Xerox Secure Access Unified ID System 5.3 Installation Guide

Software Version 5.3 August 2014 702P03155
Xerox Secure Access
®
Unified ID System
5.3
Installation Guide
©2014 Xerox Corporation. All rights reserved. XEROX® and XEROX and Design®, and Xerox Secure Access
®
Unified ID System
are trademarks of Xerox Corporation in the United States and/or other countries.
Equitrac
®
and Follow-You Printing® are registered trademarks of Nuance Communications.
Document Version: 1.0 (August 2014)
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Xerox Secure Access Server Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Xerox Secure Access Administrative Applications . . . . . . . . . . . . . . . . . . . . . . . 1-4
Virtual Server Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Account Synchronization Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Preparing the Network and Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Determining the Install Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
System Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Virus Scanning Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Server Folders to Exclude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
File Extensions to Exclude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Additional Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
2 Server Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Local Installation Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Installing the Server Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Installing the Master CAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Microsoft SQL Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Install Specific Server Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Applying Xerox Secure Access Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
Xerox Secure Access Licensing Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
Installing DRE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Installing DCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15
Verifying the Server Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-16
Add a Printer on a TCP/IP Printer Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Add a Printer on an Equitrac Printer Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
Convert a TCP/IP Port to Equitrac Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Device Registry Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-21
Spool Setting Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
Installation Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
If Device Does not Display in System Manager . . . . . . . . . . . . . . . . . . . . . . . . 2-22
If Licensing Fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
If the Serial Number is Denied . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
3 Upgrade Xerox Secure Access . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Planning the Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Single Machine Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Multiple Machine Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Upgrading from Xerox Secure Access 5.2 to 5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Upgrading from Xerox Secure Access to Equitrac Office® 5.3. . . . . . . . . . . . . . . . 3-3
License Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Full Product Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Installing Equitrac Office 5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
4 Uninstall Xerox Secure Access. . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Installation Guide iii
Table of Contents Xerox Secure Access Unified ID System® 5.3
Restoring Printers to Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Uninstalling Server Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
iv Installation Guide
1
Introduction
To pi c s
Installation Overview
Xerox Secure Access Server Components
Preparing the Network and Database
Determining the Install Locations
System Requirements
Virus Scanning Setup
Additional Documentation
Xerox Secure Access measures, monitors, and manages document output on your network. By regulating devices on the network, and local desktop printers, Xerox Secure Access tracks and controls photocopies, print jobs, scan jobs, and faxes with minimal administration.
There are several different installation methods you can follow to get Xerox Secure Access up and running. Read this chapter before beginning the installation to confirm the best option for your site, the system requirements, and the tasks to complete before you can install the software.
Installation Guide 1-1
Introduction Xerox Secure Access Unified ID System® 5.3
Installation Overview
Xerox Secure Access provides installation wizards to guide you through the server installs. There are several different types of deployment. Follow the instructions indicated to install the components in the correct order.
Deployment Description
Local • All Xerox Secure Access server components are installed on a single machine.
See
Local Installation Workflow on page 2.
Remote • Xerox Secure Access server components are deployed across multiple networked machines.
See
Installing the Master CAS on page 7.
Cluster • Xerox Secure Access components are distributed in a Windows cluster environment. See the
Deployment Guide
Upgrade • An existing Xerox Secure Access 4.x installation currently in place.
See
Upgrade Xerox Secure Access on page 1.
Note
Refer to ReleaseNotes.pdf on the Partner Portal for potentially important installation or upgrade information not contained in this document.
.
Cluster
1-2 Installation Guide
Xerox Secure Access Unified ID System® 5.3 Introduction
DRE
DCE
Admin
Apps
Windows Server
CAS
Xerox Secure Access Server Components
Xerox Secure Access is comprised of core server components. Core server components are essential and must be installed on a Windows Server system.
Every Xerox Secure Access installation relies upon a set of core components to provide basic accounting functionality. Core components can reside on a single Windows Server or you can deploy these components across multiple servers as outlined in Installing the Master CAS on page 7.
