Instruction Manual
7 
Configuring Templates with Internet Services ...................................................................................
191 
Setting up a Remote Template Pool Repository (optional) ...............................................................
192 
Testing Network Scanning (using templates) ....................................................................................
193 
Web Service (if available) ...................................................................................................................
194 
Security – Authentication (by Auditron Administration).................................................................
195 
Overview ............................................................................................................................................
195 
Users Controlled by Authentication................................................................................................
195 
Authentication (Auditron) Modes....................................................................................................
195 
Services Managed by User ID Authentication ...................................................................................
196 
When Local Machine Access is enabled........................................................................................
196 
When Network Access is enabled..................................................................................................
196 
When Remote Access is enabled ..................................................................................................
196 
Effects of Authentication on Job Flow Sheets and Mailboxes...........................................................
197 
Configuring Local machine authentication.........................................................................................
198 
Configuring Remote authentication ...................................................................................................
199 
Configure Authentication for Kerberos (Windows 2000)................................................................
200 
Configure Authentication for Kerberos (Solaris) ............................................................................
201 
Configure Authentication for SMB..................................................................................................
202 
Configure Authentication for LDAP ................................................................................................
203 
Configuring Network authentication (by a remote Accounting server) ..............................................
204 
Enable Network Authentication ......................................................................................................
204 
Configure communications between the Accounting server and the device .................................
205 
Enable the Accounting option in workstation print drivers .............................................................
206 
Encryption Service Overview.............................................................................................................
207 
Types of Encryption Services Available.........................................................................................
207 
Configuration of HTTP Communication Encryption...........................................................................
209 
Installation Overview ......................................................................................................................
209 
Configuring certificates with CentreWare Internet Services...........................................................
210 
Configuration on a Computer .........................................................................................................
212 
Configuration of E-mail Encryption/Digital Signature.........................................................................
213 
Installation Overview ......................................................................................................................
213 
Configuring S/MIME certificates with CentreWare Internet Services.............................................
214 
Configuration on a Computer .........................................................................................................
216 
Configuration of Scan File Signatures (PDF/DocuWorks Documents) .............................................
217 
Installation Overview ......................................................................................................................
217 
Configuring Scan File certificates with CentreWare Internet Services ..........................................
218 
Configuration on a Computer .........................................................................................................
220 
Security – Hard Disk Overwrite..........................................................................................................
221 
Security – Digital Watermark..............................................................................................................
222 
Security – Secure Print .......................................................................................................................
223 
Xerox Standard Accounting...............................................................................................................
225 
Overview ............................................................................................................................................
225 
Installation Checklist.......................................................................................................................
225 
Enable Xerox Standard Accounting (from Internet Services)............................................................
226 
Create a Group Account ....................................................................................................................
227 
Create a User Account and Set Usage Limits ...................................................................................
228 
Maximum Usage Limits and Resetting Individual Usage Limits........................................................
229 
To Reset User Limits (if necessary) ...............................................................................................
229 
Using XSA at the machine.................................................................................................................
230 
Resetting Usage Data........................................................................................................................
231 
Print a Usage Report .........................................................................................................................
232 
Enable XSA in your Print Drivers.......................................................................................................
233 
Backing Up XSA data and settings and Cloning to another device...................................................
234 
To make a Back-up file ..................................................................................................................
234 
To Restore Settings or Clone Settings to another Machine...........................................................
235 
Audit Log..............................................................................................................................................
236 










