• This function is supported by the operating systems listed below. To obtain user information
when Active Directory is running, use LDAP. If you are using LDAP, we recommend you use
SSL to encrypt communication between the machine and the LDAP server. SSL encryption is
possible only if the LDAP server supports TLSv1 or SSLv3.
• Windows Server 2003/2003 R2
• Windows Server 2008/2008 R2
• Windows Server 2012/2012 R2
Operational requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• Set up a domain controller in the domain you want to use.
• The operating system must support KDC (Key Distribution Center). To obtain user information
when Active Directory is running, use LDAP. If you are using LDAP, we recommend you use
SSL to encrypt communication between the machine and the LDAP server. SSL encryption is
possible only if the LDAP server supports TLSv1 or SSLv3. Compatible operating systems are
listed below:
• Windows Server 2003/2003 R2
• Windows Server 2008/2008 R2
• Windows Server 2012/2012 R2
To use Kerberos authentication under Windows Server 2008, install Service Pack 2 or later.
• Data transmission between the machine and the KDC server is encrypted if Kerberos
• For the characters that can be used for login user names and passwords, see page 15 "Usable
characters for user names and passwords".
• When accessing the machine subsequently, you can use all the functions available to your group
and to you as an individual user.
• Users who are registered in multiple groups can use all functions available to those groups.
• Under Windows Authentication, you do not need to create a server certificate unless you want to
automatically register user information such as user names using SSL.
Specifying Windows Authentication
Before configuring the machine, make sure that administrator authentication is properly configured
under "Administrator Authentication Management".
1.
Log in as the machine administrator from the control panel.
Windows Authentication
33
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...