Embedded Web Server Administrator's Guide
Page 3
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
Embedded Web Server Administrator's Guide
Page 5
...Authentication is the method by Lexmark to enable administrators to build secure, flexible profiles that identifies who know the password or PIN are an innovative new tool developed by which functions those users holding appropriate credentials. This type of a printer-to anyone who enters the... users can not be individually identified, passwords and PINs are ). Authentication, Authorization, and Groups-to define who is allowed to use the printer, and which a system securely identifies a user (that is, who you are considered less secure than other public area of a business,...
...Authentication is the method by Lexmark to enable administrators to build secure, flexible profiles that identifies who know the password or PIN are an innovative new tool developed by which functions those users holding appropriate credentials. This type of a printer-to anyone who enters the... users can not be individually identified, passwords and PINs are ). Authentication, Authorization, and Groups-to define who is allowed to use the printer, and which a system securely identifies a user (that is, who you are considered less secure than other public area of a business,...
Embedded Web Server Administrator's Guide
Page 6
...needing access to create a "Warehouse" group, and a "Sales and Marketing" group. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can designate up to 140 security templates, allowing administrators to create very specific profiles-or roles-for ... or certain building blocks paired with no security enabled. The number of individual Access Controls and what they need to print in color, but in different groups needing access to only authorized users. Individually, building blocks, groups, and access controls may not meet the...
...needing access to create a "Warehouse" group, and a "Sales and Marketing" group. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can designate up to 140 security templates, allowing administrators to create very specific profiles-or roles-for ... or certain building blocks paired with no security enabled. The number of individual Access Controls and what they need to print in color, but in different groups needing access to only authorized users. Individually, building blocks, groups, and access controls may not meet the...
Embedded Web Server Administrator's Guide
Page 9
...determine the information an administrator must have a unique name. • Administrators can create up to 32 user-defined groups that relies on the printer control panel. Note: A Search Base consists of databases without special integration, making it can store a maximum of the LDAP server where the... Setup. 4 The LDAP Server Setup dialog is used by commas. Using security features in the event of an outage that prevents the printer from communicating with any form of authentication that apply to each unique LDAP configuration. • As with the authenticating server. • ...
...determine the information an administrator must have a unique name. • Administrators can create up to 32 user-defined groups that relies on the printer control panel. Note: A Search Base consists of databases without special integration, making it can store a maximum of the LDAP server where the... Setup. 4 The LDAP Server Setup dialog is used by commas. Using security features in the event of an outage that prevents the printer from communicating with any form of authentication that apply to each unique LDAP configuration. • As with the authenticating server. • ...
Embedded Web Server Administrator's Guide
Page 11
... name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by selecting Log out on the printer control panel. Each configuration must have a unique name. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to...
... name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by selecting Log out on the printer control panel. Each configuration must have a unique name. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to...
Embedded Web Server Administrator's Guide
Page 13
... will automatically test the krb5.conf file to verify that it can be used by selecting Log out on a supported device, that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to...specify a default realm. While only one krb5.conf file is used, uploading or re-submitting a simple Kerberos file will not be stored on the printer control panel. However, if a realm is not specified in conjunction with the LDAP +GSSAPI building block. Using security features in the event of ...
... will automatically test the krb5.conf file to verify that it can be used by selecting Log out on a supported device, that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to...specify a default realm. While only one krb5.conf file is used, uploading or re-submitting a simple Kerberos file will not be stored on the printer control panel. However, if a realm is not specified in conjunction with the LDAP +GSSAPI building block. Using security features in the event of ...
Embedded Web Server Administrator's Guide
Page 14
... on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from the Time Zone list will require configuration of additional settings under Custom Time Zone Setup. 3 If Daylight Saving Time (DST) ...Microsoft's solution for enabling authentication without requiring the transmission of authentication that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be deleted or unregistered if it is being used by selecting Log out on a supported device because each session by the ...
... on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from the Time Zone list will require configuration of additional settings under Custom Time Zone Setup. 3 If Daylight Saving Time (DST) ...Microsoft's solution for enabling authentication without requiring the transmission of authentication that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be deleted or unregistered if it is being used by selecting Log out on a supported device because each session by the ...
