Chapter 11
11-36
Linkage with Department ID management when using SSO-H
SSO-H has collaborative linkage with imageWARE access management, imageWARE Accounting Manager and Net Spot Accounting.
Only when used with 'Local device authentication', can department ID/ passwords be allocated to users.
In the event that these are allocated, authentication can be performed even when the main unit's department management is ON.
Department ID and department passwords are not allocated to domain users.
When the main unit's department management function is ON, domain users cannot be authenticated.
System administrator linkage (automatic allocation of ID to administrator)
[Restriction] With SSO, there was a function where ID programmed on SA would be allocated to domain authentication administrators (Canon Peripheral Admins
Group users) on SA, and system administrators automatically authenticated, but with SSO-H this is now unsupported.
Site internal access mode
With SSO-H, access to Active Directory within site can be prioritized or restricted, so there is a setting called 'Site internal access mode'. Sites programmed in
Active Directory comprise multiple subnets. In this mode, SSO-H uses site information to access the same site as the device, or the subnet Active Directory.
- The SSO-H default setting is with the site internal access mode OFF.
- Access Active Directory within same site only.
- If there is no Active Directory within the same site, or if connection fails, there will be an authentication error.
- Access another site if Active Directory within the same site cannot be located.
- If there is no Active Directory within the same site, or if connection fails, an Active Directory external to the site will be accessed.
- If all attempts to access Active Directory fail, there will be an authentication error.
The operating specifications of the site internal access mode are as described below.
When first logging in to the login service after booting iR, the domain controller (DC) is obtained from the site list.
However, upon the first login, even if the site functionality is active, connection to DC is random. (This is because, if connection to DC should fail, the site to which
the device belongs cannot be ascertained.)
If the device IP address or the domain name are changed, the site settings are acquired once more.
In this mode, at the first login (first authentication of domain to which the device belongs) LDAP-Bind is performed directly to DC and site information acquired
by LDAP from DC.
From the acquired site list, the site to which the device subnet belongs is extracted and this becomes the site to which device belongs.
Active Directory address is acquired (retrieved from DNS)
Settings for site internal access mode
Switching between site internal access mode/ non site internal access mode, as well as detailed mode settings, are done via DMS or iWEMC.
Site internal access mode settings window (DMS)
Site list acquisition
After booting up, upon the first login by LLS or ILS/ RLS, the site list is obtained from the Active Directory. In order to obtain the site list from the Active Directory,
Active Directory needs to be accessed in LDAP, so SASL-Kerberos-Bind is used by the login user account. If authentication by Active Directory should fail, an
authentication error will be generated and the site list will be acquired again from Active Directory upon the next login.
In SSO-H, the Active Directory to be accessed when acquiring the site list cannot be specified. In other words, if there is no site list, which site's Active Directory
is accessed depends upon the order of the Active Directory addresses returned by DNS. Therefore, when acquiring the site list, LDAP may access the Active Di-
rectory of a different site. Therefore, in such cases, it is sometimes necessary to access across sites or subnets, which means that LDAP protocol needs to have
continuity across sites (subnets) (normally, LDAP is port No. 389). Further, if connection with Active Directory fails when acquiring site information, another
- To run domain authentication and Department ID management at the same time, the options Net Spot Accountant, iW Accounting Manager or iW EMC Accounting
Management Plug-in are required. If domain authentication is selected as the authentication method without linkage to these systems, login will be disabled and
Department ID management will not come ON. If Department ID management cannot be turned ON when using domain authentication and login is disabled, switch
the login service to Default Authentication and turn Department ID management OFF.
- When SSO is linked to Net Spot Accountant, iW Accounting Manager or iW EMC Accounting Management Plug-in, and is to be used with Department ID
management turned ON, users belonging to the Domain Admin group need to be allocated to the Security Agent service account.
- In order to link local device authentication and Department ID management and manage print pages and scan pages per department ID, Department ID management
must be set ON.
To run local device authentication and Department ID management at the same time, the information registered in local device authentication must match the
Department ID management user information (department ID and password).
