of both with and without a trailing slash. This reduces the number of cache entries and URLs that may show up in search engines.
|
|||
URLs containing |
No (Off) |
When set to Yes, the system will return a 404 Page not found status when any requested URL contains the string
|
Email settings
Email settings sets the email addresses used for receiving messages and errors generated by the Squiz Content Management system.
Setting | Default value | User | Notes |
---|---|---|---|
Default email |
[blank] |
Specifies the default email address for the system that Squiz Content Management will use to send emails if it has not been supplied with an email address for the message. For example, if a custom form has to send emails, but the To address is empty, the email will be sent to the address specified in this field. This address should be one available to the owner of the Squiz Content Management installation. |
|
Tech email |
[blank] |
Specifies the email address that Squiz Content Management uses to send technical emails, such as error reports and system configuration changes. This email address should be for a user responsible for diagnosing and fixing technical problems with the Squiz Content Management installation. |
Sign-in/session settings
Sign-in/session settings <introductory explanation here>.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
Session cookie name |
SQ_SYSTEM_SESSION |
This setting can only be changed by editing the "SQ_CONF_SESSION_COOKIE_NAME" value in the
|
|||
Root URLs requiring secure sign-in |
[blank] |
System root URLs listed in this field will attempt to display the sign-in box using the |
|||
Max sign-in attempts |
3 |
The maximum number of times a user may incorrectly enter this password before their account is locked. Enter zero — 0 — to allow unlimited attempts.
|
|||
Allow IP change |
No (Off) |
When set to Yes, a user is not signed-out if that user’s IP address changes while signed-in to Squiz Content Management. Proxy settings in some companies can change the user’s IP address each time they view a Squiz Content Management page, effectively logging out the user each time they try and navigate to a new page. Enabling this setting will tell Squiz Content Management to allow a user’s IP address to change throughout their session. By default, if a user’s IP address changes while using Squiz Content Management, they will be signed out to ensure their account is not being used by someone else. |
|||
Process PHP credentials |
No (Off) |
When set to Yes, Squiz Content Management will use the These variables are generated by PHP when an HTTP Authentication dialog box is invoked in a script. If a user has previously entered their username and password in a standard HTTP authentication form, Squiz Content Management will be provided with the username and password they entered. When this setting is enabled, Squiz Content Management attempts to sign the user into the system using the username and password combination provided without requiring them to retype their username and password. The password stored within Squiz Content Management must match the password entered during the initial HTTP authentication. |
|||
Enable HTTP authentication |
No (Off) |
When set to Yes, The Content Management System will respond to requests with the query string
If this option is enabled, Squiz Content Management will generate an HTTP authentication dialogue box instead of showing the standard sign-in design. External tools can sign in to Squiz Content Management by appending |
|||
Accept HTTP authentication |
No (Off) |
When set to Yes, Squiz Content Management allows a username sent from an external authentication mechanism (for example, an authentication system provided by a web server or a proxy) to automatically sign in a user without them having to enter their password directly into the system. The Content Management Service assumes the user has been authenticated from the external system and does not check the password entered during the original authentication against their system password. |
|||
HTTP authentication variable |
REMOTE_USER |
This setting controls the PHP server variable used to authenticate external users if the Accept HTTP authentication setting is turned on.
There are two common variables for this setting:
|
|||
Enable external authentication systems |
No (Off) |
When set to Yes, external authentication systems (for example LDAP and IPD bridges) are enabled when authenticating a user. Only the default authentication asset will be returned from the area when this option is deactivated.System administrators can temporarily deactivate external authentication in certain circumstances. For example, if an external system is compromised. |
|||
Redis session lock wait time |
25000 |
the The PHP session handler will try to get the lock until the multiple of the lock wait time and lock retries. |
|||
Redis session lock retries |
1200 |
the The PHP session handler will try to get the lock until the multiple of the lock wait time and lock retries. |
Intervals settings
There is currently one Intervals setting, for setting the time between checks for system messages.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
System message check interval (seconds) |
60 |
The time between each check for new system messages.
|
Screen locks settings
Screen locks control screen and asset editing lock timings.
