Xerox WorkCentre 5755 Manual
Here you can view all the pages of manual Xerox WorkCentre 5755 Manual. The Xerox manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 161
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide161 6. In the Authentication Server page, select [LDAP] from the Authentication Type drop-down menu and click on the [Add New] button. 7. To configure LDAP, refer to LDAP on page 115. a. When you have configured LDAP settings, click on the [Save] button to return to the Authentication Configuration: LDAP page. b. Click on the [Save] button and return to the Xerox Access Setup page. 8. To set Authentication to control access to...
Page 162
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 162 •In the Accounting Administrator Access [Access Group] field, enter the name of a group, defined at the LDAP server, that you want to provide with accounting administrator access to the device. b. To verify either group, enter a name of one of the members of the LDAP server group in the [User Name box], then click on the [Test] button. Under the Test Results column, it will display Access. If the test result displays No...
Page 163
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide163 If using this method, you can only determine the User Role. You can not control individual user access to items. If authentication is successful, then the user will have access to all locked items (except System Administrator items, unless they are a System Administrator). Note:If users are created locally on the device using the User Information Database, those users will be authenticated only if the Authentication...
Page 164
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 164 Xerox Secure Access System Administrators can configure the device so that users must be authenticated and authorized before they can access specific services or areas. Xerox Secure Access provides a means of authenticating users via an authentication server and optional card reader. For further information about Xerox Secure Access, refer to Xerox Secure Access on page 331. Information Checklist Before starting the...
Page 165
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide165 • Select [Locally on the Device] to validate users listed in the Local User Information Database. This option requires you to configure accounts in the Local User Information Database. • Select [Remotely on the Network] to validate users via an Authentication Server. This option requires you to have a server that will provide authentication of user login details. Authentication via Kerberos (Solaris, Windows 2000), NDS...
Page 166
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 166 return the accounting User ID and Account ID login. If you want the user to enter these values at the local user interface during login, select [User must manually enter accounting codes at the device]. g. Under the Device Instructional Blocking Window heading, enter text in the [Window Title] and [Instructional Text] fields to create the prompt that will be displayed on the device’s user interface informing users how to...
Page 167
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide167 8. To set Authentication to control access to individual Services, In the table displaying a list of related configuration setting pages, click on the [Edit..] button for Tools and Feature Access (Lock/Unlock). a. On the Tools & Feature Access page, in the Presets area, select either [Open Access] to allow all users access to all pathways and features or [Custom Access] and lock or unlock the various pathways and features as...
Page 169
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide169 8Security This chapter describes how to configure the following Security features for the device: •Email Encryption and Signing on page 171 •FIPS 140-2 Encryption on page 172 •User Data Encryption on page 173 •User Information Database on page 173 •IP Filtering on page 176 •Audit Log on page 177 •Security Certificate Management on page 179 •IP Sec on page 183 •Security Certificates on page 189 •802.1X on page 191 •System Timeout...
Page 170
Security @ Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 170 Security @ Xerox For the latest information on securely installing, setting up and operating your device see the Xerox Security Information website located at www.xerox.com/security.