- User information registered in SDL and that registered in local device authentication are managed separately in the iR device. User information registered in one is
not reflected in the other.
- In local device authentication the card reader for the option control card cannot be used. To use the card reader for the option control card, set SDL.
- Security Agent is only required when using the conventional SSO.
- To use the conventional SSO and Security Agent, they must be installed in the computer belonging to the domain that includes the iR device.
- The Security Agent installer is included in the MEAP Administrator CD-ROM.
MEMO:
With SSO, linkage with iWAM/ iWAM account summary manager was assumed and department management linkage was enabled even in domain authentication,
but with SSO-H, this is now unsupported.
The Active Directory subnet is assumed to be the same subnet as the device subnet.
In the Active Directory addresses, the Active Directories of the same site are listed.
Active Directories of the same subnet as the device are listed first.
If there is no Active Directory with the same subnet as the device, Active Directories belonging to different subnets than the device are listed.
The Active Directories within the same site are accessed in order. Note, however, that where there are multiple Active Directories within the same site, access to
those Active Directories will be in the order in which the address list was obtained.
If there is no Active Directory within the same site, if access outside of the site is programmed, Active Directories outside of the site will be accessed in the order in
which the address list was obtained.
Summary of Contents for iR3245
Page 1: ...Jul 3 2008 Service Manual iR3245 3235 3230 3225 Series...
Page 2: ......
Page 6: ......
Page 25: ...Chapter 1 Introduction...
Page 26: ......
Page 28: ......
Page 64: ......
Page 65: ...Chapter 2 Installation...
Page 66: ......
Page 120: ......
Page 121: ...Chapter 3 Basic Operation...
Page 122: ......
Page 124: ......
Page 128: ......
Page 129: ...Chapter 4 Main Controller...
Page 130: ......
Page 132: ......
Page 134: ...Chapter 4 4 2 F 4 1 1 5 8 9 11 14 12 3 4 10 2 13 7 15 16 17...
Page 152: ......
Page 153: ...Chapter 5 Original Exposure System...
Page 154: ......
Page 184: ......
Page 185: ...Chapter 6 Laser Exposure...
Page 186: ......
Page 188: ......
Page 197: ...Chapter 7 Image Formation...
Page 198: ......
Page 227: ...Chapter 8 Pickup Feeding System...
Page 228: ......
Page 232: ......
Page 244: ...Chapter 8 8 12 For iR3245 3235 3230 F 8 14 1 2 3 4...
Page 261: ...Chapter 8 8 29 10 11 12 13 14 3 1 2 4 5 4 4 1 2 3 5 4 1 2 3 5 5 4 1 2 3 5 4 1 2 3 5...
Page 278: ......
Page 279: ...Chapter 9 Fixing System...
Page 280: ......
Page 282: ......
Page 297: ...Chapter 10 External and Controls...
Page 298: ......
Page 302: ......
Page 315: ...Chapter 10 10 13 2 Uncheck SNMP Status Enabled F 10 11...
Page 342: ......
Page 343: ...Chapter 11 MEAP...
Page 344: ......
Page 346: ......
Page 397: ...Chapter 12 e maintenance imageWARE Remote...
Page 398: ......
Page 400: ......
Page 408: ......
Page 409: ...Chapter 13 Maintenance and Inspection...
Page 410: ......
Page 412: ......
Page 424: ...Chapter 13 13 12...
Page 425: ...Chapter 14 Standards and Adjustments...
Page 426: ......
Page 428: ......
Page 436: ......
Page 437: ...Chapter 15 Correcting Faulty Images...
Page 438: ......
Page 440: ......
Page 465: ...Chapter 16 Self Diagnosis...
Page 466: ......
Page 468: ......
Page 493: ...Chapter 17 Service Mode...
Page 494: ......
Page 498: ......
Page 690: ......
Page 691: ...Chapter 18 Upgrading...
Page 692: ......
Page 694: ......
Page 738: ...Chapter 18 18 44...
Page 739: ...Chapter 19 Service Tools...
Page 740: ......
Page 742: ......
Page 744: ......
Page 745: ...Jul 3 2008...
Page 746: ......