Authentication; Authentication Overview - Xerox WorkCentre 5755 System Administrator Manual

Hide thumbs Also See for WorkCentre 5755:
Table of Contents

Advertisement

Authentication

Authentication Overview

This feature allows the user to be identified to the device, so that the device can then determine if the
user has access to the Device, Pathway, Services and/or its Features. It also enables the device to
identify the logged in user when various functions are performed, for example, sending an e-mail.
Authentication can be enabled to prevent unauthorized use of installed device options and standard
features. For example, the System Administrator can configure the device to allow users to access
specific services such as Machine Status Pathway, Job Status Pathway and Service Pathway such as
Color Copy, Reprint Saved Jobs, Workflow Scanning, E-mail, Internet Fax and Fax.
Authentication is used to verify that a user accessing the device is a valid user. The user's
authentication details are verified either remotely by a network authentication server, locally by an
internal database on the device, or by a card reader or authentication solution with the Xerox Secure
Access feature.
Users will be asked to provide a User Name and Password to be validated by the designated
authentication server. If this validation is successful, the options which were previously locked will be
available for individual use.
There are four Authentication options:
Remotely on the Network - The System Administrator can select one of these environments to
provide network authentication:
Kerberos (Solaris)
Kerberos (Windows 2000/2003)
NDS (Novell)
SMB (Windows 2000/2003).
LDAP (Lightweight Directory Access Protocol).
Locally on the Device - The System Administrator defines users with Username and Password,
using a web browser, allowing users to authenticate to the system and use restricted services.
Xerox Secure Access - For information on this type of authentication, refer to
on page 317.
CAC (Common Access Card)/PIV (Personal Identification Verification) - For information on this
type of authentication, please refer to the CAC guide supplied with your device.
Administrators who choose to enable authentication locally are required to configure user accounts in
the User Information Database (Properties > Security > User Information Database > Setup), refer
to
User Information Database
on page 161.
Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790
Xerox Secure Access
System Administrator Guide
7
143

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents