Xerox Secure Access
Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
318
Access Authentication Configuration
Note:
To configure this feature or these settings access the
Properties
tab as a System
Administrator. For details, refer to
Access Internet Services as System Administrator
on page 16.
1.
From the
Properties
tab, click on the
[Security]
link.
2.
Select
[Authentication Configuration]
in the directory tree.
3.
The
Authentication Configuration
page displays. In the
Current Configuration
area click on the
[Edit Methods]/[Configure]
button for
Authentication
.
4.
In the
Where is the Information Located?
area select
[Xerox Secure Access]
form the drop-
down menu for
Device User Interface Authentication
.
a.
Select your required option from the
[Web User Interface Authentication]
drop-down menu.
When a user attempts to access Internet Services they are prompted to enter their login
information. The option selected from the web user interface Authentication menu defines
how the device will validate the user's rights to access Internet Services. This is required
because if the user normally authenticates at the device with a card reader, there would be
no method for the device to authenticate users who access Internet Services from their
workstations.
•
Select
[Locally on the Device]
to validate users listed in the Local User Information
Database. This option requires you to configure accounts in the Local User Information
Database.
•
Select
[Remotely on the Network]
to validate users via an Authentication Server. This
option requires you to have a server that will provide authentication of user login details.
Authentication via Kerberos (Solaris, Windows 2000), NDS (Novell), SMB (Windows
NT4/2000) or LDAP is supported.
b.
Select required method from the
[Authorization]
drop-down menu. The card reader and
Authentication Solution authenticates (validates) the user. The Authorization method
determines which areas of the device a user is allowed to access. There are two options:
•
Select
[Locally on the Device]
if you want the device to check the Local User
Information Database for levels of authorization.
•
Select
[Remotely on the Network]
if you want to use an LDAP server to determine levels
of authorization.
If you selected
Remotely on the Network
(from the Location of Access Rights box), configure
LDAP communications as stated in the Configure Authentication for LDAP/LDAPS in the
Authentication section of this guide. For details refer to
Authentication Configuration for
LDAP/LDAPS
on page 150.
c.
Check the
[Automatically retrieve user’s e-mail address from LDAP]
checkbox for
Personalization
if you want to set the
From:
address to the logged in user's e-mail address,
when they log in via Secure Access.
d.
Click on the
[Save]
button to return to the
Authentication Configuration
page.
Summary of Contents for WORKCENTRE 5755
Page 12: ...Introduction Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 4...
Page 196: ...Security Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 188...
Page 256: ...E mail Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 248...
Page 300: ...LAN Fax Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 292...
Page 356: ...Index Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 348...