Home > Xerox > All in One Printer > Xerox WorkCentre 5755 Manual

Xerox WorkCentre 5755 Manual

Here you can view all the pages of manual Xerox WorkCentre 5755 Manual. The Xerox manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.

Page 161

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide161
6. In the Authentication Server page, select [LDAP] from the Authentication Type drop-down 
menu and click on the [Add New] button.
7. To configure LDAP, refer to LDAP on page 115.
a. When you have configured LDAP settings, click on the [Save] button to return to the 
Authentication Configuration: LDAP page.
b. Click on the [Save] button and return to the Xerox Access Setup page.
8. To set Authentication to control access to...

Page 162

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 162
•In the Accounting Administrator Access [Access Group] field, enter the name of a 
group, defined at the LDAP server, that you want to provide with accounting 
administrator access to the device. 
b. To verify either group, enter a name of one of the members of the LDAP server group in the 
[User Name box], then click on the [Test] button.
Under the Test Results column, it will display Access. If the test result displays No...

Page 163

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide163
If using this method, you can only determine the User Role. You can not control individual user access 
to items. If authentication is successful, then the user will have access to all locked items (except 
System Administrator items, unless they are a System Administrator).
Note:If users are created locally on the device using the User Information Database, those users 
will be authenticated only if the Authentication...

Page 164

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 164
Xerox Secure Access
System Administrators can configure the device so that users must be authenticated and authorized 
before they can access specific services or areas. Xerox Secure Access provides a means of 
authenticating users via an authentication server and optional card reader.
For further information about Xerox Secure Access, refer to Xerox Secure Access on page 331.
Information Checklist
Before starting the...

Page 165

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide165
• Select [Locally on the Device] to validate users listed in the Local User Information 
Database. This option requires you to configure accounts in the Local User Information 
Database.
• Select [Remotely on the Network] to validate users via an Authentication Server. This 
option requires you to have a server that will provide authentication of user login details. 
Authentication via Kerberos (Solaris, Windows 2000), NDS...

Page 166

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 166
return the accounting User ID and Account ID login. If you want the user to enter these 
values at the local user interface during login, select [User must manually enter accounting 
codes at the device].
g. Under the Device Instructional Blocking Window heading, enter text in the [Window Title] 
and [Instructional Text] fields to create the prompt that will be displayed on the device’s 
user interface informing users how to...

Page 167

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide167
8. To set Authentication to control access to individual Services, In the table displaying a list of 
related configuration setting pages, click on the [Edit..] button for Tools and Feature Access 
(Lock/Unlock).
a. On the Tools & Feature Access page, in the Presets area, select either [Open Access] to allow 
all users access to all pathways and features or [Custom Access] and lock or unlock the 
various pathways and features as...

Page 168

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 168 

Page 169

WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide169
8Security
This chapter describes how to configure the following Security features for the device:
•Email Encryption and Signing on page 171
•FIPS 140-2 Encryption on page 172
•User Data Encryption on page 173
•User Information Database on page 173
•IP Filtering on page 176
•Audit Log on page 177
•Security Certificate Management on page 179
•IP Sec on page 183
•Security Certificates on page 189
•802.1X on page 191
•System Timeout...

Page 170

Security @ Xerox
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 170
Security @ Xerox
For the latest information on securely installing, setting up and operating your device see the Xerox 
Security Information website located at www.xerox.com/security. 
Start reading Xerox WorkCentre 5755 Manual

Related Manuals for Xerox WorkCentre 5755 Manual

All Xerox manuals