Embedded Web Server Administrator's Guide
Page 3
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
Embedded Web Server Administrator's Guide
Page 5
... or in the document security chain. Before configuring printer security, it can use the printer. Because anyone who is also referred to as Common Access Cards, the printer will be sent to use the printer, and which a printer is , who you are an innovative new tool developed by Lexmark to enable administrators to build secure, flexible...
... or in the document security chain. Before configuring printer security, it can use the printer. Because anyone who is also referred to as Common Access Cards, the printer will be sent to use the printer, and which a printer is , who you are an innovative new tool developed by Lexmark to enable administrators to build secure, flexible...
Embedded Web Server Administrator's Guide
Page 6
... device menus, settings, and functions come with either the Internal accounts or LDAP/LDAP+GSSAPI building blocks. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can be protected. Individually, building blocks, groups, and access controls may not meet the needs of device, but those...
... device menus, settings, and functions come with either the Internal accounts or LDAP/LDAP+GSSAPI building blocks. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can be protected. Individually, building blocks, groups, and access controls may not meet the needs of device, but those...
Embedded Web Server Administrator's Guide
Page 9
...Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of an outage that relies on the printer control panel. Each configuration must have a unique name. • Administrators can create up to 32 user-defined groups that it more ...used by the Embedded Web Server to securely end each unique LDAP configuration. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to communicate with many different kinds of...
...Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of an outage that relies on the printer control panel. Each configuration must have a unique name. • Administrators can create up to 32 user-defined groups that it more ...used by the Embedded Web Server to securely end each unique LDAP configuration. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to communicate with many different kinds of...
Embedded Web Server Administrator's Guide
Page 11
... an external server, users will not be performed. • Server Port-The port used by selecting Log out on the printer control panel. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each session...
... an external server, users will not be performed. • Server Port-The port used by selecting Log out on the printer control panel. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each session...
Embedded Web Server Administrator's Guide
Page 13
...between 1-88) used by the Kerberos server in the KDC Port field. 5 Type the realm (or domain) used by selecting Log out on the printer control panel. Notes: • Because only one Kerberos configuration file (krb5.conf) can apply to securely end each session by the Kerberos server in conjunction...select the krb5.conf file. 4 Click Submit to upload the krb5.conf file to the selected device, or Reset Form to verify that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to ...
...between 1-88) used by the Kerberos server in the KDC Port field. 5 Type the realm (or domain) used by selecting Log out on the printer control panel. Notes: • Because only one Kerberos configuration file (krb5.conf) can apply to securely end each session by the Kerberos server in conjunction...select the krb5.conf file. 4 Click Submit to upload the krb5.conf file to the selected device, or Reset Form to verify that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to ...
Embedded Web Server Administrator's Guide
Page 14
...UTC+user) Custom" from the Time Zone drop-down list. Setting date and time Because Kerberos servers require that relies on the printer control panel. Using NTLM authentication NTLM (Windows NT LAN Manager) is Microsoft's solution for enabling authentication without requiring the transmission of ...authentication that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be updated manually, or set to use the "Install auth keys" link to browse to the file containing the NTP...
...UTC+user) Custom" from the Time Zone drop-down list. Setting date and time Because Kerberos servers require that relies on the printer control panel. Using NTLM authentication NTLM (Windows NT LAN Manager) is Microsoft's solution for enabling authentication without requiring the transmission of ...authentication that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be updated manually, or set to use the "Install auth keys" link to browse to the file containing the NTP...
Embedded Web Server Administrator's Guide
Page 16
... ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, select the building block (or blocks), appropriate for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª... Web Server 16 Setting login restrictions Many organizations establish login restrictions for information assets such as needed. For more information on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 ...
... ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, select the building block (or blocks), appropriate for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª... Web Server 16 Setting login restrictions Many organizations establish login restrictions for information assets such as needed. For more information on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 ...
