Configuring LDAP Custom Filters..................................................................5-13
POP3.......................................................................................................................................5-14
HTTP.......................................................................................................................................5-14
Enabling HTTP.......................................................................................................5-14
Configuring HTTP Settings...............................................................................5-15
Proxy Server.........................................................................................................................5-15
Microsoft Networking......................................................................................................5-16
Configuring WINS...............................................................................................5-16
IPP...........................................................................................................................................5-16
Enabling IPP...........................................................................................................5-16
Configuring IPP.....................................................................................................5-16
WebDAV................................................................................................................................5-17
Enabling WebDAV................................................................................................5-17
Configuring WebDAV..........................................................................................5-17
WSD........................................................................................................................................5-17
Enabling WSD........................................................................................................5-17
Configuring WSD.................................................................................................5-18
6 Security..........................................................................................................6-1
Setting Up Access Rights..................................................................................................6-1
Overview.....................................................................................................................6-1
Authentication.........................................................................................................6-1
Authorization............................................................................................................6-2
Personalization........................................................................................................6-2
Local Authentication..........................................................................................................6-2
Setting Up Local Authentication......................................................................6-2
Defining User Information.................................................................................6-3
Specifying Login Requirements........................................................................6-3
Network Authentication....................................................................................................6-3
Setting up Network Authentication................................................................6-3
Configuring Authentication Server Settings for Kerberos......................6-4
Configuring Authentication Server Settings for SMB...............................6-4
Configuring Authentication Server Settings for LDAP.............................6-5
Authentication Using a Card Reader System...........................................................6-5
Setting Up Authentication for Xerox® Secure Access.............................6-5
Configuring Xerox® Secure Access Login Settings...................................6-6
Setting Up Authentication for a USB SmartCard Reader
System..................................................................................................................6-7
Configure Network Authentication Settings..................................6-7
Enable SmartCard Settings...................................................................6-7
Set the SmartCard Certificate Verification Mode........................6-7
iii Xerox
®
Color C60/C70 Printer
System Administrator Guide
Table of Contents
Hello! Crazy discounts, hurry up! We are Drop Dead Studio and our goal is to help companies achieve impressive sales results through automated marketing. I. We sell fresh databases for GSA Search Engine Ranker. • The databases are updated monthly through 24/7 parsing and by connecting purchased databases from other sources. • You have the option to purchase a one-time fresh database or pay for a lifetime subscription for updates. ATTENTION! 40% discount only until 04/10/2024! When ap
Hello! Crazy discounts, hurry up! We are Drop Dead Studio and our goal is to help companies achieve impressive sales results through automated marketing. I. We sell fresh databases for GSA Search Engine Ranker. • The databases are updated monthly through 24/7 parsing and by connecting purchased databases from other sources. • You have the option to purchase a one-time fresh database or pay for a lifetime subscription for updates. ATTENTION! 40% discount only until 04/10/2024! When ap