Lexmark XC9325 Security White Paper - Page 13

Secure Remote Management, Device and Settings Access, Benefits, Details

Page 13 highlights

Secure Remote Management 13 Secure Remote Management To meet the demands of effectively managing a fleet of networked printers, Lexmark solutions-capable devices have the remote management security features you need-that is, they permit only authorized personnel to configure the device for network access. Device and Settings Access Changing device settings can be controlled by using function access controls (FACs), authentication, and authorization mechanisms and the backup password. This keeps unauthorized users from altering the device's settings, including security settings. Lexmark devices support user authentication and authorization functions so that device administrators can select individual users and appropriate groups to make changes to a device based on a device's function and access rights. With this functionality, individual users and users in a group, can use their network user name and password credentials to access devices. The device can determine whether a user has appropriate access based on the rights configured by the network administrator. This level of control applies to network access through the device's web server and to the configuration of the device through the control panel. For more details on authentication and authorization, see "Authentication and Authorization" in the "Secure Access" section of this document. Also, Lexmark devices can be configured by an administrator to include a local account that has permission to access the device settings. The local account can be used in the event the device has limited or no access to the network directory. Benefits • Permit access control of device control panel functions. • Specify who has the ability to configure devices using the web page or control panel. • Provide a secure method of access while the network is down. Details Device FACs are settings that can be configured to allow local and remote access to its functions and menus. Each of the device's functions and menus can be configured to use one of the following settings: • No Security (default setting) • Disabled (available if the function can be disabled) • Restricted (via the authentication and authorization mechanism specified by a device administrator) The device backup password can be created during the initial setup of the device and can be used in the event of limited or loss of network communication. The backup password provides global control over all Security menu settings. The backup password must be 8 to 128 characters in length. Passwords can include alphabetic, numeric, and other characters to allow for substantial complexity. While the backup password enables an administrator to protect the device during the initial configuration of its security settings, it also provides local access to the device if network connectivity is lost.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Secure Remote Management
To meet the demands of effectively managing a fleet of networked printers, Lexmark solutions-capable devices
have the remote management security features you need—that is, they permit only authorized personnel to
configure the device for network access.
Device and Settings Access
Changing device settings can be controlled by using function access controls (FACs), authentication, and
authorization mechanisms and the backup password. This keeps unauthorized users from altering the device’s
settings, including security settings.
Lexmark devices support user authentication and authorization functions so that device administrators can
select individual users and appropriate groups to make changes to a device based on a device’s function and
access rights. With this functionality, individual users and users in a group, can use their network user name
and password credentials to access devices. The device can determine whether a user has appropriate access
based on the rights configured by the network administrator. This level of control applies to network access
through the device’s web server and to the configuration of the device through the control panel. For more
details on authentication and authorization, see “Authentication and Authorization” in the “Secure Access”
section of this document.
Also, Lexmark devices can be configured by an administrator to include a local account that has permission to
access the device settings. The local account can be used in the event the device has limited or no access to
the network directory.
Benefits
Permit access control of device control panel functions.
Specify who has the ability to configure devices using the web page or control panel.
Provide a secure method of access while the network is down.
Details
Device FACs are settings that can be configured to allow local and remote access to its functions and menus.
Each of the device’s functions and menus can be configured to use one of the following settings:
No Security (default setting)
Disabled (available if the function can be disabled)
Restricted (via the authentication and authorization mechanism specified by a device administrator)
The device backup password can be created during the initial setup of the device and can be used in the event
of limited or loss of network communication. The backup password provides global control over all Security
menu settings. The backup password must be 8 to 128 characters in length. Passwords can include alphabetic,
numeric, and other characters to allow for substantial complexity. While the backup password enables an
administrator to protect the device during the initial configuration of its security settings, it also provides local
access to the device if network connectivity is lost.
Secure Remote Management
13