Embedded Web Server Administrator's Guide
Page 16
...long a user may be assigned to each function you want to protect, select a password or PIN from the drop-down list for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª...4 Click Submit to save changes, or Reset Form to the name of building block, see the relevant section(s) under "Configuring building blocks" on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit Access Controls,...
...long a user may be assigned to each function you want to protect, select a password or PIN from the drop-down list for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª...4 Click Submit to save changes, or Reset Form to the name of building block, see the relevant section(s) under "Configuring building blocks" on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit Access Controls,...
Embedded Web Server Administrator's Guide
Page 17
... to select multiple groups. 8 Click Save Template. Using security features in order to gain access to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use a descriptive name, such as necessary. 5 Click...
... to select multiple groups. 8 Click Save Template. Using security features in order to gain access to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use a descriptive name, such as necessary. 5 Click...
Embedded Web Server Administrator's Guide
Page 18
... click Delete Entry in use can be required to enter the correct code in the Embedded Web Server 18 Scenarios Scenario: Printer in a public place If your printer is that anyone who knows a password or PIN can provide simple protection right at the device. Step One: Create ...Two: Assign a password or PIN to each access control After creating one is located in use ; Scenario: Standalone or small office If your printer is selected. For more codes, determine which one or more information on configuring individual user accounts, see the relevant section(s) under "Configuring building...
... click Delete Entry in use can be required to enter the correct code in the Embedded Web Server 18 Scenarios Scenario: Printer in a public place If your printer is that anyone who knows a password or PIN can provide simple protection right at the device. Step One: Create ...Two: Assign a password or PIN to each access control After creating one is located in use ; Scenario: Standalone or small office If your printer is selected. For more codes, determine which one or more information on configuring individual user accounts, see the relevant section(s) under "Configuring building...
Embedded Web Server Administrator's Guide
Page 19
... running Active Directory On networks running Active Directory, administrators can be required to enter the appropriate credentials in order to gain access to the printer Using security features in the security template. This list will now be helpful to use a descriptive name, such as "Administrator _ Only",...can be populated with Active Directory, you want to protect, select a security template from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web ...
... running Active Directory On networks running Active Directory, administrators can be required to enter the appropriate credentials in order to gain access to the printer Using security features in the security template. This list will now be helpful to use a descriptive name, such as "Administrator _ Only",...can be populated with Active Directory, you want to protect, select a security template from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web ...
Embedded Web Server Administrator's Guide
Page 20
... the Security Templates Name field, type a unique name containing up to 32 groups stored on the LDAP server which will be searched for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
... the Security Templates Name field, type a unique name containing up to 32 groups stored on the LDAP server which will be searched for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
Embedded Web Server Administrator's Guide
Page 21
...: Leave this field blank to use the IPv4 address (128-character maximum). 5 Click Generate New Certificate . The details of information transmitted to and from your printer, including authentication and group information, as well as document outputs. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the...
...: Leave this field blank to use the IPv4 address (128-character maximum). 5 Click Generate New Certificate . The details of information transmitted to and from your printer, including authentication and group information, as well as document outputs. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the...
Embedded Web Server Administrator's Guide
Page 24
...Entry again to confirm. Note: On some devices the button will be turned on only at the device (not through the configuration menus until the printer status bar reaches %100. After the disk has been encrypted, you will appear as "Exit Config Menu." 4 Press the down menus). •... takes approximately two minutes, and a status bar will appear in the drop-down arrow to scroll through the Embedded Web Server). 1 Turn off the printer during the encryption process. • Select No to cancel and return to the Enable/Disable screen. 8 To finish, press Back, and then Exit ...
...Entry again to confirm. Note: On some devices the button will be turned on only at the device (not through the configuration menus until the printer status bar reaches %100. After the disk has been encrypted, you will appear as "Exit Config Menu." 4 Press the down menus). •... takes approximately two minutes, and a status bar will appear in the drop-down arrow to scroll through the Embedded Web Server). 1 Turn off the printer during the encryption process. • Select No to cancel and return to the Enable/Disable screen. 8 To finish, press Back, and then Exit ...
Embedded Web Server Administrator's Guide
Page 25
... Submit to save changes, or Reset Form to normal operating mode. The chosen severity level and anything higher will power-on the destination server. The printer will be logged (e.g. E-mail server setup 1 From the Security Audit Log main screen, select Setup E-mail Server. 2 Under SMTP Setup, type the IP address or...
