Xerox 4260s 用户指南

下载
页码 232
11
Setups 
Xerox WorkCentre 4260 User Guide
191
Security Settings
Image Overwrite Security protects against unauthorized retrieval of confidential 
data from the machine by removing image data that is left when jobs are 
processed.
Tools > Security Settings
Authentication
Administrators can configure the machine so that Users must be authenticated 
and authorized before they can access specific services or areas. When LDAP is 
configured, the machine can automatically retrieve the authenticated User 's e-
mail address.
No Authentication 
When no authentication services are enabled users can access features without 
restriction. Open Authentication is the default configuration for the machine.
Network Authentication
Authentication is used to verify that a User accessing the machine is a valid User. 
The User 's authentication details are verified either remotely by a network 
authentication server, locally by an internal database stored in the machine.
The Administrator can select one of these environments to provide network 
authentication:
Kerberos (Unix, Linux)
Kerberos (Windows ADS)
SMB (Windows NT 4)
SMB (Windows ADS)
LDAP (Lightweight Directory Application Protocol)
Local Authentication
The System Administrator can set up a list of user accounts that are defined locally 
on the machine. 
Guest Access
The System Administrator can define a passcode which users enter at the machine 
to gain access. Guest Access can be enabled with Network Authentication. Users 
then have the option to enter their Username or the guest account at the machine.