7
Configuring Templates with Internet Services ...................................................................................
191
Setting up a Remote Template Pool Repository (optional) ...............................................................
192
Testing Network Scanning (using templates) ....................................................................................
193
Web Service (if available) ...................................................................................................................
194
Security – Authentication (by Auditron Administration).................................................................
195
Overview ............................................................................................................................................
195
Users Controlled by Authentication................................................................................................
195
Authentication (Auditron) Modes....................................................................................................
195
Services Managed by User ID Authentication ...................................................................................
196
When Local Machine Access is enabled........................................................................................
196
When Network Access is enabled..................................................................................................
196
When Remote Access is enabled ..................................................................................................
196
Effects of Authentication on Job Flow Sheets and Mailboxes...........................................................
197
Configuring Local machine authentication.........................................................................................
198
Configuring Remote authentication ...................................................................................................
199
Configure Authentication for Kerberos (Windows 2000)................................................................
200
Configure Authentication for Kerberos (Solaris) ............................................................................
201
Configure Authentication for SMB..................................................................................................
202
Configure Authentication for LDAP ................................................................................................
203
Configuring Network authentication (by a remote Accounting server) ..............................................
204
Enable Network Authentication ......................................................................................................
204
Configure communications between the Accounting server and the device .................................
205
Enable the Accounting option in workstation print drivers .............................................................
206
Encryption Service Overview.............................................................................................................
207
Types of Encryption Services Available.........................................................................................
207
Configuration of HTTP Communication Encryption...........................................................................
209
Installation Overview ......................................................................................................................
209
Configuring certificates with CentreWare Internet Services...........................................................
210
Configuration on a Computer .........................................................................................................
212
Configuration of E-mail Encryption/Digital Signature.........................................................................
213
Installation Overview ......................................................................................................................
213
Configuring S/MIME certificates with CentreWare Internet Services.............................................
214
Configuration on a Computer .........................................................................................................
216
Configuration of Scan File Signatures (PDF/DocuWorks Documents) .............................................
217
Installation Overview ......................................................................................................................
217
Configuring Scan File certificates with CentreWare Internet Services ..........................................
218
Configuration on a Computer .........................................................................................................
220
Security – Hard Disk Overwrite..........................................................................................................
221
Security – Digital Watermark..............................................................................................................
222
Security – Secure Print.......................................................................................................................
223
Xerox Standard Accounting...............................................................................................................
225
Overview ............................................................................................................................................
225
Installation Checklist.......................................................................................................................
225
Enable Xerox Standard Accounting (from Internet Services)............................................................
226
Create a Group Account ....................................................................................................................
227
Create a User Account and Set Usage Limits ...................................................................................
228
Maximum Usage Limits and Resetting Individual Usage Limits........................................................
229
To Reset User Limits (if necessary) ...............................................................................................
229
Using XSA at the machine.................................................................................................................
230
Resetting Usage Data........................................................................................................................
231
Print a Usage Report .........................................................................................................................
232
Enable XSA in your Print Drivers.......................................................................................................
233
Backing Up XSA data and settings and Cloning to another device...................................................
234
To make a Back-up file ..................................................................................................................
234
To Restore Settings or Clone Settings to another Machine...........................................................
235
Audit Log..............................................................................................................................................
236