... Submit to save changes, or Reset Form to normal operating mode. The chosen severity level and anything higher will power-on the destination server. The printer will be logged (e.g. E-mail server setup 1 From the Security Audit Log main screen, select Setup E-mail Server. 2 Under SMTP Setup, type the IP address or...
Embedded Web Server Administrator's Guide
Page 26
...Use Session E-mail address and Password, or Prompt user if authentication is 30 seconds. 6 To receive responses to messages sent from the printer (in order to each applicable protocol. For more information on configuring digital certificates, see "Managing certificates" on page 21. 1 From the... to establish a secure connection to the authentication server, you want to use to require verification of the security certificate on the printer before timing out. Using security features in to the authentication server. • Select the Validate Server Certificate check box to log...
...Use Session E-mail address and Password, or Prompt user if authentication is 30 seconds. 6 To receive responses to messages sent from the printer (in order to each applicable protocol. For more information on configuring digital certificates, see "Managing certificates" on page 21. 1 From the... to establish a secure connection to the authentication server, you want to use to require verification of the security certificate on the printer before timing out. Using security features in to the authentication server. • Select the Validate Server Certificate check box to log...
Embedded Web Server Administrator's Guide
Page 27
...SNMP. 2 Click Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to Settings ª Security ª SNMP. 2 Under SNMP Version ...used in network management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. SNMP Version 1, 2c 1 From the Embedded Web Server ...
...SNMP. 2 Click Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to Settings ª Security ª SNMP. 2 Under SNMP Version ...used in network management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. SNMP Version 1, 2c 1 From the Embedded Web Server ...
Embedded Web Server Administrator's Guide
Page 29
... to FTP function Protects access to the Held Jobs function Protects access to the Manage Shortcuts section of the Settings menu on the printer control panel Protects access to the Manage Shortcuts item of Access Controls Depending on device type and installed options, some Access Controls ...(referred to use the Color Dropout feature for your printer. Appendix Menu of the Settings menu from the Embedded Web Server Appendix 29 Controls the ability to create new bookmarks from...
... to FTP function Protects access to the Held Jobs function Protects access to the Manage Shortcuts section of the Settings menu on the printer control panel Protects access to the Manage Shortcuts item of Access Controls Depending on device type and installed options, some Access Controls ...(referred to use the Color Dropout feature for your printer. Appendix Menu of the Settings menu from the Embedded Web Server Appendix 29 Controls the ability to create new bookmarks from...
Embedded Web Server Administrator's Guide
Page 30
...access to the Operator Panel Lock. When protected, no longer possible to release (print) Held Faxes. Certificate Management is no printer configuration setting can be altered except through Solution 10 Access Controls can be assigned to installed eSF applications and/or profiles created ... applies only when an Option Card with configuration options is assigned in the creation or configuration of the Settings menu from the printer control panel Protects access to the Paper menu from the Embedded Web Server The Solution 1 through a secured communication channel (such...
...access to the Operator Panel Lock. When protected, no longer possible to release (print) Held Faxes. Certificate Management is no printer configuration setting can be altered except through Solution 10 Access Controls can be assigned to installed eSF applications and/or profiles created ... applies only when an Option Card with configuration options is assigned in the creation or configuration of the Settings menu from the printer control panel Protects access to the Paper menu from the Embedded Web Server The Solution 1 through a secured communication channel (such...
Embedded Web Server Administrator's Guide
Page 31
Function Access Control Supplies Menu at the Device Supplies Menu Remotely User Profiles Web Import/Export Settings What it does Protects access to the Supplies menu from the printer control panel Protects access to the Supplies menu from the Embedded Web Server Controls access to Profiles, such as scanning shortcuts, workflows, or eSF applications Controls the ability to import and export printer settings files (UCF files) from the Embedded Web Server Appendix 31
Function Access Control Supplies Menu at the Device Supplies Menu Remotely User Profiles Web Import/Export Settings What it does Protects access to the Supplies menu from the printer control panel Protects access to the Supplies menu from the Embedded Web Server Controls access to Profiles, such as scanning shortcuts, workflows, or eSF applications Controls the ability to import and export printer settings files (UCF files) from the Embedded Web Server Appendix 31