Lexmark MS818 Embedded Web Server Administrator s Guide - Page 28

Understanding the basics

Page 28 highlights

Securing printers 28 Securing printers Understanding the basics Secure a printer through the Embedded Web Server by defining users who can use the printer and the functions that they can access. This process involves components called authentication, authorization, and groups. Create a plan that identifies who the users are and what they need to do before configuring printer security. Items to consider might include the following: • The location of the printer and whether authorized persons have access to that area • Sensitive documents that are sent to or stored on the printer • Information security policies of your organization Authentication and authorization Authentication is the method by which a system securely identifies a user. Authorization specifies which functions are available to a user authenticated by the system. The set of authorized functions is also referred to as "permissions." Based on the product definition, there are two levels of security that are supported. Simple security only supports internal device authentication and authorization methods. More advanced security permits internal and external authentication and authorization, additional restriction capability for management, and access to solutions and functions. Advanced security is supported in those devices that permit the installation of additional solutions. Advanced‑security devices support the following: • PIN and password restrictions in addition to the other authentication and authorization specified • Multiple local authentication functions that support PIN, password, and user name-password combinations • Standard network authentication through LDAP, LDAP+GSSAPI, Kerberos, and Active DirectoryTM Authorization can be specified individually or by groups (either local or network). Devices that support advanced-level security are capable of running installed solutions, which permit usage of card readers to provide advanced two-factor authentication. Panel PIN Protect Function Simple‑security devices Advanced‑security devices X PIN Protection X Web Page Password Protect X Password Protection X Internal Accounts (Username and Username/Password) X Groups (internal) X LDAP X * Available only in some printer models

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Securing printers
Understanding the basics
Secure a printer through the Embedded Web Server by defining users who can use the printer and the functions
that they can access. This process involves components called authentication, authorization, and groups.
Create a plan that identifies who the users are and what they need to do before configuring printer security.
Items to consider might include the following:
The location of the printer and whether authorized persons have access to that area
Sensitive documents that are sent to or stored on the printer
Information security policies of your organization
Authentication and authorization
Authentication
is the method by which a system securely identifies a user.
Authorization
specifies which functions are available to a user authenticated by the system. The set of
authorized functions is also referred to as “permissions.”
Based on the product definition, there are two levels of security that are supported. Simple security only
supports internal device authentication and authorization methods. More advanced security permits internal
and external authentication and authorization, additional restriction capability for management, and access to
solutions and functions. Advanced security is supported in those devices that permit the installation of additional
solutions.
Advanced
security devices support the following:
PIN and password restrictions in addition to the other authentication and authorization specified
Multiple local authentication functions that support PIN, password, and user name–password combinations
Standard network authentication through LDAP, LDAP+GSSAPI, Kerberos, and Active Directory
TM
Authorization can be specified individually or by groups (either local or network). Devices that support
advanced-level security are capable of running installed solutions, which permit usage of card readers to
provide advanced two-factor authentication.
Function
Simple
security devices
Advanced
security devices
Panel PIN Protect
X
PIN Protection
X
Web Page Password Protect
X
Password Protection
X
Internal Accounts (Username and Username/Password)
X
Groups (internal)
X
LDAP
X
*
Available only in some printer models
Securing printers
28