A careful study of the authentication problem shows that
it should be done during reception of commands and/or jobs
from a remote user and/or spooler. At this time the following
must be done:
The received command must be checked for consistency,
and the remote user and host must be determined.
The remote user and host must be authenticated.
The command and/or spooling operation must be carried
out.
The results must be returned to the remote system.