Lexmark MS818 Embedded Web Server Administrator s Guide - Page 39

Using LDAP+GSSAPI

Page 39 highlights

Securing printers 39 Notes: • Click Delete List to delete all LDAP setups in the list. • An LDAP building block cannot be deleted if it is being used as part of a security template. Validating an LDAP setup 1 From the Embedded Web Server, click Settings > Security > Security Setup. 2 Under Advanced Security Setup, click LDAP. 3 Click Test LDAP Authentication Setup next to the setup you want to test. Using LDAP+GSSAPI Note: This feature is available only in advanced‑security devices. Some administrators prefer authenticating to an LDAP server using the more secure Generic Security Services Application Programming Interface (GSSAPI) instead of simple LDAP authentication. Instead of authenticating directly with the LDAP server, the user first authenticates with a Kerberos server to obtain a Kerberos "ticket." This ticket is then presented to the LDAP server using the GSSAPI protocol for access. LDAP+GSSAPI is typically used for networks running Active Directory. Notes: • LDAP+GSSAPI requires Kerberos 5 to be configured. • Supported devices can store a maximum of five unique LDAP+GSSAPI configurations. Each configuration must have a unique name. • LDAP relies on an external server for authentication. If an outage prevents the printer from communicating with the server, then users are not able to access protected device functions. • To help prevent unauthorized access, log out from the printer after each session. Adding an LDAP+GSSAPI setup 1 From the Embedded Web Server, click Settings > Security > Security Setup. 2 Under Advanced Security Setup, click LDAP+GSSAPI. 3 Click Add an LDAP+GSSAPI Setup. The setup dialog is divided into four parts: General Information • Setup Name-This name is used to identify each particular LDAP+GSSAPI Server Setup when creating security templates. • Server Address-Type the IP address or the host name of the LDAP server where the authentication is performed. • Server Port-The port used by the Embedded Web Server to communicate with the LDAP server. The default LDAP port is 389. • Use SSL/TLS-From the drop‑down menu, select None, SSL/TLS, or TLS. • Userid Attribute-Type either cn, uid, userid, or user‑defined. • Mail Attribute-Type a maximum of 48 characters to uniquely identify e‑mail addresses. The default value is "mail." • Full Name Attribute-Type a maximum of 48 characters.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Notes:
Click
Delete List
to delete all LDAP setups in the list.
An LDAP building block cannot be deleted if it is being used as part of a security template.
Validating an LDAP setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Under Advanced Security Setup, click
LDAP
.
3
Click
Test LDAP Authentication Setup
next to the setup you want to test.
Using LDAP+GSSAPI
Note:
This feature is available only in advanced
security devices.
Some administrators prefer authenticating to an LDAP server using the more secure
Generic Security Services
Application Programming Interface
(GSSAPI) instead of simple LDAP authentication. Instead of authenticating
directly with the LDAP server, the user first authenticates with a Kerberos server to obtain a Kerberos “ticket.”
This ticket is then presented to the LDAP server using the GSSAPI protocol for access. LDAP+GSSAPI is typically
used for networks running Active Directory.
Notes:
LDAP+GSSAPI requires Kerberos 5 to be configured.
Supported devices can store a maximum of five unique LDAP+GSSAPI configurations. Each configuration
must have a unique name.
LDAP relies on an external server for authentication. If an outage prevents the printer from
communicating with the server, then users are not able to access protected device functions.
To help prevent unauthorized access, log out from the printer after each session.
Adding an LDAP+GSSAPI setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Under Advanced Security Setup, click
LDAP+GSSAPI
.
3
Click
Add an LDAP+GSSAPI Setup
. The setup dialog is divided into four parts:
General Information
Setup Name
—This name is used to identify each particular LDAP+GSSAPI Server Setup when creating
security templates.
Server Address
—Type the IP address or the host name of the LDAP server where the authentication is
performed.
Server Port
—The port used by the Embedded Web Server to communicate with the LDAP server. The
default LDAP port is 389.
Use SSL/TLS
—From the drop
down menu, select
None
,
SSL/TLS
, or
TLS
.
Userid Attribute
—Type either
cn
,
uid
,
userid
, or
user
defined
.
Mail Attribute
—Type a maximum of 48 characters to uniquely identify e
mail addresses. The default
value is “mail.”
Full Name Attribute
—Type a maximum of 48 characters.
Securing printers
39