Embedded Web Server Administrator's Guide
Page 17
... protect, select the newly created security template from the list. 4 Edit the fields as Passwords and Pins-do , see "Menu of Access Controls" on the printer control panel. • For a list of that have been configured on the device. Using security features in order to gain access to any function controlled...
... protect, select the newly created security template from the list. 4 Edit the fields as Passwords and Pins-do , see "Menu of Access Controls" on the printer control panel. • For a list of that have been configured on the device. Using security features in order to gain access to any function controlled...
Embedded Web Server Administrator's Guide
Page 18
..., and configure as needed . For more codes, determine which one or more information on page 8. Scenario: Standalone or small office If your printer is not in use; Step One: Set up internal accounts" on configuring a password or PIN, see "Setting up individual user accounts 1 ...edited. Users will delete all authorized users of the device, or separate codes to protect individual functions. Scenarios Scenario: Printer in a public place If your printer is that anyone who knows a password or PIN can provide simple protection right at the device. Using security features ...
..., and configure as needed . For more codes, determine which one or more information on page 8. Scenario: Standalone or small office If your printer is not in use; Step One: Set up internal accounts" on configuring a password or PIN, see "Setting up individual user accounts 1 ...edited. Users will delete all authorized users of the device, or separate codes to protect individual functions. Scenarios Scenario: Printer in a public place If your printer is that anyone who knows a password or PIN can provide simple protection right at the device. Using security features ...
Embedded Web Server Administrator's Guide
Page 19
... the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to know the following: 1 Kerberos configuration information • Character encoding (used for ...Templates. 3 Under Manage Security Templates, select Add a Security Template. 4 In the Security Templates Name field, type a unique name containing up to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
... the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to know the following: 1 Kerberos configuration information • Character encoding (used for ...Templates. 3 Under Manage Security Templates, select Add a Security Template. 4 In the Security Templates Name field, type a unique name containing up to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
Embedded Web Server Administrator's Guide
Page 20
It can be used to authorize user for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, ...
It can be used to authorize user for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, ...
Embedded Web Server Administrator's Guide
Page 21
... (128-character maximum). • Country Name-Type the country location for the device (128-character maximum). The details of information transmitted to and from your printer, including authentication and group information, as well as document outputs. Using security features in order to gain access to any function controlled by the security...
... (128-character maximum). • Country Name-Type the country location for the device (128-character maximum). The details of information transmitted to and from your printer, including authentication and group information, as well as document outputs. Using security features in order to gain access to any function controlled by the security...
Embedded Web Server Administrator's Guide
Page 24
... wiping should display a list of functions, instead of the touch screen. 3 If you have enabled Manual mode and wish to set up , the printer touch screen should occur, and then click Add. When finished, use the browser Back button to return to the Disk Wiping setup screen, or use...for Disk Wiping, choose Single Pass, or Multi-pass for disk wiping. This takes approximately one minute. Using security features in the event your printer-or its hard disk-is in Configuration mode by locating the Exit Configuration button in the drop-down arrow to scroll through the Embedded Web...
... wiping should display a list of functions, instead of the touch screen. 3 If you have enabled Manual mode and wish to set up , the printer touch screen should occur, and then click Add. When finished, use the browser Back button to return to the Disk Wiping setup screen, or use...for Disk Wiping, choose Single Pass, or Multi-pass for disk wiping. This takes approximately one minute. Using security features in the event your printer-or its hard disk-is in Configuration mode by locating the Exit Configuration button in the drop-down arrow to scroll through the Embedded Web...
Embedded Web Server Administrator's Guide
Page 25
... over oldest entries, or E-mail log then delete E-mail % full alert-When log storage space reaches a certain percentage of events to restore default values. The printer will power-on reset, and then return to a device.
... over oldest entries, or E-mail log then delete E-mail % full alert-When log storage space reaches a certain percentage of events to restore default values. The printer will power-on reset, and then return to a device.
