Xerox 4260s 用户指南
11
Setups
Xerox WorkCentre 4260 User Guide
191
Security Settings
Image Overwrite Security protects against unauthorized retrieval of confidential
data from the machine by removing image data that is left when jobs are
processed.
data from the machine by removing image data that is left when jobs are
processed.
Tools > Security Settings
Authentication
Administrators can configure the machine so that Users must be authenticated
and authorized before they can access specific services or areas. When LDAP is
configured, the machine can automatically retrieve the authenticated User 's e-
mail address.
and authorized before they can access specific services or areas. When LDAP is
configured, the machine can automatically retrieve the authenticated User 's e-
mail address.
No Authentication
When no authentication services are enabled users can access features without
restriction. Open Authentication is the default configuration for the machine.
restriction. Open Authentication is the default configuration for the machine.
Network Authentication
Authentication is used to verify that a User accessing the machine is a valid User.
The User 's authentication details are verified either remotely by a network
authentication server, locally by an internal database stored in the machine.
The User 's authentication details are verified either remotely by a network
authentication server, locally by an internal database stored in the machine.
The Administrator can select one of these environments to provide network
authentication:
authentication:
•
Kerberos (Unix, Linux)
•
Kerberos (Windows ADS)
•
SMB (Windows NT 4)
•
SMB (Windows ADS)
•
LDAP (Lightweight Directory Application Protocol)
Local Authentication
The System Administrator can set up a list of user accounts that are defined locally
on the machine.
on the machine.
Guest Access
The System Administrator can define a passcode which users enter at the machine
to gain access. Guest Access can be enabled with Network Authentication. Users
then have the option to enter their Username or the guest account at the machine.
to gain access. Guest Access can be enabled with Network Authentication. Users
then have the option to enter their Username or the guest account at the machine.