Limiting access using basic security setup
Use Basic Security Setup to limit access to the Embedded Web Server settings and the configuration menus on the
printer control panel. This selection allows the definition of simple internal device security authentication methods.
Notes:
•
This feature is available only in advanced
‑
security printer models as a simple
‑
security access restriction method.
•
The device default settings do not contain any authentication or authorization building blocks, so everyone has
unrestricted access to the Embedded Web Server.
Applying basic security setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Under Basic Security Setup, from the Authentication Type menu, select one of the following:
•
PIN
—Enter a PIN number. Each PIN must be 4–16 digits in length.
•
Password
—Type the password. Each password must have a unique name containing up to 128 UTF
‑
8 characters.
•
User ID and Password
—Type a unique user ID, and then type the password. Each password must have a unique
name containing up to 128 UTF
‑
8 characters.
3
Click
Apply Basic Security Setup
.
Note:
Applying this setup may overwrite a previous configuration.
The new settings are submitted. The next time you access Security Setup, you will be required to enter your
authentication credentials.
Modifying or removing basic security setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Enter your authentication credentials to access Security Setup.
3
Under Modify or Remove Basic Security Setup, enter your new authentication credentials.
4
Click
Modify Basic Security Setup
to enter your new authentication credentials to access Security Setup, or click
Remove Basic Security Setup
to remove all authentication requirements.
Advanced-security building blocks
To define the authentication required when accessing device functions and menus, create and configure a login method
(building blocks) first.
Advanced
‑
security building blocks used in security templates are found under “Configure a Building Block.”
Configuring advanced building blocks from the control panel
We recommend configuring security setup using the device Embedded Web Server. These steps in configuring security
setup are the same for all advanced
‑
security devices.
Managing authentication and authorization methods
10