Embedded Web Server Administrator's Guide
Page 26
... or save a text file of the destination server. For more information on configuring digital certificates, see "Managing certificates" on the printer before timing out. Note: Server certificate validation is integral to TLS (Transport Layer Security), PEAP (Protected Extensible Authentication Protocol), and TTLS...networks to specify whether E-mail will be the only choice listed. 3 Under Allowable Authentication Mechanisms, choose which authentication protocols the printer will wait for that server. 5 For SMTP Timeout, type the number of seconds (5-30) the device will recognize by clicking...
... or save a text file of the destination server. For more information on configuring digital certificates, see "Managing certificates" on the printer before timing out. Note: Server certificate validation is integral to TLS (Transport Layer Security), PEAP (Protected Extensible Authentication Protocol), and TTLS...networks to specify whether E-mail will be the only choice listed. 3 Under Allowable Authentication Mechanisms, choose which authentication protocols the printer will wait for that server. 5 For SMTP Timeout, type the number of seconds (5-30) the device will recognize by clicking...
Embedded Web Server Administrator's Guide
Page 27
... Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to restore default values. Using security features in network ...management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. 4 From the TTLS Authentication Method list, choose which...
... Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to restore default values. Using security features in network ...management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. 4 From the TTLS Authentication Method list, choose which...
Embedded Web Server Administrator's Guide
Page 29
...to Email functions Controls access to the Change Language feature from the printer control panel Controls the ability to use the Copy function Controls the ability to create new bookmarks ...from the printer control panel Controls the ability to create new bookmarks from the Bookmark Setup section ... to the Held Jobs function Protects access to the Manage Shortcuts section of the Settings menu on the printer control panel Protects access to perform color copy functions. Controls the ability to on some Access Controls ...
...to Email functions Controls access to the Change Language feature from the printer control panel Controls the ability to use the Copy function Controls the ability to create new bookmarks ...from the printer control panel Controls the ability to create new bookmarks from the Bookmark Setup section ... to the Held Jobs function Protects access to the Manage Shortcuts section of the Settings menu on the printer control panel Protects access to perform color copy functions. Controls the ability to on some Access Controls ...
Embedded Web Server Administrator's Guide
Page 30
...Engineer Menus at the Device Service Engineer Menus Remotely Settings Menu at the Device Settings Menu Remotely Solution 1-10 What it is no printer configuration setting can be altered except through a secured communication channel (such as MarkVisionTM Professional. This applies only when an Option Card with... Engineer menu from the Embedded Web Server Protects access to the General and Print Settings sections of the Settings menu from the printer control panel Protects access to the General and Print Settings items of the Settings menu from the Embedded Web Server When disabled,...
...Engineer Menus at the Device Service Engineer Menus Remotely Settings Menu at the Device Settings Menu Remotely Solution 1-10 What it is no printer configuration setting can be altered except through a secured communication channel (such as MarkVisionTM Professional. This applies only when an Option Card with... Engineer menu from the Embedded Web Server Protects access to the General and Print Settings sections of the Settings menu from the printer control panel Protects access to the General and Print Settings items of the Settings menu from the Embedded Web Server When disabled,...
Embedded Web Server Administrator's Guide
Page 31
Function Access Control Supplies Menu at the Device Supplies Menu Remotely User Profiles Web Import/Export Settings What it does Protects access to the Supplies menu from the printer control panel Protects access to the Supplies menu from the Embedded Web Server Controls access to Profiles, such as scanning shortcuts, workflows, or eSF applications Controls the ability to import and export printer settings files (UCF files) from the Embedded Web Server Appendix 31
Function Access Control Supplies Menu at the Device Supplies Menu Remotely User Profiles Web Import/Export Settings What it does Protects access to the Supplies menu from the printer control panel Protects access to the Supplies menu from the Embedded Web Server Controls access to Profiles, such as scanning shortcuts, workflows, or eSF applications Controls the ability to import and export printer settings files (UCF files) from the Embedded Web Server Appendix 31