What is the User Authentication option for? How can it be configured?
Key Features of the User Authentication Option:
The user authentication feature allows the rip to:
- Authenticate user names.
- Authorize actions based on the user's privileges.
The rip can authenticate users who are:
- Domain-based: users defined on a corporate server and accessed via LDAP.
- imagePASS/ColorPASS/imagePRESS-based: users defined on the Controller.
Fiery Features that Utilize the User Authentication Option:
User Authentication is featured wherever a user may gain access to the Controller. The imagePASS / ColorPASS / imagePRESS authenticates user names in the following manner:
1. WebTools\Docs: The user can login to the Docs functionality in WebTools as long as their user name/password meets one of the following conditions:
- A local imagePASS/ColorPASS/imagePRESS user part of the imagePASS/ColorPASS/imagePRESS's contact list
(whether or not it is currently part of a imagePASS/ColorPASS/imagePRESS group).
- A domain user name is included in a current imagePASS/ColorPASS/imagePRESS group.
- Domain user is part of an LDAP group included in a current imagePASS/ColorPASS/imagePRESS group.
Once the user name/password is authenticated, the rip allows the user access to functionality corresponding with the user's privileges, as defined in the imagePASS/ColorPASS/imagePRESS groups.
2. Print Driver: The Print Driver for Windows (both PS and PCL versions) includes user name information with the print job. The Print Driver (Windows) supports the concept of both domain/LDAP user and the local user, even if the 'Use Network Login' is not selected. This is through the following methods:
- If the user name string entered is 'ArthurM', the imagePASS/ColorPASS/imagePRESS will assume this is a local user. The rip will by default, check the local contacts.
- If the user name string is 'domain\username' such as 'canon\arthurm', the imagePASS / ColorPASS / imagePRESS will assume this is a domain or LDAP user. The rip will by default, validate the user against the LDAP server.
3. Local Login at the Command WorkStation (PC and Mac): The user can log into Command WorkStation (CWS) only as an administrator, operator, or guest. Different privileges can be assigned to each of the users within CWS based on login.
4. Hot Folders: Authentication occurs as follows:
- Jobs submitted through Hot Folders ignore any user authentication setting on the rip and print as the authorized user 'Hot Folder'.
- Hot Folder user privileges cannot be modified on the imagePASS/ColorPASS/imagePRESS.
- The administrator has the option to disable Hot Folder functionality in Configure.
5. FTP: The FTP login only supports local users and does not support domain logins.
6. Email: The imagePASS / ColorPASS / imagePRESS's email service decides whether or not to allow an incoming email to print. This is depending on whether the sender's email address of the incoming email is in the rip's print address book. Email messages sent to the rip will not print if user authentication is enabled because the email message cannot include authenticated authorized user information.
Customer Benefits:
- Ensures a more secure workflow by enforcing authentication.
- Easier administration and increased security by creating a common and centralized list of users and privileges and adhering to network authentication protocols.
- Wider security offered by this standard feature for password protected mailboxes.
- Tighter budget control over user access (eg.,color vs. B&W) for billing and user-based cost allocation.
Configuration:
With the User Authentication option, you can specify whether users should be authenticated before they send jobs to the rip. To set this option up, follow the steps below:
1. On the rip, select Run Setup, Server Setup (you can also set it up from the WebTools).
2. Select Allow Printing From, then select 'All users' or 'Authorized users'.
3. To setup authorized users and groups on the Fiery and assign privileges, from WebTools, select Configure, Launch Configure, and select Users and Groups.
5. Add the desired groups, users, and assign privileges.
* For more detailed instructions, see the attached PDF files.
|
Bookmarks