Lexmark XC4342 Security White Paper - Page 61

Two Levels of Security

Page 61 highlights

Security Standards 61 Two Levels of Security There are two levels of security that are supported based on the product definition. The simplest level of security supports only internal-device authentication and authorization methods. The more advanced level of security permits internal and external authentication and authorization, as well as additional restriction capabilities for management, function, and solution access. Advanced security is supported for those devices that permit the installation of additional solutions (applications) to the device. In general, if the device supports a touch-screen display, then the security level for that device is advanced. Simple security utilizes a single PIN to restrict user access to the device's control panel and a single web page password to restrict administrator access to the device. PIN access for the control panel is specified because text entry is generally difficult on the control panels for these devices while web page access supports passwords because there are no device panel restrictions. Devices that support simple security are generally used in environments where security risk is limited and advanced security is not required. Advanced-level security devices support a wide range of local and network authentication and authorization methods. Multiple local authentication functions that support PINs, passwords and username-password combinations for many locally defined users are supported. Standard network authentication through LDAP, LDAP+GSSAPI, Kerberos and Active Directory are supported. Authorization can be specified individually or by groups (either local or network). Devices that support advanced-level security are capable of running installed solutions, which permit the usage of card readers to provide advanced two-factor authentication.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Two Levels of Security
There are two levels of security that are supported based on the product definition. The simplest level of security
supports only internal-device authentication and authorization methods. The more advanced level of security
permits internal and external authentication and authorization, as well as additional restriction capabilities for
management, function, and solution access. Advanced security is supported for those devices that permit the
installation of additional solutions (applications) to the device. In general, if the device supports a touch-screen
display, then the security level for that device is advanced.
Simple security utilizes a single PIN to restrict user access to the device’s control panel and a single web page
password to restrict administrator access to the device. PIN access for the control panel is specified because
text entry is generally difficult on the control panels for these devices while web page access supports
passwords because there are no device panel restrictions. Devices that support simple security are generally
used in environments where security risk is limited and advanced security is not required.
Advanced-level security devices support a wide range of local and network authentication and authorization
methods. Multiple local authentication functions that support PINs, passwords and username-password
combinations for many locally defined users are supported. Standard network authentication through LDAP,
LDAP+GSSAPI, Kerberos and Active Directory are supported.
Authorization can be specified individually or by groups (either local or network). Devices that support
advanced-level security are capable of running installed solutions, which permit the usage of card readers to
provide advanced two-factor authentication.
Security Standards
61