Set the SmartCard Logout Timing.....................................................6-8
Controlling Access to Tools and Features...................................................................6-8
Controlling Access for All Users.........................................................................6-8
Controlling Access for a Group of Users........................................................6-9
User Roles Access Setup.......................................................................................6-9
Device Access Setup............................................................................................6-10
Service Access Setup...........................................................................................6-10
Feature Access Setup..........................................................................................6-11
Digital Certificates............................................................................................................6-11
Installing a Digital Certificate.........................................................................6-11
Creating a Self-Signed Certificate.................................................................6-12
Creating a Request..............................................................................................6-12
Uploading a Certificate.....................................................................................6-13
Managing Certificates.......................................................................................6-13
Certificate Revocation Retrieval Settings...................................................6-13
Secure HTTP and SSL/TLS..............................................................................................6-14
Configuring Secure HTTP (SSL/TLS).............................................................6-14
S/MIME..................................................................................................................................6-15
IPsec.......................................................................................................................................6-16
Configuring IPSec................................................................................................6-16
802.1X....................................................................................................................................6-17
Configuring 802.1X.............................................................................................6-17
FIPS140-2 Data Encryption..........................................................................................6-18
Overwriting Image Data................................................................................................6-18
Manually Deleting Image Data.....................................................................6-18
Scheduling Routine Deletion of Image Data...........................................6-19
IP Filtering............................................................................................................................6-19
Creating an IP Filter Rule..................................................................................6-19
Audit Log..............................................................................................................................6-20
Enabling Audit Log..............................................................................................6-20
Saving an Audit Log............................................................................................6-20
Interpreting the Audit Log...............................................................................6-20
PDF and XPS Signatures.................................................................................................6-21
Address Book Security.....................................................................................................6-22
Controlling CentreWare Internet Services Address Book
Access.................................................................................................................6-22
Controlling Control Panel Address Book Access.......................................6-22
Restricting Access to Job Information......................................................................6-22
Hiding or Password Protecting Completed Job Information..............6-22
Hiding Active Job Information.......................................................................6-23
Xerox
®
Color C60/C70 Printeriv
System Administrator Guide
Table of Contents