Xerox FREEFLOW 701P46740 Podręcznik bezpieczeństwa - Strona 26
Przeglądaj online lub pobierz pdf Podręcznik bezpieczeństwa dla Oprogramowanie Xerox FREEFLOW 701P46740. Xerox FREEFLOW 701P46740 38 stron. Print server
User Activity on the System
Date/Time User Login/Logout
Changing individual passwords
Accessing the Xerox FreeFlow Print Server through ADS
22
When the High security profile is enabled, the Solaris Basic
Security Module (BSM) is activated.
This information is kept in the authlog and syslog in the /var/log
directory. Login/Logout to the Xerox FreeFlow Print Server is
tracked as well as Network Login/Logout.
There are two ways to change passwords: Users can change their
own passwords using the selection on the Logon menu and the
administrator can change the password by double clicking on the
user name in the User tab of [Users and Groups Management].
If the Xerox FreeFlow Print Server has been configured to join a
Windows 2000 ADS domain, users may log onto the printer using
their Microsoft Active Directory Services (ADS) user names.
To provide this option, the administrator must first configure the
Xerox FreeFlow Print Server appropriately for the DNS gateway
(see the "Gateway and Network Configuration" section of this
guide). Additionally, the administrator must access the [ADS
Groups] tab through [Users and Groups Management] and specify
or edit the mapping of the ADS groups to the Xerox FreeFlow Print
Server user groups having permission to log on to the printer.
Configure Print Server to Join the ADS Domain
To enable the ADS user accounts, the Xerox FreeFlow Print
Server must have DNS enabled and joined to the appropriate ADS
domain.
1. Logon to the Xerox FreeFlow Print Server as a member of the
System Administrators. From the Network Configuration
option, select the DNS tab, make sure that the Enable DNS
check box is checked. Ensure that the DNS Server list is filled
in with the IP addresses of up to three DNS servers to search
when resolving host names to IP addresses. (This is part of
the network configuration procedure).
Security Guide