With an earlier version of openSuSE, 10.1 if memory serves, I had a problem using the cups web configuration interface. I added my name and password using "lppasswd" to resolve the problem. After pointing a web browser to "https://localhost:631" I entered in my own credentials. With later versions of SuSE, I just need to enter root/password at the pop up authentication dialog. The "lppasswd" program works just like "smbpasswd".
Also, check the ownership & permissions of /dev/lp0. It should be owned by root with a group ownership of lp. If it isn't check if the dbus & had daemons are running. If they aren't, one possible reason is if you boot with the "noacpi" kernel boot option.
I took a look in my cups.conf file and was surprised to find XML entries when I was expecting
name value ... styled entries. There is a <Policy .. Policy/> in it but I don't know if this relates to polkit or not. I use hplip on my system.
For comparison if it will help:
Code:
# Set the default printer/job policies...
<Policy default>
# Job-related operations must be done by the owner or an adminstrator...
<Limit Send-Document Send-URI Hold-Job Release-Job Restart-Job Purge-Jobs Set-Job-Attributes Create-Job-Subscription Renew-Subscri
ption Cancel-Subscription Get-Notifications Reprocess-Job Cancel-Current-Job Suspend-Current-Job Resume-Job CUPS-Move-Job>
Require user @OWNER @SYSTEM
Order deny,allow
</Limit>
# All administration operations require an adminstrator to authenticate...
<Limit Pause-Printer Resume-Printer Set-Printer-Attributes Enable-Printer Disable-Printer Pause-Printer-After-Current-Job Hold-New
-Jobs Release-Held-New-Jobs Deactivate-Printer Activate-Printer Restart-Printer Shutdown-Printer Startup-Printer Promote-Job Schedul
e-Job-After CUPS-Add-Printer CUPS-Delete-Printer CUPS-Add-Class CUPS-Delete-Class CUPS-Accept-Jobs CUPS-Reject-Jobs CUPS-Set-Default
>
AuthType Basic
Require user @SYSTEM
Order deny,allow
</Limit>
# Only the owner or an administrator can cancel or authenticate a job...
<Limit Cancel-Job CUPS-Authenticate-Job>
Require user @OWNER @SYSTEM
Order deny,allow
</Limit>
<Limit All>
Order deny,allow
</Limit>
</Policy>
Some of these policies relate to starting, stop and pausing jobs, which is the sort of thing that you are getting the cupsdAuthorize errors on, so I thought you could look at that. Does your system use policy kit to enable users to do things with devices?