vi
Preparations: .................................................................................................................................172
Configure Remote Authentication for Kerberos (Windows 2000) .................................................173
At your Workstation: ......................................................................................................................173
Configure Remote Authentication for Kerberos (Solaris) ..............................................................174
At Your Workstation:......................................................................................................................174
Configure Remote Authentication for SMB ...................................................................................175
At Your Workstation:......................................................................................................................175
Configure Remote Authentication for LDAP .................................................................................176
LDAP User Mappings ....................................................................................................................177
LDAP Authentication......................................................................................................................177
LDAP Group Access......................................................................................................................177
Custom Filters................................................................................................................................177
Configuring Network Authentication (by a Remote Accounting server) ............................................178
Enable Network Authentication......................................................................................................178
Configure communications between the Accounting server and the device ................................179
Enable the Accounting option in workstation print drivers ............................................................180
Configuring Xerox Secure Access (Authentication) ..........................................................................181
Secure Access and Accounting.....................................................................................................181
Information Checklist .....................................................................................................................181
Configuring Xerox Secure Access to work with Remote Authentication .......................................182
Configure Remote Authentication for Kerberos (Windows 2000) .................................................183
Configure Remote Authentication for Kerberos (Solaris) ..............................................................184
Configure Remote Authentication for SMB ...................................................................................185
Configure Remote Authentication for LDAP .................................................................................186
Enable Specific Xerox Secure Access Settings ............................................................................188
Using Secure Access.....................................................................................................................189
Configure Color Copy Access for LDAP Group ............................................................................190
LDAP Authentication .....................................................................................................................191
LDAP Group Access......................................................................................................................191
802.1X Authentication .......................................................................................................................193
Information Checklist .....................................................................................................................193
Configure 802.1X with Internet Services .......................................................................................193
Security – Encryption ........................................................................................................................194
Encryption Service Overview ............................................................................................................194
Types of Encryption Services Available.........................................................................................194
Configuration of HTTPS (SSL/TLS) Communication Encryption ......................................................196
Installation Overview......................................................................................................................196
Configuring certificates with CentreWare Internet Services .........................................................197
Configuration on a Computer ........................................................................................................198
Configuration of E-mail Encryption/Digital Signature ........................................................................199
Installation Overview......................................................................................................................199
Configuring S/MIME certificates with CentreWare Internet Services ............................................200
Configuration on a Computer ........................................................................................................203
Configuration of Scan File Signatures (PDF/XPS Documents).........................................................204
Installation Overview......................................................................................................................204
Configuring Scan File certificates with CentreWare Internet Services .........................................205
Configuration on a Computer ...................................................................................................
.....207
IP Sec................................................................................................................................................208
To enable IP Sec: ..........................................................................................................................208
Scheduled Image Overwrite ..............................................................................................................209
Security – Secure Watermark ...........................................................................................................210
To configure Secure Watermark:...................................................................................................210
Security – Secure Print ......................................................................................................................212
Xerox Standard Accounting ..............................................................................................................214
Overview ...........................................................................................................................................214
Installation Checklist......................................................................................................................214
Enable Xerox Standard Accounting (from Internet Services)............................................................215