Using A Security Template To Control Function Access - Lexmark C54x Administrator's Manual

Embedded web server — security
Hide thumbs Also See for C54x:
Table of Contents

Advertisement

Managing authentication and authorization methods
To verify that the Kerberos configuration file for the selected device is functional, click Test Setup.
Setting date and time
Kerberos servers require key requests to have a recent time stamp (usually within 300 seconds). Therefore, the printer
clock must be in sync or closely aligned with the KDC system clock. You can update the printer clock settings manually.
You can also set it to use Network Time Protocol (NTP) to sync automatically with a clock that is also used by the Kerberos
server.
Note: We recommend using an NTP server.
1
Access the date and time settings.
Do either of the following:
From the Embedded Web Server, click Settings > Security > Set Date and Time.
From the home screen, navigate to the menu screen, and then click Security > Set Date and Time.
Note: When accessing the menu screen, log in as an administrator.
2
To manage the settings manually, enter the correct date and time in YYYY-MM-DD HH:MM format, and then select
a time zone from the drop‑down menu.
Notes:
Entering manual settings automatically disables the use of NTP.
If you select (UTC+user) Custom from the Time Zone list, then you need to configure more settings under
Custom Time Zone Setup.
3
If daylight saving time (DST) is observed in your area, then select Automatically Observe DST.
4
If you are located in a nonstandard time zone or an area that observes an alternate DST calendar, then adjust the
Custom Time Zone Setup settings.
5
If you want to sync to an NTP server rather than update the clock settings manually, then select Enable NTP. Then
type the IP address or host name of the NTP server.
6
If the NTP server requires authentication, then select the preferred method from the Authentication menu. Then
click Install MD5 key or Install Autokey IFF params to browse to the file containing the matching NTP authentication.
7
Click Submit to save the changes, or click Reset Form to restore the default settings.

Using a security template to control function access

Note: This feature is available only in advanced‑security devices.
Each access control can be set to require no security (default) or to use any of the building blocks in the drop‑down
menu for that function. Only one method of security can be assigned to each access control.
20

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents