Dell B3460dn User Manual

Smart Access Card Solution
Administrator's Guide
June 2013 www.dell.com | dell.com/support/printers
A00
Contents 2

Contents

Overview.....................................................................................................4
Configuring the applications.........................................................................5
Configuring printer settings for use with the applications........................................................................5
Installing certificates manually ........................................................................................................................... 5
Installing certificates automatically .................................................................................................................... 6
Configuring TCP/IP settings ................................................................................................................................ 6
Setting the date and time ................................................................................................................................... 6
Configuring Smart Card Authentication Client..........................................................................................8
Securing access to the printer ............................................................................................................................ 8
Setting up a security template .......................................................................................................................8
Securing access to the home screen ..............................................................................................................9
Securing access to individual applications and functions............................................................................. 10
Configuring login screen settings...................................................................................................................... 11
Configuring manual login setup settings .......................................................................................................... 12
Configuring Smart Card setup settings ............................................................................................................. 12
Configuring advanced settings..........................................................................................................................14
Configuring User Validation Mode settings ...................................................................................................... 15
Configuring Secure Scan To E-mail..........................................................................................................15
Configuring printer email settings .................................................................................................................. .15
Configuring the application settings .................................................................................................................18
Securing access to the application....................................................................................................................18
Configuring Scan to Network..................................................................................................................19
Using a Kerberos ticket for authentication ....................................................................................................... 19
Configuring Secure Print Jobs Release....................................................................................................21
Configuring and securing the application .........................................................................................................21
Using the applications................................................................................23
Using Secure Scan To E-mail....................................................................................................................23
Sending secure e‑mail....................................................................................................................................... 23
Using Scan to Network............................................................................................................................24
Scanning documents at the printer ..................................................................................................................24
Using Secure Print Jobs Release..............................................................................................................25
Printing held jobs .............................................................................................................................................. 25
Troubleshooting.........................................................................................26
Smart Card Authentication Client login issues........................................................................................26
Smart Card Authentication Client authentication issues........................................................................28
Contents 3
Secure Scan To E-mail issues...................................................................................................................36
Secure Print Jobs Release issues.............................................................................................................40
LDAP issues..............................................................................................................................................41
Licensing issues.......................................................................................................................................42
Appendix....................................................................................................43
Notices.......................................................................................................45
Edition notice..........................................................................................................................................45
Index..........................................................................................................50
Overview 4

Overview

Smart Card Authentication Client—This lets you secure access to printers by requiring users to log in using a Smart
Card or a user name and password. You can use the application to secure access to all applications and functions on the printer home screen or to individual applications and functions. The application also provides Kerberos authentication options and a Kerberos ticket that can be used by other secured applications.
Authentication token—If you are using Smart Cards to secure printer access, then this enables the printer to communicate with the type of Smart Card you are using.
Note: You must use the correct authentication token for your Smart Card type.
Background and Idle Screen—This can be secured through Smart Card Authentication Client to provide a secure
idle screen that requires users to authenticate before they can access the printer home screen.
Scan to Network (Basic)—This lets users scan documents to network destinations specified by the network administrator. When Scan to Network is secured through Smart Card Authentication Client, the Kerberos ticket from Smart Card Authentication Client can be used to authenticate to network destinations.
Note: A premium version of Scan to Network is also available that offers advanced features in addition to those of the basic application. For information on the two versions of Scan to Network and on configuring the application, see the Scan to Network and Scan to Network Premium Administrator’s Guide.
For a list of requirements for each application, including supported printers and required firmware versions, see the Readme file for the application.
For information on physically setting up the printer or using the printer features, see the printer User's Guide. After completing initial setup tasks according to the printer User's Gui de, see the Networking Guide th at ca me wi th th e p ri nt er for information on how to connect the printer to your network.
For information on licensing the application, see
“Licensing applications” on page 44.
Configuring the applications 5

Configuring the applications

Configuring printer settings for use with the applications

Even if the printer has been set up previously, make sure all settings have been configured to enable the security features of each application to work correctly.

Changing the panel login timeout

To help prevent unauthorized access if a user leaves the printer unattended with a Smart Card inserted or while logged in, you can limit the amount of time a user stays logged in without activity. If the user does not touch the screen within the specified time, then the session ends and the user is logged out, even if a Smart Card is still inserted.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Miscellaneous Security Settings > Login Restrictions.
3 Set the Panel Login Timeout value (in seconds). The recommended value is 30 seconds.
4 Click Submit.

Installing certificates manually

Note: In select printer models, you can automatically download the CA. For more information, see “Installing
certificates automatically” on page 6.
Before configuring Kerberos or domain controller settings, you must install the appropriate certificates on the printer. At minimum, you must install the certificate of the Certificate Authority (CA) that issued the domain controller certificate. The CA certificate is used for domain controller validation. Additional certificates can be installed if needed. For example, if you plan to use chain validation to validate the domain controller certificate, then you must install the entire certificate chain. Each certificate must be in a separate PEM (.cer) file.
For each certificate you want to install, do the following:
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Certificate Management > Certificate Authority Management > New.
3 Upload the file containing the certificate, and then click Submit.
Note: The file must be in PEM (.cer) format. The contents of the file should resemble the following:
-----BEGIN CERTIFICATE----­MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs … l3DTbPe0mnIbTq0iWqKEaVne1vvaDt52iSpEQyevwgUcHD16rFy+sOnCaQ==
-----END CERTIFICATE-----
Configuring the applications 6

Installing certificates automatically

For eSF v4.x printers, the CA certificate can be installed automatically.
Note: Make sure to add the printer to the Active Directory Domain. For more information on how to add the printer to the Active Directory, see the Embedded Web Server Administrator's Guide for your printer.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Certificate Management > Certificate Authority Management > CA Cert Monitor Setup.
3 Select Enable CA monitor.
If you want to immediately install the CA certificate without waiting for the scheduled run time, then select Fetch immediately.
4 Click Submit.

Configuring TCP/IP settings

Make sure all necessary TCP/IP settings have been configured.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Network/Ports > TCP/IP.
3 Under the TCP/IP heading, do the following:
Verify the domain name. Normally, the domain will be the same one assigned to user workstations.
If you are using a static IP address, then verify the WINS server address and the DNS server address. If a backup
DNS server is available, then type the backup DNS server address.
If the printer is located in a different domain than the domain controller, any e-mail servers you are using, or
any file shares to which printer users may need to scan, then list the additional domains in the Domain Search Order field. Separate each domain name with a comma. If everything is in the same domain, then you can leave the Domain Search Order field blank.
4 Click Submit.

Setting the date and time

In order for users to log in to the printer using Kerberos authentication, the time on the printer clock must be within five minutes of the time on the domain controller system clock. Printer clock settings can be updated manually, or they can be configured to use Network Time Protocol (NTP) to automatically sync with a trusted clock (typically the same clock used by the domain controller).
Setting the date and time manually
1
From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Set Date and Time.
3 In the “Manually Set Date & Time” field, type the correct date and time in YYYY-MM-DD HH:MM format.
Note: Entering manual settings automatically disables the use of NTP.
Configuring the applications 7
4 Select the correct time zone.
Note: If you select (UTC+user) Custom, then you must configure additional settings under the Custom Time
Zone Setup heading.
5 If daylight saving time (DST) is observed in your area, then select Automatically Observe DST.
6 If you are located in a nonstandard time zone or in an area that observes an alternate DST calendar, then adjust
the Custom Time Zone Setup settings.
7 Under the Network Time Protocol heading, verify that Enable NTP is not selected and that the NTP Server field is
cleared.
8 Click Submit.
Using NTP
Note: If your network uses Dynamic Host Configuration Protocol (DHCP), then verify that NTP settings are not
provided by the DHCP server automatically before configuring NTP settings manually.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Set Date and Time.
3 Verify that the “Manually Set Date & Time” field is cleared.
4 Select the correct time zone.
Note: If you select (UTC+user) Custom, then you must configure additional settings under the Custom Time
Zone Setup heading.
5 If daylight saving time is observed in your area, then select Automatically Observe DST.
6 If you are located in a nonstandard time zone or in an area that observes an alternate DST calendar, then adjust
the Custom Time Zone Setup settings.
7 Under the Network Time Protocol heading, select Enable NTP, and then type the IP address or host name of the
NTP server.
8 If the NTP server requires authentication, then do one of the following, depending on the options that are available:
Select MD5 key or Autokey IFF from the Authentication dropdown menu, and then click Install MD5 key or
Install Autokey IFF params to browse to the file containing the NTP authentication credentials. Click Submit to
install the file.
Select Enable Authentication, and then click Install auth keys to browse to the file containing the NTP
authentication credentials. Click Submit to install the file.
9 Click Submit.
Configuring the applications 8

Configuring Smart Card Authentication Client

Smart Card Authentication Client and Application Access Manager must be configured correctly for the other Smart Access Card Solution applications to function securely. Perform all necessary configuration steps in this section before configuring the other applications.

Securing access to the printer

Note: Before securing access to the printer, make sure the Application Access Manager application is installed and
running. For more information about Application Access Manager, see the Application Access Manager Administrator’s Guide.
There are two ways to secure access to the printer:
Enable a secure idle screen that restricts access to the entire home screen. When users insert a Smart Card or touch
the screen, they will be prompted to authenticate before they can access the home screen.
Note: The Background and Idle Screen application must be installed and running on the printer to enable this functionality.
Restrict access to individual applications and functions. Users will be able to access the home screen, but when they
touch a secured home screen icon or attempt to use a secured function, they will be prompted to authenticate before they can access that application or function. You can secure access to:
Installed applications, such as Scan to Network
Individual functions of installed applications, such as the Change Background function of the Background and
Idle Screen application
Builtin printer functions, such as copy and fax
Users will still be able to access unsecured applications and functions without having to authenticate.
Setting up a security template
Before you can secure access to applications and functions, you need to create a security template that uses Smart Card Authentication Client to obtain user credentials. You can then assign this security template to each application and function you want to protect.
1 Create a building block.
a From the Embedded Web Server, click Security > Security Setup.
b Under the Advanced Security Setup heading, click the building block (or blocks) appropriate for your
environment, and then configure it.
Note: For more information on configuring a specific type of building block, see the “Configuring building blocks” section of the Embedded Web Server Administrator’s Guide for your printer.
2 Create a security template.
a From the Embedded Web Server, click Settings or Configuration.
b Click Security > Security Setup.
c Under the Advanced Security Setup heading, click Security Template > Add a Security Template.
d Type a name for the security template (for example, Smart Card).
e From the Authentication Setup menu, select Smart Card Authentication Client, and then click Save Template.
f Verify that your template appears in the Manage Security Templates list.
Configuring the applications 9
Setting up group authorization for the Security Template
Notes:
This method applies only to printers running Embedded Solutions Framework (eSF) version 3.0 or later.
Make sure you have configured the Group Authorization List from the Smart Card Authentication Client
application configuration settings. For more information, see
“Configuring advanced settings” on page 14.
a From the Manage Security Templates list, select the security template name.
b Click Modify Authorization.
c From the Authorization Setup menu, select Smart Card Authentication Client.
d Click Modify Groups.
e Select one or more groups, and then click Save Template.
For more information on configuring security templates and using access controls, see the Embedded Web Server Administrator’s Guide for your printer.
Securing access to the home screen
Use this method to require users to authenticate to view and use the printer home screen.
Note: The Background and Idle Screen application must be installed and running on the printer before you can secure access to the home screen.
1 Access the Background and Idle Screen application configuration settings from the Embedded Web Server.
2 Under the Idle Screen Settings heading, make sure that Enable is selected.
3 In the Start Time field, enter 0. This prompts the printer to start the secure idle screen immediately (0 seconds)
after a user’s login session ends.
4 Under the Home Screen Background heading, make sure that Enable is not selected if you do not want users to be
able to change the home screen background image from the printer control panel.
5 If you want to add custom idle screen images, then click Add under the Idle Screen Images heading.
6 Type an image name, and then upload the file you want to use.
Note: For information about compatible image file types and recommended file sizes, see the mouseover help
next to the field.
7 Click Apply.
8 Repeat step 5 through step 7 to add more idle screen images. You can add up to ten images.
9 If you want to add a custom home screen background image, then under the Home Screen Background heading,
select one of the default images, or upload a custom image in the Custom Image field.
Note: For information about compatible image file types and recommended file sizes, see the mouse‑over help next to the field.
10 If necessary, configure the other application settings. For more information about configuring Background and Idle
Screen, see the Background and Idle Screen Administrator’s Guide.
11 Click Apply.
12 Secure access to the idle screen using Smart Card Authentication Client.
Configuring the applications 10
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later:
a Make sure that you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
“Setting up a security template” on page 8.
b From the Embedded Web Server, click Settings > Security > Security Setup.
c From Step 3 under the Advanced Security Setup heading, click Access Controls.
d If necessary, expand the Device Solutions folder.
e From the Idle Screen dropdown menu, select your security template.
f Click Submit.
On printers running eSF version 2.0:
a Access the Application Access Manager application configuration settings from the Embedded Web Server.
b From the Idle Screen dropdown menu, select Smart Card Authentication Client.
c Click Apply.
Note: If you are unsure about which version of eSF your printer is running, then see
the Embedded Solutions Framework is installed on a printer” on page 44.
“Checking which version of
Securing access to individual applications and functions
Securing access to installed applications and functions
Use this method to restrict access to installed applications, such as Scan to Network, or to restrict access to the individual functions of an installed application, such as the Change Background function of the Background and Idle Screen application.
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later:
1 Make sure you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
2 From the Embedded Web Server, click Settings > Security > Security Setup.
3 From Step 3 under the Advanced Security Setup heading, click Access Controls.
4 If necessary, expand the Device Solutions folder.
5 For each application or function to which you want to secure access, select your security template from the
dropdown menu.
6 Click Submit.
“Setting up a security template” on page 8.
On printers running eSF version 2.0:
1 Access the Application Access Manager application configuration settings from the Embedded Web Server.
2 For each application or function to which you want to secure access, select Smart Card Authentication Client from
the dropdown menu.
3 Click Apply.
Note: If you are unsure about which version of eSF your printer is running, then see
Embedded Solutions Framework is installed on a printer” on page 44.
“Checking which version of the
Configuring the applications 11
Securing access to builtin printer functions
Use this method to restrict access to builtin printer functions, such as copy and fax.
1 Make sure you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
“Setting up a security template” on page 8.
2 From the Embedded Web Server, click Settings or Configuration, and then click Security > Security Setup.
3 From Step 3 under the Advanced Security Setup heading, click Access Controls.
4 If necessary, expand one or more of the access control category folders.
5 For each function to which you want to secure access, select your security template from the dropdown menu.
6 Click Submit.
Notes:
If you have used a built-in printer security setup to protect the Use Profiles access control, then any installed
applications you secure using Smart Card Authentication Client will prompt users for credentials twice. When users touch a secured application icon, they will first be prompted for the credentials specified by the Use Profiles access control, and then they will be prompted for their Smart Card or user name and password.
If you need to secure access to profiles you have created and installed on the printer, then you can remove the
printer security template applied to the Use Profiles access control, and then apply a security template that uses Smart Card Authentication Client. All of your installed profiles will be secured and users will be prompted for their Smart Card or user name and password when they attempt to access a profile.

Configuring login screen settings

You can use the login screen settings to choose how users will be allowed to log in to the printer and whether they will be prompted for a PIN or a password after inserting a Smart Card.
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Login Screen heading, from the Login Type menu, select how users will be allowed to log in to the printer:
Smart Card Only—This allows users to log in using a Smart Card.
Smart Card or Manual Login—This allows users to log in using either a Smart Card or a user name and password.
Manual Login Only—This allows users to log in using a user name and password.
Notes:
If you selected Smart Card or Manual Login or Manual Login Only, then configure the Manual Login
Domain(s) setting under the Manual Login Setup heading. See
page 12. If you do not configure this setting, then users will not be allowed to log in to the printer
manually (using their user name and password).
If you selected Smart Card Only, then configure the setting to User Validation Mode. For more information,
“Configuring User Validation Mode settings” on page 15.
see
3 From the Validate Smart Card menu, select whether users will be prompted to type a PIN or a password after
inserting a Smart Card.
4 Click Apply.
“Configuring manual login setup settings” on
Configuring the applications 12

Configuring manual login setup settings

Notes:
If users are allowed to log in to the printer manually (using a user name and password instead of a Smart Card),
then specify a list of Windows domains for users to select from during login.
For eSF v4.x printers, make sure to specify the domain or domains available for manual login to work. To view
the complete list of supported printers for each version of the Embedded Web Server, see the Readme file.
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Manual Login Setup heading, in the Manual Login Domain(s) field, specify the domain or domains that
will be available for users to select during login. Separate multiple domains with a comma. Domains are casesensitive and are usually typed in lowercase.
3 Click Apply.

Configuring Smart Card setup settings

Note: This is required only in certain printer models. For other printer models, configuring the Kerberos
Authentication system is not required.
Configuring Kerberos settings
In addition to providing the mechanism for validating login credentials, Smart Card Authentication Client can also be configured to provide Kerberos authentication.
Note: As with any form of authentication that relies on an external server, users will not be able to access secured applications and functions if a network issue prevents the printer from communicating with the authenticating server.
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Smart Card Setup heading, from the Kerberos Information menu, do one of the following:
Select Use device Kerberos setup file to use the Kerberos configuration file (krb5.conf) installed on the printer.
Select Use simple Kerberos setup to enter Kerberos information manually in the Simple Kerberos Setup fields.
Notes:
Only one Kerberos realm can be specified using simple Kerberos setup. If you need to specify multiple
realms, then use the device Kerberos setup file.
A Kerberos configuration file from an eSF version 2.0 or eSF version 3.0 printer will not work on an eSF
version 4.0 printer.
Using the device Kerberos setup file
If you selected Use device Kerberos setup file, then make sure the Kerberos configuration file is installed on the printer.
a From the Embedded Web Server, click Settings or Configuration.
b Click Security > Security Setup.
c From Step 1 under the Advanced Security Setup heading, click Kerberos 5.
d Verify that the Kerberos configuration file is installed. If the file is not installed, then under the Import Kerberos
File heading, upload the appropriate krb5.conf file, and then click Submit.
Configuring the applications 13
Using simple Kerberos setup
If you selected Use simple Kerberos setup, then enter the Kerberos information manually under the Simple Kerberos Setup heading. When you click Apply, the values you entered are used to create a Kerberos configuration file.
Realm—Specify the Kerberos realm as configured in Active Directory. This is typically the Windows domain
name. Only one realm can be specified here. To specify multiple realms, customize a Kerberos configuration file and install it on the printer. The realm must be typed in uppercase.
Domain Controller—Specify the IP address or host name of the domain controller or domain controllers used
for validation. Separate multiple values with a comma. The domain controllers will be tried in the order listed.
Domain—Specify the domain or domains that should be mapped to the Kerberos realm specified in the Realm
field. The domain is the second part of the User Principal Name (UserID@DomainName) on the Smart Card. Type the domain in this format: domain name, comma, period, domain name again. For example, DomainName,.DomainName. Multiple domains that map to the specified Kerberos realm can be added here, separated by a comma. For example, DomainName1,.DomainName1,DomainName2,.DomainName2. The domain is case-sensitive and is usually typed in lowercase.
Timeout—Specify the number of seconds (3 to 30) to wait for a response from the domain controller before
trying the next one listed.
Selecting the domain controller validation method
Under the Smart Card Setup heading, from the Domain Controller Validation menu, select the method to use for validating the domain controller certificate:
Note: Before configuring this setting, make sure the appropriate certificates are installed on the printer. See
“Installing certificates manually” on page 5.
Use device certificate validation—This is the most common method. This method uses the certificate of the
Certificate Authority (CA) that issued the domain controller certificate to validate the domain controller certificate. The CA certificate must be installed on the printer.
Use device chain validation—This method uses the entire certificate chain, from the domain controller to the root
CA, to validate the domain controller certificate. The entire certificate chain must be installed on the printer.
Use OCSP validation—This method uses the Online Certificate Status Protocol (OCSP) to validate the domain
controller certificate. The entire certificate chain, from the domain controller to the root CA, must be installed on the printer, and the settings under the Online Certificate Status Protocol (OCSP) heading must be configured:
Responder URL—Specify the IP address or host name of the OCSP responder/repeater and the port being used
(typically 80). Type the value in this format: http://ip_address:port_number. For example, http://255.255.255.0:80. Separate multiple values with a comma. The values will be tried in the order listed.
Responder Certificate—Upload the X.509 certificate for the OCSP responder. This certificate is used to validate
that the response from the OCSP responder is from a trusted source.
Responder Timeout—Specify the number of seconds (5 to 30) to wait for a response from the OCSP responder
before trying the next one listed.
Allow Unknown Status—Select this check box to allow users to log in if the OCSP response indicates that the
certificate status is unknown. If the certificate status is unknown and the check box is cleared, then users will not be allowed to log in.
When you are done configuring Smart Card setup settings, click Apply.
Configuring the applications 14

Configuring advanced settings

Not all networks require you to configure advanced settings. If necessary, adjust the settings to enable the printer to communicate on your network.
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, configure the following settings:
Session User ID—Select how the user ID will be obtained when a user logs in:
None—The user ID is not set. You can select this option if the user ID is not needed by other applications.
User Principal Name—The User Principal Name (UserID@DomainName) retrieved from the Smart Card or
provided during manual login is used to set the user ID.
EDIPI—The "UserID" portion of the User Principal Name (UserID@DomainName) retrieved from the Smart
Card or provided during manual login is used to set the user ID.
LDAP Lookup—The user ID is retrieved from Active Directory.
Email From Address—Select where the printer should retrieve the user's e-mail address when sending e-mail.
Smart Card—This retrieves the e-mail address from the user's Smart Card.
LDAP Lookup—This retrieves the user's e-mail address from Active Directory.
Disable Reverse DNS Lookups—If reverse DNS lookups are not used on your network, then select this check
box (if available).
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later, this setting is not available from the application configuration settings. If your printer is running eSF version 3.0 or later, then do the following to disable reverse DNS lookups:
a From the Embedded Web Server, click Settings > Security > Security Setup. b From Step 1 under the Advanced Security Setup heading, click Kerberos 5. c Under the Kerberos Settings heading, select Disable Reverse IP Lookups. d Click Submit.
Note: If you are unsure about which version of eSF your printer is running, then see
version of the Embedded Solutions Framework is installed on a printer” on page 44.
“Checking which
Wait for user information—For some secured applications to work correctly, additional user information must
be placed in the login session. Select this option to retrieve all user information before allowing the user to access the home screen or secured application.
Note: If you have enabled manual login and you are using the Secure Email application along with Smart Card Authentication Client, then you must select this option. This ensures that a manual login user’s e‑mail address is stored in the login session and is available for use with Secure Email. If this option is not selected, then manual login users cannot send email to themselves automatically. The Secure Email “Send me a copy” option will not be available.
Use SSL for User Info—Select this check box to use an SSL connection to retrieve user information from the
domain controller. If this check box is cleared, then a non-SSL connection is used.
Other User Attributes—List any other LDAP attributes that should be added to the user's session. These
attributes will be used with other applications. Separate multiple values with a comma.
Group Authorization List—List all Active Directory groups that are authorized to use at least one printer function.
Separate multiple groups with a comma. Leave this field blank if you are not using group authorization.
Hosts File—If DNS is not enabled on your network, then upload a text file containing the necessary IP address–
host name mappings.
Configuring the applications 15
Type the mappings in the text file in this format: IP address, space, server host name. For example, 0.0.0.0
HostName. You can assign multiple host names to an IP address. For example, 0.0.0.0 HostName1 HostName2 HostName3. You cannot assign multiple IP addresses to a host name. To assign IP addresses to
groups of host names, type each IP address and its associated host names on a separate line of the text file. For example:
123.123.123.123 HostName1 HostName2
456.456.456.456 HostName3
3 Click Apply.

Configuring User Validation Mode settings

You can secure your printer using the Smart Card without the need to maintain a full Kerberos authentication system. The user inserts the Smart Card into the reader and then enters the PIN in the printer home screen. If the Smart Card PIN matches the PIN entered in the home screen matches, then the user can access the application.
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Login Screen heading, set “Login Type” to Smart Card Only, and then set the Authentication mode to
PIN ONLY.
3 From the Domain Controller Validation menu, select Use device certificate validation.
Note: The Online Certificate Status Protocol (OCSP) must not be configured.
4 Under the Advanced Setting heading, set “E-mail From Address” to Smart Card, and then clear the Wait for user
information check box.
Note: Session User ID must be set to None, and the “Other User Attributes” and “Group Authorization
List“ fields must be empty.
5 Click Apply.

Configuring Secure Scan To E-mail

Note: Before configuring Secure Scan To E-mail, make sure you have configured all necessary Smart Card
Authentication Client security settings. See
Configuring printer email settings
For the application to work correctly, the SMTP, email, and address book settings on the printer must be configured.
Configuring SMTP settings
1
From the Embedded Web Server, click Settings or Configuration.
“Configuring Smart Card Authentication Client” on page 8.
2 Click E-mail/FTP Settings > SMTP Setup.
3 Under the SMTP Setup heading, configure the following settings:
Primary SMTP Gateway—Type the IP address or host name of the primary SMTP server the printer will use for
sending e-mail.
Note: If you are using Kerberos to authenticate users to the SMTP server, then you must use the host name.
Primary SMTP Gateway Port—Enter the port number of the primary SMTP server.
Configuring the applications 16
Secondary SMTP Gateway—If you are using a secondary or backup SMTP server, then type the server IP address
or host name.
Secondary SMTP Gateway Port—If you are using a secondary or backup SMTP server, then enter the server
port number.
SMTP Timeout—Specify the number of seconds the printer will wait for a response from the SMTP server before
timing out.
Reply Address—Make sure this field is cleared.
Use SSL/TLS—Select Disabled, Negotiate, or Required to specify whether e-mail will be sent using an encrypted
link.
4 Under the Authentication heading, configure the following settings:
SMTP Server Authentication—If the SMTP server requires user credentials, then select Kerberos 5. If Kerberos
is not supported, then select No authentication required.
Note: If the SMTP server requires user authentication to send an e-mail but does not support Kerberos, then the IP address or host name of the printer must be added to the SMTP server as a relay.
DeviceInitiated Email—Select None or Use Device SMTP Credentials.
Note: If the printer must provide credentials to send an e-mail, then enter the appropriate information under the Device Credentials heading.
UserInitiated Email—Select Use Session User ID and Password if you are using Kerberos authentication. Select
None if you are not using Kerberos authentication.
5 Click Submit.
Configuring e-mail server settings
1
From the Embedded Web Server, click Settings or Configuration.
2 Click E-mail/FTP Settings > E-mail Settings.
3 Under the E-mail Server Settings heading, configure the following settings:
Subject—Type a default subject line for each e-mail sent from the printer. For example, Scanned Document.
Message—Type a default message for the body of each e-mail sent from the printer. For example, Please
see the attached document.
Send me a copy—You do not need to configure this setting. When the Secure E‑mail application is installed and
running, the “Send me a copy” option is always available to users when they send email from the printer, regardless of how this setting is configured.
4 Click Submit.
Configuring scan settings
1
From the Embedded Web Server, click Settings or Configuration.
2 Click E-mail/FTP Settings > E-mail Settings.
3 Under the E-mail Settings heading, configure the following settings if necessary:
Color—To reduce the file size of scanned documents and images, select Off or Gray.
Resolution—The recommended range is between 150 dpi and 300 dpi. You can choose a higher resolution to
improve image quality, but higher resolutions increase the file size of scanned documents and images.
Configuring the applications 17
Transmission Log—The recommended setting is Print only for error.
E-mail Bit Depth—Select 8 bit for grayscale imaging or 1 bit for black and white.
4 Adjust the other scan settings if necessary.
5 Click Submit.
Configuring the address book
Configuring these settings enables users to search your network global address book for e-mail addresses.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Network/Ports > Address Book Setup.
3 Configure the following settings:
Server Address—Type the host name (not the IP address) of the LDAP server.
Server Port—Enter the server port number that will be used for address book lookups. The most commonly
used values are:
NonSSL connections—Port 389 (the default setting on the printer)
SSL connections—Port 636
NonSSL Global Catalog—Port 3268
SSL Global Catalog—Port 3269
LDAP Certificate Verification—Select Never, Allow, Try, or Demand.
Use GSSAPI—Select this check box.
Mail Attribute—Type a name for the mail attribute (usually “mail”).
Fax Number Attribute—Leave this set to the default value.
Search Base—Type one or more values to be used when querying the LDAP directory. Separate multiple values
with a comma.
Search Timeout—Specify the maximum number of seconds allowed for each LDAP query.
Displayed Name—Select the combination of LDAP attributes to use to find the displayed name for an e-mail
address (also referred to as the “friendly” name). If you are not sure which option to select, then leave this set to the default value.
Max Search Results—Specify the maximum number of search results to be returned from an LDAP query.
Use user credentials—Select this check box. This ensures that the address book is protected by the credentials
that are provided when you secure access to the address book function. See
book” on page 19.
“Securing access to the address
4 Click Submit.
Configuring the applications 18

Configuring the application settings

Configuring digital signing
1
Access the application configuration settings from the Embedded Web Server.
2 Configure the following setting:
Sign Email—Do one of the following:
Select Prompt User to let users choose to digitally sign their e-mail.
Select Disabled to disable digital signing.
Select Always Sign to require all email to be digitally signed.
Note: For users to digitally sign email, they must have a valid digital signing certificate.
3 Click Apply.
Configuring email encryption
1
Access the application configuration settings from the Embedded Web Server.
2 Configure the following settings:
Encrypt Email—Do one of the following:
Select Prompt User to let users choose to encrypt their email.
Select Disabled to disable encryption.
Select Always Encrypt to require all email to be encrypted.
Note: For users to send encrypted e‑mail to a recipient, the recipient must be in the global address book and must have a valid encryption certificate.
Encryption Algorithm—Select an algorithm to use for encrypting email. The most common setting is “Triple
DES.”
LDAPPrimary Certificate—Specify the LDAP attribute to search for a recipient's encryption certificate. The most
common setting is “userSMIMECertificate.”
LDAPAlternate Certificate—Specify the LDAP attribute to search if a recipient's encryption certificate is not
found in the primary attribute. The most common setting is “userCertificate.”
Signing Algorithm—Select the algorithm to use for digital signature. The most common setting is “SHA1.”
User can only send to self—Select this check box to allow users to send email only to themselves.
3 Click Apply.

Securing access to the application

This application runs in place of the standard email function on the printer. For the security features of the application to work correctly, you must use Smart Card Authentication Client to secure access to the printer email function. When users attempt to access the secured email function, they will be prompted to authenticate.
When Smart Card Authentication Client is associated with the email function, it must be configured to specify where the printer should retrieve an authenticated user’s e‑mail address when the user sends an email. The user’s email address will be placed in the “From” field of the sent e‑mail.
Configuring the applications 19
To secure access to the email function and specify where to get the user’s email address:
1 Make sure you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
“Setting up a security template” on page 8.
2 From the Embedded Web Server, click Settings or Configuration, and then click Security > Security Setup.
3 From Step 3 under the Advanced Security Setup heading, click Access Controls.
4 If necessary, expand the Function Access folder.
5 From the Email Function dropdown menu, select your security template.
6 Click Submit.
7 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
8 Make sure you have configured the “Email From Address” setting.
9 Click Apply.
Securing access to the address book
For users to search the global address book for email addresses, you must use Smart Card Authentication Client to secure access to the address book function.
1 Make sure you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
“Setting up a security template” on page 8.
2 From the Embedded Web Server, click Settings or Configuration, and then click Security > Security Setup.
3 From Step 3 under the Advanced Security Setup heading, click Access Controls.
4 If necessary, expand the Function Access folder.
5 From the Address Book dropdown menu, select your security template.
6 Click Submit.

Configuring Scan to Network

Note: Before configuring Scan to Network, make sure you have configured all necessary Smart Card Authentication
Client security settings. See

Using a Kerberos ticket for authentication

Smart Card Authentication Client provides a Kerberos ticket that can be used to authenticate to network destinations. To configure a Scan to Network destination to use this ticket:
1 Make sure that you have configured the Smart Card Authentication Client Kerberos settings. See “Configuring
Kerberos settings” on page 12.
“Configuring Smart Card Authentication Client” on page 8.
2 Access the Scan to Network application configuration settings from the Embedded Web Server.
3 Under the Scan Destination heading, click Add.
Note: You can also edit an existing destination.
4 Type a name for the destination.
Configuring the applications 20
5 Under the Location heading, select Network Folder, and then configure the location settings.
6 Under the Authentication Options heading, select Use Kerberos authentication. The Kerberos credentials from
Smart Card Authentication Client will be used to access the network destination.
Notes:
This option is visible if the location is set to Network Folder.
If you select this option, then make sure that Use MFP authentication credentials is also selected.
7 In the sections that follow, adjust the settings.
Select check boxes to allow users to modify settings.
Use radio buttons and dropdown menus to specify the default settings.
8 Under the File heading, in the Name field, type a default base name for the scan file. The file extension is generated
automatically according to the value of the Format field in the Scan Settings section.
9 Click OK, and then click Apply.
10 Secure access to Scan to Network using Smart Card Authentication Client.
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later:
a Make sure that you have created a security template that uses Smart Card Authentication Client to obtain user
credentials. See
“Setting up a security template” on page 8.
b From the Embedded Web Server, click Settings > Security > Security Setup.
c From Step 3 under the Advanced Security Setup heading, click Access Controls.
d If necessary, expand the Device Solutions folder.
e From the Scan to Network dropdown menu, select your security template.
f Click Submit.
On printers running eSF version 2.0:
a Access the Application Access Manager application configuration settings from the Embedded Web Server.
b From the Scan to Network dropdown menu, select Smart Card Authentication Client.
c Click Apply.
Note: If you are unsure about which version of eSF your printer is running, then see
the Embedded Solutions Framework is installed on a printer” on page 44.
For more information about configuring Scan to Network, see the Scan to Network and Scan to Network Premium Administrator’s Guide.
“Checking which version of
Configuring the applications 21

Configuring Secure Print Jobs Release

Note: Before configuring Secure Print Jobs Release, make sure you have configured all necessary Smart Card
Authentication Client security settings. See

Configuring and securing the application

1
2
Configure the following settings:
Icon Text—Specify a name for the application icon that appears on the printer home screen.
Up Icon—Browse to a new image file that represents the profile on the printer home screen.
Down Icon—Browse to a new image file that appears while the profile icon is being pressed.
3 Under Release Options, configure the following settings:
Release Method—Select whether to let users choose the jobs they want to print or to print all pending jobs.
Display Print Jobs Sorted By—Specify the order in which print jobs will be listed on the printer control panel.
4 Under Job Expiration, set the expiration for Verify and Repeat print jobs.
“Configuring Smart Card Authentication Client” on page 8.
There are four types of held jobs:
Confidential—This lets you store print jobs on the printer until you log in and release or delete them.
Verify—This lets you print one copy of a print job and store the remaining copies on the printer. This enables
you to make sure that the first copy is satisfactory before printing the remaining copies. The print job is automatically deleted from the printer after all copies are printed.
Reserve—This lets you store print jobs on the printer. The print jobs are automatically deleted after they are
printed.
Repeat—This lets you print all copies of a print job and store the job on the printer so you can print additional
copies later. You can print additional copies as long as the job is stored on the printer.
Note: To specify the expiration of Confidential and Reserve print jobs, click Settings or Configuration, and then click Security > Confidential Print Setup.
5 Under Advanced Settings, configure the following settings if necessary:
Require All Jobs to be Held—Select this check box to require all jobs to remain on the printer until they are
released by an authorized user or until they expire. This converts all job types to Confidential print jobs.
Clear Print Data—Select this check box to clear the memory associated with each print job when the job is
released.
6 Click Apply.
7 Secure access to Secure Print Jobs Release.
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later:
a
From the Embedded Web Server, click Settings or Configuration.
b Click Security > Security Setup.
c Under Advanced Security Setup, click Security Template > Add a Security Template.
d Type a name for the security template (for example, Secure Print Jobs Release).
e From the Authentication Setup menu, select the authentication module you want to use to secure access to
Secure Print Jobs Release, and then click Save Template.
Configuring the applications 22
f Under Advanced Security Setup in step c, click Access Controls.
g If necessary, expand the Device Solutions or Apps folder.
h From the Secure Print Jobs Release menu, select your security template, and then click Submit.
On printers running eSF version 2.0:
a
From the Embedded Web Server, access the configuration page for the Application Access Manager application.
b From the Secure Print Jobs Release menu, select Smart Card Authentication Client.
c Click Apply.
Using the applications 23

Using the applications

Using Secure Scan To E-mail

Note: If manual login is enabled, then the “Wait for user information” option must be selected in the Smart Card
Authentication Client application configuration settings. See ensures that a manual login user’s email address is stored in the login session and is available for use with Secure Scan To Email. If this option is not selected, then manual login users cannot send email to themselves automatically. The “Send me a copy” option will not be available.
Sending secure email
Note: You can return to the printer home screen if you want to cancel the sending of the email.
1 Load the document into the printer.
Note: Documents may be loaded into the Automatic Document Feeder (ADF) or on the scanner glass. For
information on the different methods of loading documents, see the User’s Guide that came with the printer.
“Configuring advanced settings” on page 14. This
2 From the printer home screen, touch the application icon.
3 If prompted, enter your authentication credentials.
4 Use the keyboard to type an email address, or search the address book. Select Send me a copy if you want to
automatically send a copy of the email to yourself.
5 Touch Next Address to add additional recipients.
6 When you are done adding recipients, touch Email It.
7 If prompted, select whether to digitally sign the email, encrypt the email, or do both. Leave both options cleared
to send an unsigned, unencrypted e‑mail.
Note: Depending on how the application is configured, you may see only one option, or you may not see this prompt at all.
8 If prompted, enter your PIN or password for sending digitally signed email.
9 To digitally sign email, you must have a valid digital signing certificate. If a signing certificate error message appears,
then follow the instructions on the screen:
If the message “No signing certificate is available to sign your e‑mail” appears, then touch Next to send the email
without a digital signature, or return to the home screen to cancel the sending of the e‑mail.
If the message “The e‑mail cannot be sent because your signing certificate could not be found” appears, then
you will need to obtain a signing certificate, or the application will need to be configured to allow you to send unsigned e‑mail.
Using the applications 24
10 For encrypted email to be sent to a recipient, the recipient must be in the global address book and must have a
valid encryption certificate. If an encryption certificate error message appears, then follow the instructions on the screen:
If the message “Cannot encrypt email for one or more recipients” appears, then do one of the following:
Select Send encrypted email only to send encrypted email only to recipients who have encryption
certificates. Recipients who do not have encryption certificates will not receive the e‑mail.
Select Send all emails unencrypted to send unencrypted email to all recipients.
Return to the home screen to cancel the sending of the email.
If the message “Encryption certificate not found for one or more recipients” appears, then touch Next to send
encrypted email only to recipients who have encryption certificates (recipients who do not have encryption certificates will not receive the email), or return to the home screen to cancel the sending of the e‑mail.
If the message “No encryption certificates could be found for any of the addresses you entered” appears, then
touch Next to send unencrypted email to all recipients, or return to the home screen to cancel the sending of the e‑mail.
If the message “The e‑mail cannot be sent because encryption certificates could not be found for any recipients”
appears, then each recipient will need to obtain an encryption certificate, or the application will need to be configured to allow you to send unencrypted e‑mail.
The printer performs a connection test with the email server, and then scans the first page of your document.
11 To scan additional pages, load the next page, and then touch Scan the Next Page. If you have no more pages to
scan, then touch Finish the Job.

Using Scan to Network

Scanning documents at the printer

1 Load the document into the printer.
Note: Documents may be loaded into the Automatic Document Feeder (ADF) or on the scanner glass. For
information on the different methods of loading documents, see the User's Guide that came with the printer.
2 From the printer home screen, touch the application icon.
3 If prompted, enter your authentication credentials.
4 Select the destination where you want to receive the scanned document. If prompted, enter the credentials required
to access the destination. Contact your system support person for login information.
5 Some additional job options may be available depending on how the application has been configured. Follow the
instructions on the screen to update the options. Contact your system support person for more information on each option.
6 Touch Scan It or Send It. Depending on how the application has been configured, you may have the option to
preview and make adjustments to scanned pages.
7 To scan additional documents, load the next document, and then do one of the following from the confirmation
screen:
Touch Yes, to same destination to scan the document to the previous destination.
Touch Yes, to a different destination to scan the document to a different destination.
Touch No to finish the scan job and return to the printer home screen.
Using the applications 25

Using Secure Print Jobs Release

Printing held jobs

1 With a document open, click File > Print.
2 Select the printandhold feature:
For Windows users, click Properties, Preferences, Options, or Setup. Then click Print and Hold, or click Other
Options > Print and Hold.
For Macintosh users, select Job Routing from the print options or the ”Copies & Pages” menu.
3 Select the print job type:
Confidential—This lets you store print jobs on the printer until you log in and release or delete them.
Verify—This lets you print one copy of a print job and store the remaining copies on the printer. This enables
you to make sure that the first copy is satisfactory before printing the remaining copies.
Reserve—This lets you store print jobs on the printer.
Repeat—This lets you print all copies of a print job and store the job on the printer so you can print additional
copies later. You can print additional copies as long as the job is stored on the printer.
Notes:
Confidential, Verify, and Reserve print jobs are automatically deleted from memory after printing.
Repeat print jobs are held in the printer until you delete them. If Require All Jobs to be Held is checked,
then Repeat print jobs expire at the same time as Confidential print jobs.
4 Type the user name from the LDAP directory. For a Confidential print job, also enter a fourdigit PIN.
Note: Because you are required to authenticate to use the printer or the application, you will not be prompted
to enter this PIN when you print Confidential jobs using this application. The PIN is needed only for printing Confidential jobs using the builtin held jobs function on the printer.
5 Click OK or Print.
6 From the printer home screen, touch the application icon.
7 If prompted, enter your authentication credentials.
8 Select the job or jobs you want to print, specify the number of copies to print, and then print the job.
Note: Depending on how the application is configured, all jobs in your print release queue may print automatically
when you touch the application icon.
If you want to delete selected jobs from your print release queue, then touch Delete.
Troubleshooting 26

Troubleshooting

Smart Card Authentication Client login issues

“A card reader was not detected on this device” error message

M
AKE SURE A SUPPORTED SMART CARD READER IS ATTACHED
If you want users to access the printer using a Smart Card, then attach a supported Smart Card reader to the printer. See the Readme file for a list of supported card readers.
ALLOW USERS TO LOG IN MANUALLY
If you have enabled manual login, then this error message will prompt users that they can “press Login to manually authenticate.” This indicates that users can still log in to the printer using a user name and password instead of a Smart Card.

“Unsupported USB Device” error message when a Smart Card reader is attached to the printer

Try one or more of the following:
MAKE SURE THAT THE SMART CARD READER IS SUPPORTED
See the Readme file for a list of supported card readers.
MAKE SURE THAT THE REQUIRED FIRMWARE VERSION IS INSTALLED
The minimum required firmware version or a later version must be installed before you can attach a supported card reader to the printer. Remove the card reader, and then see the Readme file for a list of required firmware versions.
MAKE SURE THAT ALL REQUIRED APPLICATIONS ARE INSTALLED AND RUNNING
Smart Card Authentication Client, Application Access Manager, and the authentication token for your Smart Card must be installed and running before you can attach a supported card reader to the printer.

“An error occurred while reading the card. Remove your card and try again” error message

C
HECK THE SYSTEM LOG FOR RELEVANT DETAILS
1 Access the list of installed applications from the Embedded Web Server.
2 Click System tab > Log.
Troubleshooting 27
3 From the Filter menu, select an application status.
4 From the Application menu, select the application, and then click Submit.
If you are still unable to determine the cause of the error, then you may need to replace the card.

“Your card has been locked out from future login attempts” error message

This error occurs after a user enters an invalid Smart Card PIN or password too many times or if a user attempts to authenticate using a card that has already been locked out due to too many invalid PIN/password entries.
RESET OR REPLACE THE CARD
When a card is locked out, it will need to be reset or replaced. Find out whether the type of card you are using can be reset. If the card cannot be reset, then it will need to be replaced.

“An error occurred while checking your PIN. Remove your card and try again” error message

HECK THE SYSTEM LOG FOR RELEVANT DETAILS
C
1 Access the list of installed applications from the Embedded Web Server.
2 Click System tab > Log.
3 From the Filter menu, select an application status.
4 From the Application menu, select the application, and then click Submit.

User is unable to log in manually

M
AKE SURE THE MANUAL LOGIN DOMAIN(S) FIELD ARE SPECIFIED
Verify that the domains under Manual Login Domain(s) are specified. See “Configuring manual login setup settings”
on page 12.

User is logged out almost immediately after logging in

I
NCREASE THE PANEL LOGIN TIMEOUT INTERVAL
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Miscellaneous Security Settings > Login Restrictions.
3 Increase the number of seconds specified in the Panel Login Timeout field, and then click Submit.
Troubleshooting 28

The printer home screen fails to return to a locked state when not in use

Try one or more of the following:
MAKE SURE ALL REQUIRED APPLICATIONS ARE INSTALLED AND RUNNING
Smart Card Authentication Client, Application Access Manager, and the authentication token for your Smart Card must be installed and running in order to restrict access to the printer home screen or to individual home screen applications and functions. Background and Idle Screen must also be installed and running if you want to secure access to the entire home screen.
MAKE SURE THE HOME SCREEN OR HOME SCREEN ICONS ARE SECURED
Either the entire home screen or individual home screen applications and functions must be secured correctly. See
“Securing access to the printer” on page 8.

Smart Card Authentication Client authentication issues

“Authentication failed” error message

This error occurs when Kerberos authentication fails or domain controller validation fails while a user is attempting to log in to the printer.
CHECK THE SYSTEM LOG FOR RELEVANT DETAILS
1 Access the list of installed applications from the Embedded Web Server.
2 Click System tab > Log.
3 From the Filter menu, select an application status.
4 From the Application menu, select the application, and then click Submit.

“Kerberos configuration file has not been uploaded” error message

This system log error indicates that the Kerberos configuration file is not installed on the printer.
MAKE SURE THE KERBEROS CONFIGURATION FILE IS INSTALLED
If you want to use the device Kerberos setup file, then make sure the file is installed on the printer.
If you want to use simple Kerberos setup to create the Kerberos configuration file, then manually configure the simple Kerberos setup settings.
For information about installing a Kerberos configuration file or configuring simple Kerberos setup settings, see
“Configuring Kerberos settings” on page 12.
Troubleshooting 29

“Kerberos configuration file is not properly formatted” error message

This system log error indicates that the Kerberos configuration file contains incorrect information, is missing information, or is not formatted properly.
MODIFY THE INSTALLED KERBEROS CONFIGURATION FILE
If you used the device Kerberos setup file, then modify and reinstall the file.
If you used simple Kerberos setup, then modify the simple Kerberos setup settings. For information about configuring simple Kerberos setup settings, see
“Using simple Kerberos setup” on page 13.
“Unable to authenticate. Check Kerberos configuration file to verify Windows support enabled” error message
This system log error indicates that the Windows domain is not specified in the Kerberos configuration file.
MAKE SURE THE WINDOWS DOMAIN IS SPECIFIED
If you used the device Kerberos setup file, then add an entry to the domain_realm section of the file, mapping the lowercase Windows domain to the uppercase realm. When you are done, reinstall the file on the printer.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, add the Windows domain (in lowercase) to the Domain field.
Example: If the value in the Domain field is DomainName,.DomainName and the Windows domain is x.y.z, then change the value in the Domain field to DomainName,.DomainName,x.y.z.
3 Click Apply.
“Unable to generate certificate from card” or “Unable to read certificate information from card” error message
These system log errors indicate that the Smart Card certificate was not found or that an error occurred while the application was attempting to retrieve data from the Smart Card certificate.
CHECK THE CERTIFICATE ON THE SMART CARD
Verify that the certificate information on the Smart Card is correct. If the information is correct and the issue still occurs, then contact your solutions provider.
Troubleshooting 30
“The domain controller did not respond within the required time; the domain controller timeout may need to be increased” error message
Try one or more of the following:
INCREASE THE DOMAIN CONTROLLER TIMEOUT
If you used the device Kerberos setup file, then increase the number of seconds specified for the timeout entry in the file. When you are done, reinstall the file on the printer.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, increase the number of seconds specified in the Timeout field.
3 Click Apply.
MAKE SURE THE DOMAIN CONTROLLER IP ADDRESS OR HOST NAME IS CORRECT
If you used the device Kerberos setup file, then:
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Security Setup > Kerberos 5 > View File.
3 Make sure the domain controller IP address or host name specified in the configuration file is correct.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, verify that the IP address or host name specified in the Domain
Controller field is correct.
3 Click Apply.
MAKE SURE THE DOMAIN CONTROLLER IS AVAILABLE
This error can occur if the domain controller is not available at the time a user is trying to authenticate to the printer. You can resolve this by specifying multiple domain controllers. If a domain controller is not available, then the next one listed will be tried. You can specify multiple domain controllers in the Kerberos configuration file or in the simple Kerberos setup Domain Controller field. If you are using the Domain Controller field, then separate each value with a comma.
MAKE SURE PORT 88 IS NOT BLOCKED BY A FIREWALL
Port 88 must be opened between the printer and the domain controller for authentication to work.
Troubleshooting 31

“The domain controller issuing certificate has not been installed” error message

This system log error indicates that the required Certificate Authority (CA) certificate is not installed or that an incorrect certificate is installed.
If an incorrect certificate is installed, then the error message specifies the name of the certificate that is needed: “The domain controller issuing certificate [NAME OF CERTIFICATE] has not been installed.”
MAKE SURE THE CORRECT CERTIFICATES ARE INSTALLED ON THE PRINTER
See “Installing certificates manually” on page 5.
“The realm on the card was not found in the Kerberos configuration file” or “User’s realm was not found in the Kerberos configuration file” error message
These system log errors indicate that the user’s realm in the Kerberos configuration file is missing or incorrect.
ADD THE MISSING REALM OR MODIFY THE INCORRECT REALM
If you used the device Kerberos setup file, then add the missing realm or realms to the file, or modify the incorrect realms. Make sure each realm is typed in uppercase. When you are done, reinstall the file on the printer.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, add the missing realm to the Realm field or correct the realm. Make
sure the realm is typed in uppercase.
Note: The simple Kerberos setup settings do not support multiple Kerberos realm entries. If multiple realms are needed, then install a Kerberos configuration file containing the necessary realms.

“Unable to authenticate. Verify the realm was specified in UPPERCASE” error message

AKE SURE THE KERBEROS REALM IS IN UPPERCASE
M
If you used the device Kerberos setup file, then:
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Security Setup > Kerberos 5 > View File.
3 Make sure the realm entries in the configuration file are in uppercase.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, make sure the realm is correct and that it is typed in uppercase.
3 Click Apply.
Troubleshooting 32

“Unable to contact the domain controller for the user’s realm” error message

This system log error indicates that the domain, realm, or domain controller specified in the Kerberos configuration file is incorrect.
CHECK THE DOMAIN, REALM, AND DOMAIN CONTROLLER IN THE KERBEROS CONFIGURATION FILE
If you used the device Kerberos setup file, then:
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Security Setup > Kerberos 5 > View File.
3 Make sure all domain, realm, and domain controller information is correct.
If you used simple Kerberos setup, then:
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Simple Kerberos Setup heading, make sure the values typed in the Realm, Domain Controller, and
Domain fields are correct. For information about configuring these settings, see
on page 13.
“Using simple Kerberos setup”
3 Click Apply.
“Domain controller and device clocks are different beyond an acceptable range. Check the device's date and time” error message
This system log error indicates that the printer clock is more than five minutes out of sync with the domain controller system clock.
CHECK THE DATE AND TIME ON THE PRINTER
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Set Date and Time.
If you configured date and time settings manually, then verify or correct the settings. Make sure the time
zone and daylight saving time (DST) settings are correct.
If you configured the printer to use a Network Time Protocol (NTP) server, then verify that the NTP settings
are correct and that the NTP server is functioning correctly.
Note: If your network uses Dynamic Host Configuration Protocol (DHCP), then verify that NTP settings are not provided by the DHCP server automatically before configuring NTP settings manually.
3 Click Submit.

“Unable to validate certificate from domain controller” error message

This system log error indicates that the required Certificate Authority (CA) certificate or certificates are not installed on the printer or that you selected the wrong domain controller validation method. Try one or more of the following:
MAKE SURE THE CORRECT CERTIFICATES ARE INSTALLED ON THE PRINTER
See “Installing certificates manually” on page 5.
Troubleshooting 33
CHECK THE DOMAIN CONTROLLER VALIDATION METHOD
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Smart Card Setup heading, make sure you selected the correct method from the Domain Controller
Validation menu. For information about configuring this setting, see
method” on page 13.
3 Click Apply.
“Selecting the domain controller validation
“An error occurred during domain controller chain validation” or “At least one of the certificates in the domain controller certificate chain has been revoked” error message
These system log errors indicate that there is a problem with one or more of the certificates needed for chain validation. Certificates may be missing, expired, or revoked, or they may contain incorrect information.
CHECK THE CERTIFICATES INSTALLED ON THE PRINTER
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Certificate Management > Certificate Authority Management.
3 Make sure all certificates required for chain validation are installed and contain correct information. Make sure
none of the certificates have been revoked or are expired.
If you need to install certificates, then see
If all certificates are installed correctly and these issues still occur, then contact your solutions provider.
“Installing certificates manually” on page 5.

“The OCSP responder URL or certificate has not been configured” error message

This system log error indicates that OCSP settings are not configured correctly.
CHECK THE OCSP RESPONDER URL AND RESPONDER CERTIFICATE
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Online Certificate Status Protocol (OCSP) heading, make sure the values in the Responder URL and
Responder Certificate fields are correct. For information about configuring these settings, see
domain controller validation method” on page 13.
3 Click Apply.
“Selecting the
Troubleshooting 34

“An error occurred while trying to connect to the OCSP responder” error message

This system log error indicates that the OCSP responder URL is configured incorrectly or that the responder timed out before the application could connect to it. Try one or more of the following:
CHECK THE OCSP RESPONDER URL
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Online Certificate Status Protocol (OCSP) heading, make sure the value in the Responder URL field is
correct. For information about configuring this setting, see
on page 13.
3 Click Apply.
“Selecting the domain controller validation method”
INCREASE THE RESPONDER TIMEOUT
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Online Certificate Status Protocol (OCSP) heading, increase the number of seconds specified in the
Responder Timeout field.
3 Click Apply.
“The status of at least one of the certificates in the domain controller certificate chain is unknown” error message
Try one or more of the following:
CHECK THE CERTIFICATES INSTALLED ON THE PRINTER
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Security > Certificate Management > Certificate Authority Management.
3 Make sure all certificates required for chain validation are configured correctly. See “Installing certificates
manually” on page 5.
ALLOW USERS TO LOG IN IF THE CERTIFICATE STATUS IS UNKNOWN
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Online Certificate Status Protocol (OCSP) heading, select Allow Unknown Status. This allows users to
log in to the printer even if the status of one or more of the required certificates is unknown.
3 Click Apply.
Troubleshooting 35
“The OCSP responder certificate, stored on the printer, does not match the one returned by the responder” error message
Try one or more of the following:
CHECK THE OCSP RESPONDER CERTIFICATE
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Online Certificate Status Protocol (OCSP) heading, make sure the correct certificate has been uploaded
in the Responder Certificate field.
3 Click Apply.
CHECK THE CERTIFICATE RETURNED FROM THE OCSP RESPONDER
Make sure the OCSP responder is returning the correct certificate.
“An error occurred while trying to validate the domain controller certificate against the OCSP responder” error message
This system log error indicates that the domain controller is returning an incorrect certificate or that the OCSP responder is not checking the correct certificate. Try one or more of the following:
CHECK THE DOMAIN CONTROLLER CERTIFICATE
Make sure the domain controller is returning the correct certificate.
CHECK THE OCSP RESPONDER
Make sure the OCSP responder is checking the correct domain controller certificate.
“The user is not authorized to use this device. Make sure the user belongs to an Active Directory group that is authorized to use the device” error message
This system log error usually indicates that the user is not in an Active Directory group that is authorized to use the printer. Try one or more of the following:
ADD THE USER TO AN AUTHORIZED ACTIVE DIRECTORY GROUP
If user authorization is enabled for the printer, then add the user to an Active Directory group that is included in the authorization list for the printer.
Troubleshooting 36
ADD THE USERS GROUP TO THE AUTHORIZATION LIST FOR THE PRINTER
Make sure the user’s Active Directory group is listed in the Group Authorization List field in the application configuration settings.
1 Access the application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, add the user’s Active Directory group to the Group Authorization List field.
Separate multiple groups with a comma.
3 Click Apply.

Secure Scan To E-mail issues

“The email cannot be sent because your email address could not be retrieved” error message
This error occurs when the user’s email address could not be retrieved from the Smart Card or the LDAP lookup. Try one or more of the following:
MAKE SURE THE PRINTER EMAIL FUNCTION IS SECURED
For Smart Card Authentication Client to retrieve user email addresses, the printer email function must be secured correctly. See
“Securing access to the application” on page 18.
MAKE SURE USER EMAIL ADDRESSES ARE RETRIEVED CORRECTLY
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, from the Email From Address menu, do one of the following:
Select Smart Card if users log in to the printer using Smart Cards.
Select LDAP Lookup if users log in to the printer manually (using a user name and password).
3 Click Apply.
CHECK THE LDAP SETTINGS
For information about resolving LDAP issues, see “LDAP issues” on page 41.
“Your email cannot be sent because your signing certificate could not be retrieved” error message
This error occurs when the digital signing certificate could not be retrieved from the user’s Smart Card.
CHECK THE SIGNING CERTIFICATE ON THE USERS SMART CARD
For users to digitally sign email, the Smart Card must contain a valid digital signing certificate. Check the Smart Card to make sure it contains a signing certificate.
Troubleshooting 37
“No signing certificate is available to sign your e-mail. Press Next to continue without digital signature” or “The email cannot be sent because your signing certificate could not be found” error message
Email can be digitally signed only if users log in using a Smart Card that contains a valid signing certificate. Users cannot digitally sign email if they log in manually (using a user name and password) or if they do not have a signing certificate on their Smart Card.
If you configured the application to allow users to choose whether to digitally sign their email, then the first error message is shown to users who do not have signing certificates. They can either send the email without a digital signature or return to the home screen to cancel the sending of the e‑mail.
If you configured the application to require email to be digitally signed, then the second error message is shown to users who do not have signing certificates. These users cannot send email. If you want all email sent from the printer to be digitally signed, then make sure a signing certificate is available for each user.
“The e-mail cannot be sent because an error occurred trying to retrieve user certificates from the LDAP server” error message
Try one or more of the following:
CHECK THE ADDRESS BOOK SETUP
For information about configuring address book settings, see “Configuring the address book” on page 17.
MAKE SURE THE ADDRESS BOOK FUNCTION IS SECURED
For users to search the global address book for email addresses, the address book function must be secured correctly.
“Securing access to the address book” on page 19.
See
CHECK THE LDAP SETTINGS
For information about resolving LDAP issues, see “LDAP issues” on page 41.
MAKE SURE THE PRINTER IS CONNECTED TO THE NETWORK
Make sure all appropriate network cables are connected securely and the network settings of the printer are configured correctly. For information on networking the printer, see the printer User’s Guide on the Software and Documentation CD that came with the printer.
“Cannot encrypt email for one or more recipients. Choose one of the following” or “Encryption certificate not found for one or more recipients. Press Next to send e-mail only to recipients with certificates” error message
These errors indicate that the user tried to send encrypted email to one or more recipients who do not have encryption certificates. For users to send encrypted email to a recipient, the recipient must be in the global address book and must have a valid encryption certificate. Users cannot send encrypted email to recipients who do not have encryption certificates.
Troubleshooting 38
If you configured the application to allow users to choose whether to encrypt their email, then the first error message is shown to users when one or more recipients do not have encryption certificates. Users can choose one of the following on the printer touch screen:
Send encrypted email only—Encrypted email will be sent only to recipients who have encryption certificates.
Recipients who do not have encryption certificates will not receive the e‑mail.
Send all emails unencrypted—Unencrypted email will be sent to all recipients.
Users can also return to the home screen to cancel the sending of the e‑mail.
If you configured the application to require email to be encrypted, then the second error message is shown to users when one or more recipients do not have encryption certificates. Users can either send encrypted email only to recipients who have encryption certificates (recipients who do not have encryption certificates will not receive the email), or they can return to the home screen to cancel the sending of the e‑mail.
“No encryption certificates could be found for any of the addresses you entered. Press Next to send the email without encryption” or “The email cannot be sent because encryption certificates could not be found for any recipients” error message
These errors indicate that none of the recipients the user tried to send an encrypted email to have encryption certificates. For users to send encrypted email to a recipient, the recipient must be in the global address book and must have a valid encryption certificate. Users cannot send encrypted email to recipients who do not have encryption certificates.
If you configured the application to allow users to choose whether to encrypt their email, then the first error message is shown to users when encryption certificates could not be found for any recipients. Users can either send unencrypted email to all recipients or return to the home screen to cancel the sending of the e‑mail.
If you configured the application to require email to be encrypted, then the second error message is shown to users when encryption certificates could not be found for any recipients. If this occurs, then users cannot send email. If you want all email sent from the printer to be encrypted, then make sure each recipient has an encryption certificate in the global address book.

“Unable to connect to the e-mail server” error message

This error usually occurs when there is a problem with the SMTP or email settings on the printer. See “Configuring
printer email settings” on page 15, or try one or more of the following:
MAKE SURE THE PRINTER IS CONNECTED TO A DOMAIN
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Network/Ports > TCP/IP.
3 Under the TCP/IP heading, make sure the information typed in the Domain Name field is correct.
4 Click Submit.
Note: For more information about TCP/IP settings, see
“Configuring TCP/IP settings” on page 6.
Troubleshooting 39
CHECK THE SMTP SERVER AUTHENTICATION SETTING
1 From the Embedded Web Server, click Settings or Configuration.
2 Click E-mail/FTP Settings > SMTP Setup.
3 Under the Authentication heading, from the SMTP Server Authentication menu, do one of the following:
Select Kerberos 5 if the SMTP server requires user credentials.
Select No authentication required if Kerberos is not supported.
Note: If the SMTP server requires user authentication for sending e-mail but does not support Kerberos, then the IP address or host name of the printer must be added to the SMTP server as a relay.
4 Click Submit.
PROVIDE THE SERVER HOST NAME IF THE SMTP SERVER USES KERBEROS
If the SMTP server uses Kerberos for authentication, then you must provide the server host name, not the IP address.
1 From the Embedded Web Server, click Settings or Configuration.
2 Click E-mail/FTP Settings > SMTP Setup.
3 Under the SMTP Setup heading, verify or correct the following settings:
Primary SMTP Gateway—Type the host name (not the IP address) of the primary SMTP server the printer
uses for sending e-mail.
Secondary SMTP Gateway—If you are using a secondary or backup SMTP server, then type the server host
name (not the IP address).
4 Click Submit.
MAKE SURE PORT 25 IS NOT BLOCKED
Make sure the server and firewall settings are configured to allow communication between the printer and the SMTP server on Port 25.
MAKE SURE THE PRINTER IS CONNECTED TO THE NETWORK
Make sure all appropriate network cables are connected securely and the network settings of the printer are configured correctly. For information on networking the printer, see the printer User’s Guide on the Software and Documentation CD that came with the printer.

“Send me a copy” is not available

For the “Send me a copy” option to appear on the printer control panel, the user’s email address must be available in the login session before Secure Email starts running. For Smart Card users, the email address is retrieved from the Smart Card. For manual login users, the email address must be placed in the login session.
MAKE SURE ALL USER INFORMATION IS PLACED IN THE LOGIN SESSION
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, select Wait for user information.
Troubleshooting 40
3 Click Apply.

Secure Print Jobs Release issues

“Unable to determine user id. Contact your system administrator” error message

This error indicates that Smart Card Authentication Client is not setting the user ID for the session.
MAKE SURE THE SESSION USER ID IS SET CORRECTLY
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, configure the Session User ID setting to specify how the user ID will be
obtained when a user logs in. For information about configuring this setting, see
on page 14.
3 Click Apply.
“Configuring advanced settings”
MAKE SURE THE APPLICATION IS SECURED
See secure-held-jobs-step-9.

“There are no jobs available for [user]” error message

Try one or more of the following:
MAKE SURE THE SESSION USER ID IS SET CORRECTLY
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, configure the Session User ID setting to specify how the user ID will be
obtained when a user logs in. For information about configuring this setting, see
on page 14.
3 Click Apply.
“Configuring advanced settings”
MAKE SURE JOBS WERE SENT TO THE CORRECT PRINTER AND HAVE NOT EXPIRED
The user may have sent the job or jobs to a different printer, or the jobs may have been automatically deleted because they were not printed in time.

Jobs print immediately

M
AKE SURE THE USER SELECTS THE PRINTANDHOLD FEATURE
For jobs to be held at the printer, users must select the print‑and‑hold feature in the printer driver when printing jobs. See
“Printing held jobs” on page 25.
Troubleshooting 41

LDAP issues

LDAP lookups fail

Try one or more of the following:
MAKE SURE PORT 389 (NONSSL) AND PORT 636 (SSL) ARE NOT BLOCKED BY A FIREWALL
The printer uses these ports to communicate with the LDAP server. The ports must be open for LDAP lookups to work.
VERIFY THAT THE ADDRESS BOOK SETUP CONTAINS THE HOST NAME FOR THE LDAP SERVER
1 From the Embedded Web Server, click Settings or Configuration.
2 Click Network/Ports > Address Book Setup.
3 Verify that the host name (not the IP address) of the LDAP server appears in the Server Address field.
4 Click Submit.
DISABLE REVERSE DNS LOOKUPS
The printer uses reverse DNS lookups to verify IP addresses. If reverse DNS lookups are not used on your network, then do the following:
On printers running the Embedded Solutions Framework (eSF) version 3.0 or later:
1 From the Embedded Web Server, click Settings > Security > Security Setup.
2 From Step 1 under the Advanced Security Setup heading, click Kerberos 5.
3 Under the Kerberos Settings heading, select Disable Reverse IP Lookups.
4 Click Submit.
On printers running eSF version 2.0:
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, select Disable Reverse DNS Lookups.
3 Click Apply.
Note: If you are unsure about which version of eSF your printer is running, then see
the Embedded Solutions Framework is installed on a printer” on page 44.
“Checking which version of
IF THE LDAP SERVER REQUIRES SSL, THEN ENABLE SSL FOR LDAP LOOKUPS
1 Access the Smart Card Authentication Client application configuration settings from the Embedded Web Server.
2 Under the Advanced Settings heading, select Use SSL for User Info.
3 Click Apply.
Troubleshooting 42
NARROW THE LDAP SEARCH BASE
Narrow the LDAP search base to the lowest possible scope that includes all necessary users.
VERIFY THAT THE LDAP ATTRIBUTES BEING SEARCHED FOR ARE CORRECT
Make sure all LDAP attributes for the user are correct.

Licensing issues

License error

A license error can occur if there is a problem with the Smart Access Card Solution application or its license. Try one or more of the following:
MAKE SURE THAT THE LICENSE IS UPTODATE
Make sure the license for Smart Access Card Solution has not yet expired. Check the license expiry date using the Embedded Web Server.
Appendix 43

Appendix

Accessing application configuration settings using the Embedded Web Server

1 Obtain the printer IP address:
From the printer home screen
From the TCP/IP section in the Network/Ports menu
By printing a network setup page or menu settings page, and then finding the TCP/IP section
Note: An IP address appears as four sets of numbers separated by periods, such as 123.123.123.123.
2 Open a Web browser, and then type the printer IP address in the address field.
The Embedded Web Server appears.
3 From the navigation menu on the left, click Settings or Configuration, and then do one of the following:
Click Apps > Apps Management.
Click Device Solutions > Solutions (eSF).
Click Embedded Solutions.
4 From the list of installed applications, click the application you want to configure, and then click Configure.

Exporting and importing a configuration using the Embedded Web Server

You can export configuration settings into a text file, and then import it to apply the settings to other printers.
1 From the Embedded Web Server, click Settings or Configuration, and then do one of the following:
Click Apps > Apps Management.
Click Device Solutions > Solutions (eSF).
Click Embedded Solutions.
2 From the list of installed applications, click the name of the application you want to configure.
3 Click Configure, and then do one of the following:
To export a configuration to a file, click Export, and then follow the instructions on the computer screen to save
the configuration file.
Note: If a JVM Out of Memory error occurs, then repeat the export process until the configuration file is saved.
To import a configuration from a file, click Import, and then browse to the saved configuration file that was
exported from a previously configured printer.
Notes:
Before importing the configuration file, you can choose to preview it first.
If a timeout occurs and a blank screen appears, then refresh the Web browser, and then click Apply.
Appendix 44

Licensing applications

Applications require a valid electronic license to run on select printers.
For more information on purchasing a license for an application, or for any other licensing information, contact your Dell representative.

Checking which version of the Embedded Solutions Framework is installed on a printer

1 Obtain the printer IP address:
From the printer home screen
From the TCP/IP section in the Network/Ports menu
By printing a network setup page or menu settings page, and then finding the TCP/IP section
Note: An IP address appears as four sets of numbers separated by periods, such as 123.123.123.123.
2 Open a Web browser, and then type the printer IP address in the address field.
3 From the Embedded Web Server, click Reports > Device Settings.
4 Scroll down until you see “Embedded Solutions” (usually found near the bottom).
5 In the Embedded Solutions section, note the value next to “Framework =”. This signifies the installed version.
Note: To view the complete list of supported printers for each version of the Embedded Web Server, see the
Readme file.
Notices 45

Notices

Edition notice

June 2013
The following paragraph does not apply to any country where such provisions are inconsistent with local law: THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time.

Trademarks

Information in this document is subject to change without notice.
Reproduction of this material in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; Microsoft and Windows are registered trademarks of Microsoft Corporation. Other trademarks and trade names may be used in this document to refer to the entities claiming the marks and names of their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.

GOVERNMENT END USERS

The Software Program and any related documentation are "Commercial Items," as that term is defined in 48 C.F.R.
2.101, "Computer Software" and "Commercial Computer Software Documentation," as such terms are used in 48 C.F.R.
12.212 or 48 C.F.R. 227.7202, as applicable. Consistent with 48 C.F.R. 12.212 or 48 C.F.R. 227.7202-1 through 227.7207-4, as applicable, the Commercial Computer Software and Commercial Software Documentation are licensed to the U.S. Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users pursuant to the terms and conditions herein.

GNU Lesser General Public License

View the GNU Lesser General Public License online at http://www.gnu.org/licenses/lgpl.html.

Dell End-User License Agreement

This is a legal agreement ("Agreement") between you, the user, and Dell Products L.P, a Texas limited partnership, or Dell Global B.V. (Singapore Branch), a Singapore branch of a company incorporated in The Netherlands with limited liability, on behalf of Dell Inc. and Dell Inc.’s subsidiaries and affiliates (together "Dell"). This Agreement covers all software (and upgrades, updates and feature enhancements thereto) that is distributed by Dell and for which there is no separate license agreement between you and the manufacturer or owner of the software (collectively the "Software"). This Agreement is not for the sale of Software or any other intellectual property. All title and intellectual
Notices 46
property rights in and to Software are owned and retained by the manufacturer or owner of the Software. All rights not expressly granted under this Agreement are reserved by the manufacturer or owner of the Software. By opening or breaking the seal on the Software packet(s), installing, downloading, activating the Software, click-accepting these terms, or using the Software, you agree to be bound by the terms of this Agreement. If you do not agree to these terms, you may not install, download, activate, or otherwise use the Software and must promptly return for a full refund all Software (including accompanying media, written materials, and packaging) or delete any Software, as directed by Dell; for software included with your purchase of hardware, you must return the entire hardware/software package. The right to a full refund does not apply to any updates or upgrades subject to the terms of this Agreement. If you are an entity, you acknowledge that the individual accepting these terms has appropriate authority to do so and to bind you.
Subject to the terms, conditions and limitations of this Agreement, Dell grants you a limited, nonexclusive, nontransferable (except as set forth herein), non-assignable license, to use the Software (in object code only) only on as many computers, devices, or in such configurations as you are expressly entitled, or one computer or device, if no other entitlement is specified, and for only such period as you are entitled, in the case of a term license, and perpetually, if no term is specified. You may use the Software only on Dell computers or devices, with the exception of mobile device application software specifically designed by Dell to be run on non-Dell hardware. "Use" means to install, store, load, execute, and display the Software. If you are a commercial customer of Dell, you hereby grant Dell, or an agent selected by Dell, the right to perform an audit of your use of the Software during normal business hours; you agree to cooperate with Dell in such audit; and you agree to provide Dell with all records reasonably related to your use of the Software. The audit will be limited to verification of your compliance with the terms of this Agreement. The Software is protected by United States and other applicable copyright laws and international treaties and may be protected under the patent laws of the applicable jurisdiction. You may make one copy of the Software solely for backup or archival purposes or transfer it to a single hard disk or storage device provided you keep the copy solely for backup or archival purposes. You shall reproduce and include copyright and other proprietary notices on and in any copies for the Software. You may not sublicense, rent, or lease the Software or copy the written materials accompanying the Software. You may transfer the Software and all accompanying materials on a permanent basis as part of a sale or transfer of the Dell product on which it was preloaded by Dell, where applicable, if you retain no copies and the recipient agrees to the terms hereof. Any such transfer must include the most recent update and all prior versions. You may not reverse engineer, decompile or disassemble, modify, or create derivative works of the Software. If the package accompanying your Dell computer or device contains optical discs or other storage media, you may use only the media appropriate for your computer or device. You may not use the optical discs or storage media on another computer, device, or network, or loan, rent, lease, or transfer them to another user except as permitted by this Agreement.
Limited Warranty and Limitation of Liability
Dell warrants that the Software media (if applicable) will be free from defects in materials and workmanship under normal use for 90 days from the date you receive them. This warranty is limited to you and is not transferable. Any implied warranties are limited to 90 days from the date you receive the Software. Some jurisdictions do not allow limits on the duration of an implied warranty, so this limitation may not apply to you. The entire liability of Dell and its suppliers, and your exclusive remedy, shall be, at Dell's option, either (a) termination of this Agreement and return of the price paid for the Software or (b) replacement of any media not meeting this warranty that is sent with a return authorization number to Dell, within the 90-day warranty period, at your cost and risk. This limited warranty is void if any media damage has resulted from accident, abuse, misapplication, or service or modification by someone other than Dell. Any replacement media is warranted for the remaining original warranty period or 30 days, whichever is longer.
Dell and its suppliers do NOT warrant that the functions of the Software will meet your requirements or that operation of the Software will be uninterrupted or error free. You assume responsibility for selecting the Software to achieve your intended results and for the use and results obtained from the Software. The terms of this Agreement do not entitle you to any maintenance or support for the Software.
DELL, ON BEHALF OF ITSELF AND ITS SUPPLIERS, DISCLAIMS ALL OTHER WARRANTIES, EXPRESS, IMPLIED, OR OTHERWISE, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
Notices 47
PARTICULAR PURPOSE OR ANY WARRANTY REGARDING TITLE OR AGAINST INFRINGEMENT, FOR THE SOFTWARE AND ALL ACCOMPANYING WRITTEN MATERIALS. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS; YOU MAY HAVE OTHERS, WHICH VARY FROM JURISDICTION TO JURISDICTION.
IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING WITHOUT LIMITATION DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION OR OTHER DATA, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME JURISDICTIONS DO NOT ALLOW AN EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
Hosted and InternetAccessible Software
Some or all of the Software may be remotely hosted or accessible to you through the Internet. In such case, Dell may suspend, terminate, withdraw, or discontinue all or part of the Software or your access to the Software upon receipt of a subpoena or law enforcement request, or when Dell believes, in its sole discretion, that you have breached any term of this Agreement or are involved in any fraudulent, misleading, or illegal activities. Dell may modify the Software at any time with or without prior notice to you. Dell may perform scheduled or unscheduled repairs or maintenance, or remotely patch or upgrade the Software installed on its and your computer system(s), whic h may temporarily degrade the quality of the Software or result in a partial or complete outage of the Software. Updates, patches or alerts may be delivered from Dell servers, which may be located outside of your country. Dell provides no assurance that you will receive advance notification of such activities or that your use of the Software will be uninterrupted or error-free.
Open Source Software
The Software may come bundled or otherwise distributed with open source software, which is subject to terms and conditions of the specific license under which the open source software is distributed.
THIS OPEN SOURCE SOFTWARE IS DISTRIBUTED IN THE HOPE THAT IT WILL BE USEFUL, BUT IS PROVIDED "AS IS" WITHOUT ANY WARRANTY, EXPRESS, IMPLIED, OR OTHERWISE, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTY REGARDING TITLE OR AGAINST INFRINGEMENT. IN NO EVENT SHALL DELL, THE COPYRIGHT HOLDERS, OR THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS OPEN SOURCE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Under certain open source software licenses, you are entitled to obtain the corresponding source files. You may find corresponding source files for the Software at
http://opensource.dell.com or at such other locations indicated by Dell.
Export
You are advised that the Software is subject to U.S. export laws as well as the laws of the country where it is delivered or used. You agree to abide by these laws. Under these laws, the Software may not be sold, leased, or transferred to restricted countries (currently Cuba, Iran, North Korea, Sudan, and Syria), restricted end users, or for restricted end uses. You specifically agree that the Software will not be used for activities related to weapons of mass destruction, including but not limited to activities related to the design, development, production, or use of nuclear materials, nuclear facilities, or nuclear weapons, missiles, or support of missile projects, or chemical or biological weapons.
Notices 48
U.S. Government Restricted Rights
The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S. Government end users acquire the software and documentation with only those rights set forth herein. Contractor/manufacturer is Dell Products L.P., One Dell Way, Round Rock, Texas, 78682.
Evaluation Licenses
If you have received Software for trial or evaluation purposes (“Evaluation Software”), despite anything to the contrary in this Agreement, you may use the Evaluation Software solely for such limited evaluation period and for internal evaluation purposes only. Evaluation Software cannot be transferred save with the written authorization of the manufacturer or owner of the Software. You acknowledge that Dell may terminate your right to evaluate or use the Evaluation Software, for any or no reason, effective immediately upon notice to you. NOTWITHSTANDING ANYTHING TO THE CONTRARY IN THIS AGREEMENT, THE EVALUATION SOFTWARE IS PROVIDED TO YOU "AS IS" WITHOUT INDEMNITY OR WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE. DELL BEARS NO LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, SPECIAL OR CONSEQUENTIAL DAMAGES RESULTING FROM USE (OR ATTEMPTED USE) OF THE EVALUATION SOFTWARE THROUGH AND AFTER THE EVALUATION PERIOD AND HAS NO DUTY TO PROVIDE SUPPORT OF SUCH SOFTWARE TO YOU.
General
This license is effective until terminated. It will terminate upon the conditions set forth above or if you fail to comply with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies thereof, will be destroyed. Except as may be prohibited by local law, this Agreement is governed by the laws of the State of Texas, without regard to principles of conflicts of laws. Each provision of this Agreement is severable. If a provision is found to be unenforceable, this finding does not affect the enforceability of the remaining provisions of this Agreement. This Agreement is binding on successors and assigns. Dell agrees and you agree to waive, to the maximum extent permitted by law, any right to a jury trial with respect to the Software or this Agreement. Because this waiver may not be effective in some jurisdictions, this waiver may not apply to you. You acknowledge that you have read this Agreement, that you understand it, that you agree to be bound by its terms, and that this is the complete and exclusive statement of the Agreement between you and Dell regarding the Software.
Your new Dell printer comes with patented print cartridges specially priced for a single use. Use of this cartridge confirms your agreement to only a single use. After this single use, the license to use the cartridge terminates. The cartridge is designed to stop working after delivering a fixed amount of printing. Regular cartridges, without these license terms, are available for sale that may be refilled. If you do not agree to these terms, contact Dell by visiting
www.dell.com/contactdell.
Firmware updates may modify Dell printer settings and cause counterfeit and/or unauthorized products, supplies, parts, materials (such as toners and inks), software, or interfaces to stop working. Use of genuine Dell or Dell authorized products will not be impacted.
(Type S—Rev. 040512)
EU5D-0025

Additional copyrights

This product includes software developed by:
Copyright (c) 2002 Juha Yrjola. All rights reserved.
Notices 49
Copyright (c) 2001 Markus Friedl
Copyright (c) 2002 Olaf Kirch
Copyright (c) 2003 Kevin Stefanik
Redistribution and use in source an binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer.
2. Redistribution in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution:
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Index 50

Index

A
a card reader was not detected on this device 26 accessing application configuration settings
using the Embedded Web
Server 43 adding idle screen images 9 address book
securing 18 address book setup 15 advanced settings
configuring 14 an error occurred while reading the card 26 application configuration settings
accessing 43 applications
licensing 44
securing 10 authentication failed 28 automatic logout 5
B
Background and Idle Screen 9 background image
adding 9
C
cannot encrypt email for one or more recipients 37 card locked out 27 card reader not detected 26 certificate not installed 31 certificate status unknown 34 certificates
installing 5, 6 chain validation 12 chain validation error 33 changing the home screen background 9 clocks out of sync 32 confidential print jobs 21, 25 configuring a security template 8 configuring user mode settings 15 credentials validation failed 27
D
date and time
setting 6 deleting held print jobs 25 digital certificates
installing 5, 6 digital signing
configuring 18 disabling reverse DNS lookups 14 DNS settings
configuring 6 documents
scanning at the printer 24 domain controller and device clocks out of sync 32 domain controller certificate validation error 35 domain controller did not respond within the required time 30 domain controller issuing certificate not installed 31 domain controller validation 12 domains 12
E
e-mail
sending 15 e-mail address book 15 e-mail scan settings
configuring 15 Embedded Solutions Framework
checking version number 44 Embedded Web Server
accessing application
configuration settings 43
encryption
configuring 18 encryption certificate not found for one or more recipients 37 encryption certificates not found 37, 38 error during chain validation 33 error while reading card 26 exporting a configuration
using the Embedded Web
Server 43 exporting a configuration using the Embedded Web Server 43
email
sending 23
email addresses
retrieving 18 email cannot be sent because an error occurred trying to retrieve user certificates from the LDAP server 37 email cannot be sent because the email address could not be retrieved 36 email cannot be sent because the signing certificate could not be retrieved 36 email encryption
configuring 18 email function
securing 18
G
group authorization
setting up 8
H
held jobs
printing 25 held print jobs
deleting 25
releasing 25
types 21, 25 home screen
changing the background 9
securing 9 home screen does not lock 28 home screen icons
securing 10 hosts file
installing 14
I
idle screen
securing 9 idle screen images
adding 9 importing a configuration
using the Embedded Web
Server 43
Index 51
importing a configuration using the Embedded Web Server 43 installing certificates automatically 6 installing certificates manually 5
J
job expiration settings
configuring 21 jobs are not held at printer 40 jobs print immediately 40
K
Kerberos configuration file
installing 12 Kerberos configuration file not uploaded 28 Kerberos file not properly formatted 29 Kerberos settings
configuring 12 Kerberos setup 12 Kerberos ticket
using with Scan to Network 19 krb5.conf file
installing 12
L
LDAP lookups fail 41 license error 42 licensing applications 44 locking home screen icons 10 locking the home screen 9 login screen settings
configuring 11 logout
automatic 5
M
manual login domains 12 manual login settings
configuring 12 missing Kerberos realm 31
N
Network Time Protocol settings
configuring 6 no encryption certificates could be found for any of the addresses you entered 38
no jobs available for user 40 no signing certificate is available to sign your email 37 NTP settings
configuring 6
O
OCSP certificate not configured 33 OCSP responder certificates do not match 35 OCSP responder connection error 34 OCSP responder URL not configured 33 OCSP validation 12 overview 4
P
panel login timeout
changing 5
print and hold
enabling 25
print job expiration settings
configuring 21
print release options
configuring 21
printer email settings
configuring 15
printer functions
securing 10
printing held jobs 25
R
realm must be in uppercase 31 realm on card not found 31 releasing held print jobs 25 repeat print jobs 21, 25 reserve print jobs 21, 25 reverse DNS lookups
disabling 14
revoked certificate error 33
S
scan settings
for e-mail 15
Scan to Network
securing access to the
application 19
using a Kerberos ticket for
authentication 19
scanning documents at the printer 24 secure e‑mail
securing access to the
application 18
using from the printer 23
Secure Print Jobs Release
configuring 21 securing access to the
application 21
using from the printer 25 securing access to Scan to Network 19 securing access to Secure Print Jobs Release 21 securing access to the address book 18 securing applications 10 securing home screen icons 10 securing printer functions 10 securing the home screen 9 securing the idle screen 9 security certificates
installing 5, 6 security template
configuring 8
setting up 8 Send me a copy is not available 39 sending e‑mail 23 session user ID
configuring 14 setting up a security template 8 setting up group authorization 8 signing certificate could not be retrieved 36 signing certificate not available 37 signing certificate not found 37 simple Kerberos setup 12 SMTP settings
configuring 15
T
TCP/IP settings
configuring 6 the email cannot be sent because encryption certificates could not be found for any recipients 38 the email cannot be sent because your signing certificate could not be found 37 timeout
automatic 5
Index 52
troubleshooting
a card reader was not detected on
this device 26
an error occurred while reading
the card 26 authentication failed 28 cannot encrypt email for one or
more recipients 37 certificate not installed 31 certificate status unknown 34 chain validation error 33 clocks out of sync 32 credentials validation failed 27 domain controller and device
clocks out of sync 32 domain controller certificate
validation error 35 domain controller did not respond
within the required time 30 domain controller issuing
certificate not installed 31 encryption certificate not found
for one or more recipients 37 encryption certificates not
found 37, 38 error during chain validation 33 email cannot be sent because an
error occurred trying to retrieve
user certificates from the LDAP
server 37 email cannot be sent because the
email address could not be
retrieved 36 email cannot be sent because the
signing certificate could not be
retrieved 36 home screen does not lock 28 jobs are not held at printer 40 jobs print immediately 40 Kerberos configuration file not
uploaded 28 Kerberos file not properly
formatted 29 LDAP lookups fail 41 license error 42 missing Kerberos realm 31 no encryption certificates could be
found for any of the addresses
you entered 38 no jobs available for user 40 no signing certificate is available
to sign your email 37
OCSP certificate not
configured 33
OCSP responder certificates do
not match 35
OCSP responder connection
error 34
OCSP responder URL not
configured 33 realm must be in uppercase 31 realm on card not found 31 revoked certificate error 33 Send me a copy is not available 39 signing certificate could not be
retrieved 36 signing certificate not available 37 signing certificate not found 37 the email cannot be sent because
encryption certificates could not
be found for any recipients 38 the email cannot be sent because
your signing certificate could not
be found 37 unable to authenticate 29, 31 unable to connect to the e-mail
server 38 unable to contact the domain
controller 32 unable to determine user ID 40 unable to generate certificate
from card 29 unable to log in manually 27 unable to read certificate
information from card 29 unable to validate certificate from
domain controller 32 unexpected logout 27 unknown certificate status 34 unsupported USB device 26 user is logged out too quickly 27 user is unable to log in
manually 27 user not authorized to use the
device 35 users cannot automatically e‑mail
themselves a copy 39 user’s realm not found 31 verify Windows support
enabled 29 your card has been locked out
from future login attempts 27
types of held print jobs 21, 25
U
unable to authenticate 29, 31 unable to connect to the e-mail server 38 unable to contact the domain controller 32 unable to determine user ID 40 unable to generate certificate from card 29 unable to log in manually 27 unable to read certificate information from card 29 unable to validate certificate from domain controller 32 unexpected logout 27 unknown certificate status 34 unsupported USB device 26 user email addresses
retrieving 18 user is logged out too quickly 27 user is unable to log in manually 27 user not authorized to use the device 35 user validation mode settings
configuring 15 users cannot automatically e‑mail themselves a copy 39 user’s realm not found 31
V
verify print jobs 21, 25
W
Windows domain
specifying 29
Y
your card has been locked out from future login attempts 27
Loading...