Xerox ColorQube 9201/9202/9203 Administrator's Guide
Xerox Secure Access
Xerox ColorQube™ 9201/9202/9203
System Administrator Guide
System Administrator Guide
302
LDAP server (the user names must match so that the device can cross reference each user as they
log in at the device).
log in at the device).
Access Authentication Configuration
1.
At your Workstation, open the web browser and enter the IP address of the device in the Address
bar, and press [Enter].
bar, and press [Enter].
2.
Click on the [Properties] tab.
3.
If prompted, enter the Administrator User ID and Password. The default is [admin] and [1111].
4.
Click on the [Login] button.
5.
Click on the [Security] link.
6.
Click on the [Access Rights] link.
7.
Select [Setup] in the directory tree to access Authentication Configuration screen.
8.
In Current Configuration area, click on the [Edit Methods] for Authentication.
9.
In Where is the information located? area:
a.
Select [Xerox Secure Access] from the Device User Interface Authentication drop-down
menu.
menu.
b.
Select your required option from the Web User Interface Authentication drop-down menu.
When a user attempts to access Internet Services they are prompted to enter their login
information. The option selected from the web user interface Authentication menu defines
how the device will validate the user's rights to access Internet Services. This is required
because if the user normally authenticates at the device with a card reader, there would be
no method for the device to authenticate users who access Internet Services from their
workstations.
When a user attempts to access Internet Services they are prompted to enter their login
information. The option selected from the web user interface Authentication menu defines
how the device will validate the user's rights to access Internet Services. This is required
because if the user normally authenticates at the device with a card reader, there would be
no method for the device to authenticate users who access Internet Services from their
workstations.
•
Select [Locally on the Device] to validate users listed in the Local User Information
Database. This option requires you to configure accounts in the Local User Information
Database.
Database. This option requires you to configure accounts in the Local User Information
Database.
•
Select [Remotely on the Network] to validate users via an Authentication Server. This
option requires you to have a server that will provide authentication of user login details.
Authentication via Kerberos (Solaris, Windows 2000/2003), SMB (Windows NT4/2000)
or LDAP is supported.
option requires you to have a server that will provide authentication of user login details.
Authentication via Kerberos (Solaris, Windows 2000/2003), SMB (Windows NT4/2000)
or LDAP is supported.
c.
Select the Authorization method in the Authorization drop-down menu. The card reader and
Authentication Solution authenticates (validates) the user. The Authorization method
determines which areas of the device a user is allowed to access.
There are two options:
Authentication Solution authenticates (validates) the user. The Authorization method
determines which areas of the device a user is allowed to access.
There are two options:
•
Select [Locally on the Device]: if you want the device to check the Local User
Information Database for levels of authorization.
Information Database for levels of authorization.
•
Select [Remotely on the Network]: if you want to use networked databases such as
LDAP server to determine levels of authorization.
LDAP server to determine levels of authorization.
d.
For Personalization, check the [Automatically retrieve the following information for the
authenticated user from LDAP: Home directory for the ‘Scan to Home’ service. E-mail
address for the ‘E-mail’ and ‘Internet Fax’ services.] checkbox if required.
authenticated user from LDAP: Home directory for the ‘Scan to Home’ service. E-mail
address for the ‘E-mail’ and ‘Internet Fax’ services.] checkbox if required.
e.
Click on the [Save] button to return to the Authentication Configuration screen.