When a given screen or asset is editing locked, only the user with the lock can edit or otherwise change the locked object.
Setting | Default value | User | Notes | ||||
---|---|---|---|---|---|---|---|
Lock length (seconds) |
60 |
The number of seconds an asset lock is held before expiring. When an asset is locked and is not edited or otherwise changed for the set number of seconds, the asset lock is released.
|
|||||
Lock refresh interval (seconds) |
30 |
How often an asset lock is automatically refreshed in the admin UI and simple edit UI.
|
|||||
Lock inactivity expiry (seconds) |
60 |
The number of seconds an asset lock is held before it expires due to inactivity. This setting applies in both the administration, and simple edit interfaces. Refreshing this frame reacquires locks that the user still needs.
|
PHP configuration settings
PHP configuration sets PHP-related operating values.
Setting | Default value | User | Notes |
---|---|---|---|
Web memory limit (MB) |
256 |
n/a |
This is set to 256 MB on all Squiz DXP Content Management instances. It is not configurable. |
Cron memory limit (MB) |
64 |
Sets the maximum memory used by the Squiz CMS cron system. This value will likely need to be increased on larger and more complex systems. |
V8 configuration settings
V8 configuration sets operating values for the V8 JavaScript engine.
Setting | Default value | User | Notes |
---|---|---|---|
Memory limit (MB) |
512 |
The maximum V8JS memory allocated to each Matrix instance. |
|
Timeout (seconds) |
60 |
The maximum V8JS timeout allocated to each Matrix instance. |
Error/debug settings
Error/debug settings control whether and how Squiz CMS errors are included in the operating system log.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
Log errors to syslog |
No (Off) |
Sets whether to log system errors to the operating system log. If this field is set to Yes, the system name will be used as the system log identifier. If no system name is explicitly set, a default string — squiz mysource <version #> (Matrix) — is used. |
|||
Syslog facility |
User |
Sets where in the operating system log Matrix errors will be filed. These options (as defined in the Syslog Facility codes) are:
User-defined facilities must be configured in the system’s
|
|||
Debug settings |
|
|
Language settings
Language settings control URL-string sanitization.
Language settings are not related to page translation. |
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
Admin UI language |
English (United States) |
n/a |
This sets the language used by the system backend. It is set to US English and cannot be changed. |
||
Replace accented characters in web paths |
Yes (On) |
When this field is set to Yes, non-ASCII characters (for example, letters that take a diacritic) are converted to the character map of the selected Web path character replacement language. (See the following setting.)
|
|||
Web path character replacement language |
English |
Sets the character map used to transform non-ASCII characters (for example, letters that take a diacritic) into valid characters in a URL. This setting is not a page translation setting. It only affects how non-ASCII characters are transformed into URL-safe glyphs.
|
Asset tree settings
Asset tree settings control aspects of asset display in the Squiz CMS asset tree.
Setting | Default value | User | Notes |
---|---|---|---|
Asset limit per set |
50 |
Sets the maximum number of child assets displayed for an asset in the asset tree. If more than this number of child assets exist, Next and Previous buttons are presented. For more information on the Next and Previous buttons, refer to the Concepts documentation. |
|
Asset display name |
%asset_short_name% |
This field specifies what information is shown for each asset in the asset tree. The following keyword replacements can be used, along with other characters:
|
HTTP headers settings
HTTP headers settings control what HTTP headers are sent by the system.
