Lexmark MS517 Embedded Web Server--Security: Administrator s Guide - Page 17

Using LDAP+GSSAPI, Validating an LDAP setup, Adding an LDAP+GSSAPI setup

Page 17 highlights

Managing authentication and authorization methods 17 3 Select a setup from the list. 4 Click Delete Entry to remove the profile, or Cancel to return to previous values. Notes: • Click Delete List to delete all LDAP setups in the list. • An LDAP building block cannot be deleted if it is being used as part of a security template. Validating an LDAP setup 1 From the Embedded Web Server, click Settings > Security > Security Setup. 2 Under Advanced Security Setup, click LDAP. 3 Click Test LDAP Authentication Setup next to the setup you want to test. Using LDAP+GSSAPI Note: This feature is available only in advanced‑security devices. Some administrators prefer authenticating to an LDAP server using the more secure Generic Security Services Application Programming Interface (GSSAPI) instead of simple LDAP authentication. Instead of authenticating directly with the LDAP server, the user first authenticates with a Kerberos server to obtain a Kerberos "ticket." This ticket is then presented to the LDAP server using the GSSAPI protocol for access. LDAP+GSSAPI is typically used for networks running Active Directory. Notes: • LDAP+GSSAPI requires Kerberos 5 to be configured. • Supported devices can store a maximum of five unique LDAP+GSSAPI configurations. Each configuration must have a unique name. • LDAP relies on an external server for authentication. If an outage prevents the printer from communicating with the server, then users are not able to access protected device functions. • To help prevent unauthorized access, log out from the printer after each session. Adding an LDAP+GSSAPI setup 1 From the Embedded Web Server, click Settings > Security > Security Setup. 2 Under Advanced Security Setup, click LDAP+GSSAPI. 3 Click Add an LDAP+GSSAPI Setup. The setup dialog is divided into four parts: General Information • Setup Name-This name is used to identify each particular LDAP+GSSAPI Server Setup when creating security templates. • Server Address-Type the IP address or the host name of the LDAP server where the authentication is performed. • Server Port-The port used by the Embedded Web Server to communicate with the LDAP server. The default LDAP port is 389. • Use SSL/TLS-From the drop‑down menu, select None, SSL/TLS, or TLS. • Userid Attribute-Type either cn, uid, userid, or user‑defined.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

3
Select a setup from the list.
4
Click
Delete Entry
to remove the profile, or
Cancel
to return to previous values.
Notes:
Click
Delete List
to delete all LDAP setups in the list.
An LDAP building block cannot be deleted if it is being used as part of a security template.
Validating an LDAP setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Under Advanced Security Setup, click
LDAP
.
3
Click
Test LDAP Authentication Setup
next to the setup you want to test.
Using LDAP+GSSAPI
Note:
This feature is available only in advanced
security devices.
Some administrators prefer authenticating to an LDAP server using the more secure
Generic Security Services
Application Programming Interface
(GSSAPI) instead of simple LDAP authentication. Instead of authenticating
directly with the LDAP server, the user first authenticates with a Kerberos server to obtain a Kerberos “ticket.”
This ticket is then presented to the LDAP server using the GSSAPI protocol for access. LDAP+GSSAPI is typically
used for networks running Active Directory.
Notes:
LDAP+GSSAPI requires Kerberos 5 to be configured.
Supported devices can store a maximum of five unique LDAP+GSSAPI configurations. Each configuration
must have a unique name.
LDAP relies on an external server for authentication. If an outage prevents the printer from
communicating with the server, then users are not able to access protected device functions.
To help prevent unauthorized access, log out from the printer after each session.
Adding an LDAP+GSSAPI setup
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Setup
.
2
Under Advanced Security Setup, click
LDAP+GSSAPI
.
3
Click
Add an LDAP+GSSAPI Setup
. The setup dialog is divided into four parts:
General Information
Setup Name
—This name is used to identify each particular LDAP+GSSAPI Server Setup when creating
security templates.
Server Address
—Type the IP address or the host name of the LDAP server where the authentication is
performed.
Server Port
—The port used by the Embedded Web Server to communicate with the LDAP server. The
default LDAP port is 389.
Use SSL/TLS
—From the drop
down menu, select
None
,
SSL/TLS
, or
TLS
.
Userid Attribute
—Type either
cn
,
uid
,
userid
, or
user
defined
.
Managing authentication and authorization methods
17