Specifications
Print Controller Design Guide for Information Security:
Page 67 of 92
17. Data Security Considerations
SOAP Communication Sessions
• SOAP communication supports SSL (Secure Sockets Layer), ensuring the proper security during
communication sessions. Even in cases where SSL is not used, the client (PC) identifies the server
(MFP/LP) via a unique session ID. Only after the MFP/LP identifies the client through this session
ID will it accept any requests from the client. This session ID is a randomly generated value,
making it extremely difficult for third parties to surmise its contents and use it to impersonate the
client. The session time limit of 30 seconds provides additional security against this type of threat.
• To increase the level of security even further, it is possible to use usernames and passwords stored
in the MFP/LP to authenticate clients, so that any clients who do not know this information will be
unable to perform remote Netfile operations. As mentioned above, this password is encrypted
before being sent over the network, preventing third parties from accessing or altering any
information stored in the MFP/LP.
Usage of Documents Stored in the MFP (MFP models only)
• The protections provided for documents stored in the MFP are the same, regardless of the access
method (over the network versus from the MFP operation panel). The ACL operates in accordance
with the settings in the MFP.
Note: Please refer to Protection of Document Server Documents for more details.
• For password-protected documents, it is not possible to perform any operations on the file unless
the correct password is entered. As described above (“Protection of Passwords for Stored
Documents”), communication between the MFP and DeskTopBinder or Desk Top Editor For
Production is performed using text written in HTTP and XML format, for both sending and receiving.
The password is embedded in this text data when it is sent to the MFP. Since User Codes and
passwords are encrypted before being sent, the information itself would be indecipherable even if it
were intercepted along the communication path.
• For each individual user, it is possible to restrict the use of specific functions of DeskTopBinder and
Desk Top Editor for Production. To use any of these functions, however, users need to be
pre-registered in the MFP.
• User access control can also be performed for FAX reception documents stored in the MFP.
Operations on these documents can only be performed by users already registered in the FAX
function as individual users or as part of a group.