Samsung SL-M4080FX 用户手册
Machine setup
243
12. Menu Overview and Advanced Features
Authentication
•
Method
-
-
Local Authentication: Executes
authentification process based on the user
information stored at HDD in the device.
authentification process based on the user
information stored at HDD in the device.
-
Standard Accounting Only: Allows users to
login by entering ID and password.
login by entering ID and password.
-
SyncThru Provider: Executes authentication
process based on the user information allocated
from SyncThru™ Web Service.
process based on the user information allocated
from SyncThru™ Web Service.
-
Kerberos and Local Authentication: Executes
authentication process based on the user
information stored at kerberos server.
authentication process based on the user
information stored at kerberos server.
-
LDAP and Local Authentication: Executes
authentication process based on the user
information stored at LDAP server.
authentication process based on the user
information stored at LDAP server.
-
SMB and Local Authentication: Executes
authentication process based on the user
information stored at SMB server.
authentication process based on the user
information stored at SMB server.
•
LUI Login Screen: Provides Pre-Installed-For-
LUI, by default.
LUI, by default.
•
SWS Login Screen: Provides Pre-Installed-For
SyncThru™ Web Service, by default.
SyncThru™ Web Service, by default.
•
Options
: Select what to require for the user to
login
-
Auto Logout: You can use auto logout.
-
Seconds: You can set the auto logout time.
-
Login Identification: You can select the
login Identification type.
login Identification type.
-
Login Restriction: You can set the Login
Restriction time, attemp, or lock-out time.
Restriction time, attemp, or lock-out time.
-
Logout Policy: You can set the logout policy.
Option
Description
HTTPS
Select Off to disable HTTPS.
IPSec
Select Off to disable IPSec.
802.1x
You can enable 802.1x authentication, which is a port-
based authentication. If this authentication is enabled,
the machine is not allowed to access through the
protected side of the network until the machine is
authorized. Use this feature to protect your network.
based authentication. If this authentication is enabled,
the machine is not allowed to access through the
protected side of the network until the machine is
authorized. Use this feature to protect your network.
•
EAP-MD5: Offers minimal security. The MD5 hash
function is vulnerable to dictionary attacks, and
does not support key generation.
function is vulnerable to dictionary attacks, and
does not support key generation.
•
PEAP: Recommended for users who only intend to
use Microsoft desktop clients and servers. For other
users, it is not recommended.
use Microsoft desktop clients and servers. For other
users, it is not recommended.
•
EAP-MSCHAPv2: EAP-MSCHAPv2 provides two-
way authentication between peers by combining a
peer Challenge message with the Response packet
and an authenticator Response message on the
Success packet.
way authentication between peers by combining a
peer Challenge message with the Response packet
and an authenticator Response message on the
Success packet.
•
TLS: This is used to provide secure communication
over the Internet between a client and server.
over the Internet between a client and server.
Option
Description