Xerox® Security Guide for Light Production Mono Class Products 
 
- ID information in plain text. 
- Password encrypted in MN-CHAPv2 method. 
 
Smart Card Authentication 
Two-factor security - Smart Card plus User Name/Password combination. Requires optional card reader 
hardware and software plugin. Authentication is handled by a remote server. Supported remote 
authentication methods include Kerberos, SMB and LDAP.  
Smart Card authentication is considered very secure due to the nature of the Smart Card architecture and 
potential levels of encryption of data on the card itself. 
Support for the SIPR network is provided using the XCP Plug-in architecture and a Smart Card 
authentication solution created by 90meter under contract for Xerox.  
Details regarding 90meter can be found online here: http://www.90meter.com/ 
Other Smart Card authentication solutions are offered including support for CAC/PIV and .NET 
compatible cards leveraging XCP Plug-ins. 
 
D-Series® Copier/Printers  
4110, 4112/4127, 4590 
EPS 
Net (Gemalto .Net v1, Gemalto .Net v2) 
(Not Currently 
Supported) 
(Not Currently Supported) 
(Not Currently Supported) 
 
 
Convenience Authentication 
Convenience authentication offloads authentication to a third-party solution which may offer more or less 
security than native security implementations.  Users swipe a pre-programmed identification card or key 
fob to access the device. 
For example, employees may be issued key fobs for access to facilities.  Convenience mode may be 
configured to allow an employee to authenticate using their fob or require the fob in a multi-factor manor.  
The level of security provided is dependent upon the chosen implementation. 
Some examples of third party convenience authentication providers include: 
  Pharos print management solutions: https://pharos.com/ 
  YSoft SafeQ: https://www.ysoft.com/en 
Contact your Xerox sales representative for details and other options. 
 
Simple Authentication (non-secure) 
Simple authentication is mentioned here for completeness.  It is intended for environments where 
authentication is not required.  It is used for customization only.  When in this mode, users are not 
required to enter a password.  (The device administrator account always requires a password).