Xerox WorkCentre 7345 User Manual
Here you can view all the pages of manual Xerox WorkCentre 7345 User Manual. The Xerox manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 181
169 Security – Authentication Overview Users Controlled by Authentication Authenticated Users These are users who are registered with the machine. When using a restricted service, authenticated users are prompted to type their user IDs on the authentication screen. Guest Users These are users who are permitted to use the machine using the Guest password set by the System Administrator. Authentication Configuration and related Types No Login Required – Users can access any service without restriction....
Page 182
170 Services Managed by User ID Authentication The services that can be managed by user ID authentication vary depending on the selected Authentication mode. The following tables provide a summary of these managed services for each mode. When Local Machine Access is enabled When Network Access is enabled When Remote Access is enabled ServiceManageable by Authentication? Copy Yes Print Yes Charge Print, Private Print Yes Scan Service Yes Fax, iFAX Yes Direct Fax Yes Report/List No ServiceManageable by...
Page 183
171 Effects of Authentication on Job Flow Sheets and Mailboxes When Login to Local Accounts is enabled, even if authentication is not enabled for the copy, fax, scan, or print services, authentication will be required for mailbox and job flow sheet operations. For full details on the effects of Authentication on Job Flow Sheets and Mailboxes, refer to that topic in the Device’s User Guide. Configuring Local machine authentication When Login to Local Accounts is enabled, the System Administrator can...
Page 184
172 Configuring Remote Authentication When Login to Remote Accounts is enabled, users of the device will be asked to provide a user name and password to be validated by the designated authentication server. If this validation is successful, the machine and any restricted services will be available for individual use. Preparations: 1. Ensure the machine is fully functional on the network. 2. Ensure that the TCP/IP, with DNS/WINS enabled, and HTTP protocols are configured on the device and fully...
Page 185
173 Configure Remote Authentication for Kerberos (Windows 2000) At your Workstation: 1. With the Authentication Configuration web page still running, click Configure next to the server you wish to use for Authentication. If not still running, perform steps 2 and 3 below. 2. If the web page is not still running, open your Web browser and enter the TCP/IP address of the machine in the Address or Location field. Press Enter. 3. Click the Properties tab and return to the Security folder. 4. Select the...
Page 186
174 Configure Remote Authentication for Kerberos (Solaris) At Your Workstation: 1. With the Authentication Configuration web page still running, click Configure next to the server you wish to use for Authentication. If not still running, perform steps 2 and 3 below. 2. If the web page is not still running, open your Web browser and enter the TCP/IP address of the machine in the Address or Location field. Press Enter. 3. Click the Properties tab and return to the Security folder. 4. Select the Remote...
Page 187
175 Configure Remote Authentication for SMB At Your Workstation: 1. With the Authentication Configuration web page still running, click Configure next to the server you wish to use for Authentication. If not still running, perform steps 2 and 3 below. 2. If the web page is not still running, open your Web browser and enter the TCP/IP address of the machine in the Address or Location field. Press Enter. 3. Click the Properties tab and return to the Security folder. 4. Select the Remote Authentication...
Page 188
176 Configure Remote Authentication for LDAP Refer to your LDAP server documentation for the full range of information that can be entered into this LDAP dialog to fully support both E-mail applications and authentication using your LDAP server. The path to the LDAP dialog is as follows: At Your Workstation: 1. With the Authentication Configuration web page still running, click Configure next to the server you wish to use for Authentication. If not still running, perform steps 2 and 3 below. 2. If the...
Page 189
177 12. Enter your required number for Maximum Number of Search Results. This is the maximum number of addresses that will appear which match the search criteria selected by the user. 13. Enter the required time to wait for Search Time-Out. Alternatively, you may select Wait LDAP Server Limit. 14. Place a checkmark in the Referral box if you would like the server to refer to additional LDAP servers, when user information is initially unavailable. 15. If using Referral, enter the number of additional...
Page 190
178 Configuring Network Authentication (by a Remote Accounting server) Network authentication uses the user information managed on a remote Accounting server to manage authentication (access) to available machine services. Enable Network Authentication To enable Network Authentication for use with this Device, at your networked workstation, perform the following steps: 1. Open your Web browser and enter the TCP/IP address of the machine in the Address or Location field. Press Enter. 2. Click the...