WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
331
23
Xerox Secure Access
Administrators can configure the device so that users must be authenticated and authorized before
they can access specific services or areas. Xerox Secure Access provides a means of authenticating
users via an authentication server and optional card reader.
This convenient security solution allows people to simply swipe the ID card at the device to unlock
access to features that can be tracked for accounting and regulatory requirements.
Secure Access and Accounting
Secure Access can be enabled with
Network Accounting and Xerox Standard Accounting
features to
provide accounting functionality.
Note:
Secure Access cannot be enabled at the same time as Foreign Device Interface.
Information Checklist
Before starting the procedure, ensure the following items are available or tasks have been performed:
•
Ensure the Xerox device is fully functional on the network. TCP/IP and HTTP protocols must be
configured so that Internet Services can be accessed.
•
Ensure the Xerox Secure Access authentication server is installed and configured with user
accounts. Refer to the documentation with the authentication server to complete this task.
Contact your Xerox Sales Representative if you do not have the Xerox Secure Access
authentication server.
Note:
If you want authorization, there must be a mapping between the accounts created on the
authentication server and accounts created in the Local User Information Database or remote
Authorization server.
•
Connect and configure your card reader, if required. Attach the card reader to the left hand shelf
on the device. Place the controller box on the floor at the back of the device.
•
Ensure that SSL (Secure Sockets Layer) is configured on the Xerox device via Internet Services.
•
To configure Authorization locally, the
User Information Database
must be configured. For
instructions, refer to
User Information Database
on page 173. There must be a mapping between
the accounts created on the Authentication Server and the User Information Database (the user
names must match so that the device can cross reference each user as they log in at the device).
•
To configure Remote Authorization, the LDAP server must be configured on the device and
Authorization Access configured. For instructions, refer to
LDAP
on page 115 and
Authentication
Configuration for LDAP/LDAPS
on page 160. There must be a mapping between the accounts
created on the Authentication Server and the LDAP server (the user names must match so that the
device can cross reference each user as they log in at the device).
Summary of Contents for WORKCENTRE 5735
Page 28: ...Internet Services WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 28 ...
Page 68: ...Support WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 68 ...
Page 168: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 168 ...
Page 238: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 238 ...
Page 242: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 242 ...
Page 260: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 260 ...
Page 270: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 270 ...
Page 288: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 288 ...
Page 304: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 304 ...
Page 324: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 324 ...
Page 330: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 330 ...
Page 336: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 336 ...
Page 356: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 356 ...
Page 362: ...WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 362 ...