Setting |
Default value |
User |
Notes |
||
Send cacheable header |
Yes (On) |
When set to When set to
This setting allows the web browser to cache pages for faster browsing. |
|||
Send last-modified header |
No (Off) |
When set to Yes, a This indicates when a page’s content was last modified. Browser and proxy server caches use this header to determine the age of the content, and minimize unnecessary future hits on the Matrix system. |
|||
Send not modified status-code |
No (Off) |
When set to Yes, Matrix tests If the current asset’s content is older than the passed
This setting is recommended for heavily trafficked sites, as it can reduce the number of requests that reach Matrix (instead of using a cache), especially if your content does not change often. |
|||
Send no-cache header for file assets |
Yes (On) |
When set to Yes a This option can be disabled to resolve inline file display issues involving PDF documents in Internet Explorer. |
|||
Send cacheable headers for 404 pages |
Yes (On) |
When set to Yes pages returning a 404 Not Found response can be cached by a caching proxy server. This option is separate from the send cacheable header option. The cache expiry setting determines the cached response’s expiry time on the Details screen of the cache manager. See the Cache manager documentation for more information on the Cache manager. |
|||
Use "X-Forwarded-for" header |
No (Off) |
When set to Yes, the This header allows parent servers to discern client IPS when behind reverse proxies. IP restrictions within the system can be used in conjunction with caching proxy servers (for example Squid) specified in the available input fields. |
|||
Set 'HttpOnly' flag for session cookies |
Yes (On) |
When set to yes, the An Additionally, a web browser will not allow client-side scripts (such as javascript) access to the cookie. This setting can help mitigate the effects of cross-site scripting (XSS) attacks. |
|||
Set 'Secure' flag for session cookies |
Yes (On) |
When set to Yes, the secure cookie flag is sent when a connection is made over HTTPS. Enabling this causes browsers to not share the session cookie between HTTP and HTTPS. |
|||
Send IE "X-UA-Compatible" header? |
Yes (On) |
When set to Yes, the Enabling this option will send the |
|||
Stale while revalidate expiry |
86400 |
Sets the number of seconds the stale cache can be re-used for requests after the cache becomes stale. This value is served in the The default value (86400 seconds) is equal to 24 hours. |
|||
Stale if error expiry |
604800 |
Sets the number of seconds in which the stale cache can be reused for requests after the Content Management instance returns errors. This value is served in the The default (604800 seconds) is equal to one week or seven days |
Roles configuration
Roles configurations turn the various role systems on or off.
Setting | Default value | User | Notes |
---|---|---|---|
Enable permission roles system |
No (Off) |
When set to Yes, roles are enabled in the system. If roles are not required, leaving them off is recommended. Leaving roles inactive can increase the performance of the system. |
|
Enable workflow roles system |
No (Off) |
When set to Yes, workflow roles are enabled in the system. If workflow roles are not required, leaving them off is recommended. Leaving workflow roles inactive can increase the performance of the system. |
|
Enable global role assignments |
No (Off) |
When set to Yes, global roles are enabled in the system. If global roles are not required, leaving them off is recommended. Leaving global roles inactive can increase the performance of the system. |
Feature toggles settings
Feature toggles settings turn asset-specific settings on or off.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
Enable asset syncing feature |
No (Off) |
When set to Yes, assets across different systems can be added, updated and deleted in bulk.
|
|||
Enable asset management API |
No (Off) |
When set to Yes, the REST API for creating and updating assets is enabled. Once enabled, assets can be created and updated using said API. |
Miscellaneous settings
Miscellaneous settings collects together settings not obviously belonging to other listed categories.
Setting | Default value | User | Notes |
---|---|---|---|
Visited page maximum entries |
10 |
This sets the maximum number of visited URLs to store in a given user session. The specific URLs and asset IDs visited can be accessed via their associated global session variables:
|
|
Strip matrix comments from frontend |
Yes (On) |
When set to Yes, the design parsing process strips specially-marked comments from the final output. Comments set within these specially-marked comment block are, consequently, not presented to frontend users who use their browser’s built-in ability to view a page’s source. Specially-marked comment blocks are defined as follows: For HTML design files, wrap comments in For CSS design files, wrap comments in |
Funnelback settings
There is one Funnelback setting for setting which Matrix user IDs are used for Funnelback indexing.
Setting | Default value | User | Notes | ||
---|---|---|---|---|---|
Funnelback indexing user |
[blank] |
Add a Matrix user ID to set that user ID as allowing Funnelback indexing. To set multiple Matrix user IDs to allow Funnelback indexing, add the user IDs as a comma-separated string.
|