Lexmark MS517 Embedded Web Server--Security: Administrator s Guide - Page 14

Enable CA Monitor is selected., Under Advanced Security Setup, click

Page 14 highlights

Managing authentication and authorization methods 14 • Password-Type the password of the network administrator or the individual who has rights to join the domain. Note: Passwords are case sensitive and are not cached by the device. • Organizational Unit-Type the name of your organizational unit, if necessary. 3 Select one or more of the following domain services: • LDAP Address Book-Configure LDAP server address book information using Active Directory data. • Standard Admin Groups and Security Templates-Create a group named "admin," and a security template named "Active Directory." • CA Certificate Monitoring-Enable the CA certificate monitor feature with the following default settings: - "Enable CA Monitor" is selected. - "Schedule run time" is set to 0:00 (midnight). - Monitoring is repeated every day. 4 Click Submit. Notes: • The screen flashes, and you may hear a clicking noise. • If the configuration is unsuccessful, then a big red X mark appears. A message appears if the configuration is not successful. 5 Click Manage Security Templates to use the Active Directory information to complete your security setup. If you want to review or make some small modifications to the LDAP+GSSAPI building block, then click Return to Security Setup and do the following: a Under Advanced Security Setup, click Kerberos 5. b Click View File to open the Kerberos Config file that was created using the Active Directory setup. c Review the file, and then click the back button of the browser. Note: Do not edit or copy the Kerberos Config file to use with older devices, to avoid issues with KDC Server Affinity Service. Older devices do not recognize the special mappings associated with the KDC Server Affinity Service. d Click Return to Security Setup, and then click LDAP+GSSAPI. e Under LDAP+GSSAPI Setups, click the building block that was created by the Active Directory Setup process. Note: By default, the building block name is the realm name, and the server address field is the domain controller name. f If necessary, change some of the building block settings depending on your environment, including the following: • Server Port-The standard port for LDAP is 389. Another common port is 3268, but this port is used only for Global Catalog servers in Active Directory. If applicable, change the port to 3268 to speed up the querying process. • Search Base-This setting indicates the location in the directory tree where the device starts searching. At the most basic, we recommend specifying the root of the directory (such as "dc=company,dc=com").

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

Password
—Type the password of the network administrator or the individual who has rights to join the
domain.
Note:
Passwords are case sensitive and are not cached by the device.
Organizational Unit
—Type the name of your organizational unit, if necessary.
3
Select one or more of the following domain services:
LDAP Address Book
—Configure LDAP server address book information using Active Directory data.
Standard Admin Groups and Security Templates
—Create a group named “admin,” and a security
template named “Active Directory.”
CA Certificate Monitoring
—Enable the CA certificate monitor feature with the following default settings:
“Enable CA Monitor” is selected.
“Schedule run time” is set to
0:00
(midnight).
Monitoring is repeated every day.
4
Click
Submit
.
Notes:
The screen flashes, and you may hear a clicking noise.
If the configuration is unsuccessful, then a big red
X
mark appears. A message appears if the
configuration is not successful.
5
Click
Manage Security Templates
to use the Active Directory information to complete your security setup.
If you want to review or make some small modifications to the LDAP+GSSAPI building block, then click
Return to Security Setup
and do the following:
a
Under Advanced Security Setup, click
Kerberos 5
.
b
Click
View File
to open the Kerberos Config file that was created using the Active Directory setup.
c
Review the file, and then click the back button of the browser.
Note:
Do not edit or copy the Kerberos Config file to use with older devices, to avoid issues with KDC
Server Affinity Service. Older devices do not recognize the special mappings associated with the KDC
Server Affinity Service.
d
Click
Return to Security Setup
, and then click
LDAP+GSSAPI
.
e
Under LDAP+GSSAPI Setups, click the building block that was created by the Active Directory Setup
process.
Note:
By default, the building block name is the realm name, and the server address field is the
domain controller name.
f
If necessary, change some of the building block settings depending on your environment, including the
following:
Server Port
—The standard port for LDAP is 389. Another common port is 3268, but this port is used
only for Global Catalog servers in Active Directory. If applicable, change the port to 3268 to speed
up the querying process.
Search Base
—This setting indicates the location in the directory tree where the device starts
searching. At the most basic, we recommend specifying the root of the directory (such as
“dc=company,dc=com”).
Managing authentication and authorization methods
14