Xerox FreeFlow 보안 매뉴얼 - 페이지 24

{카테고리_이름} Xerox FreeFlow에 대한 보안 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Xerox FreeFlow 38 페이지. For color 560/570 printer
Xerox FreeFlow에 대해서도 마찬가지입니다: 설치 매뉴얼 (34 페이지), 브로셔 (2 페이지), 릴리스 노트 (23 페이지), 설치 매뉴얼 (2 페이지), 릴리스 노트 (33 페이지), 중요 설치 정보 (2 페이지), 사용자 설명서 (50 페이지), 매뉴얼 (18 페이지), 빠른 연결 매뉴얼 (2 페이지), 항공사 절차 매뉴얼 (28 페이지)

Xerox FreeFlow 보안 매뉴얼

Strong Passwords

20
NOTE: Please be aware that Xerox Customer Support Personnel
must have access to the new root password for service and
support. It is the customer's responsibility to ensure that the root
and system administrator passwords are available for them.
The Xerox FreeFlow Print Server provides additional security for
users required to adhere to strict security guidelines. It provides a
means in which a strong password policy can be enforced.
Strong Passwords can be Enabled and Disabled (default setting)
via the Password Policies window.
Strong passwords must consist of ALL of the following
A minimum of 8 characters in length
Contain at least one capital letter
Contain at least one number
Contain at least one special character {!, @, #, $, %, ^, &, *},
including open and close parentheses { ( ) }, hyphen{ - },
underscore{ _ }, and period{ . }.
NOTE: The strong password requirements cannot be modified. A
strong password cannot be set for root or any other Solaris user
accounts that are not created by the Xerox FreeFlow Print Server.
NOTE: Remote Network Server: If running NIS+ name service,
strong passwords would be enforced via the NIS + server.
This policy can be set by using the -a <# of allowed attempts>
argument with rpc.nispasswdd. For example, to limit users to no
more than four attempts (the default is 3), you would type:
rpc.nispasswd -a 4.
How to Enable/Disable Strong Password
From the Setup menu select [Users and Groups]
From the Policies drop down menu select [Password]
Enable/Disable Strong Password from the Password Policies
window. The default setting is "Disable".
Login Attempts Allowed
The Xerox FreeFlow Print Server has provided a means to lockout
users after reaching the maximum number of consecutive
attempts. Once this is done, the user will need to apply (reset) a
security policy and reboot the system.
The number of failed attempts and enable/disable is configurable
via the Password Policy screen. When enabled, login attempts
can be set from 1-6 attempts before the user is locked out. This
Security Guide