Core Component Description
Core Accounting Server (CAS)
Document Routing Engine (DRE)
Device Control Engine (DCE)
• verifies users, calculates printing charges, and assigns charges to an appropriate user or group account
• calculates charges using page count and job attribute information
• contains an accounting database where all printer, user, department, billing code, transaction, and balance information is stored
• provides primary and secondary pricing structures to track different costs/billing scenarios
• provides dual pricing capabilities
• routes network print jobs to the appropriate device
• communicates with attached printers to determine size and attributes of each print job; passes the information to the Core Accounting Server (CAS)
• fully integrated with the Windows printing subsystem
• enables the Port Monitor to receive and route print jobs to parallel or network-connected printers
• enables document flow from user workstations to output devices such as printers, digital copiers, scanners, and plotters
• provides transaction tracking at the device level
• communicates via different interfaces to control and management copy, fax, and hardware devices.
• provides the ability to optionally configure caching of login credentials, enabling users to log in on embedded clients even when network connection to CAS is lost
Installation Guide 1-3
Introduction Xerox Secure Access Unified ID System® 5.3
Xerox Secure Access Administrative Applications
Xerox Secure Access Administrative Applications provide the tools to configure and manage network printing and tracking. When deploying Xerox Secure Access, you must install the Administrative Applications on each machine that will host CAS.
When installing CAS, the installation wizard also selects all Administrative Applications, forcing you to install these tools on the CAS server system. If you want to manage the system remotely, simply install the Administrative Applications on another machine within the deployment. If you correctly identify the master CAS server, and have Admin Access Permissions when you launch the tools, you can easily manage the system remotely. For information on settings Access Permissions, see the
System® Administration Guide
Admin Tool Primary Function
System Manager • manage system settings and configuration, including licensing
.
Xerox Secure Access Unified ID
Refer to the tools.
Xerox Secure Access Unified ID System® Administration Guide
for detailed information on these
Virtual Server Support
Xerox Secure Access is fully supported on all hardware platforms compatible with Windows Server 2008, 2008 R2, 2012 and 2012 R2. The use of Xerox Secure Access under virtual environments such as Virtual Server or VMWare is generally supported and is fully expected to work correctly, as long as such environments fully support the server operating system (e.g. Windows Server 2008), as Xerox Secure Access does not make any assumptions about the underlying hardware platform. Care must be taken when configuring the virtual environment to ensure adequate CPU and memory resources are available to the systems running the Xerox Secure Access solution. If adequate resources are not defined or available there can be an impact on performance. Consult your account representative for details.
Account Synchronization Support
Xerox Secure Access supports account synchronization with Active Directory (AD), Active Directory Lightweight Directory Services (AD LDS) and Lightweight Directory Access Protocol (LDAP).
Note
AD LDS synchronization is supported under certain conditions. Please refer to Microsoft TechNote entitled
Synchronize with Active Directory Domain Services” (http://technet.microsoft.com/en-us/library/ cc794836(WS.10).aspx) for further information.
1-4 Installation Guide
Xerox Secure Access Unified ID System® 5.3 Introduction
Preparing the Network and Database
Although the Xerox Secure Access installation process is quite simple, you must gather network details and prepare the database prior to the install. It is recommended that the SQL Express database be installed prior to running the Xerox Secure Access installation.
Prior to install, you should:
1. Plan system roles.
2. Determine the installation destination for each of the Xerox Secure Access components.
Note
Before you deploy Xerox Secure Access on the network, ensure that you have Administrator privileges on all machines that must be installed and configured.
3. Verify that your network configuration is prepared to handle the communication between Xerox Secure Access components, including document routing to the network printers.
4. Install and configure TCP/IP protocol on the intended print server machine and on network printers.
Determining the Install Locations
Depending on the size of the Xerox Secure Access deployment and your network requirements, you can choose to install all server components on a single machine or you can deploy across multiple servers. If you deploy on a single machine, the install is referred to as “local”. See Local Installation Workflow on page 2. If you deploy across multiple servers, the install is considered “remote”. See Installing the Master CAS on
page 7.
Installation Guide 1-5
Introduction Xerox Secure Access Unified ID System® 5.3
System Requirements
Before you install Xerox Secure Access ensure that the client and server machines you plan to use meet the minimum operating requirements outlined below. To maximize performance in high-volume print environments, you require additional disk space and memory, and a faster processor.
Note.
Net Framework packages 3.5 and 4.5 must be installed on Windows 8 and Windows 8.1 prior to installing the Windows Client.
Server Requirements
Server Components
Core Accounting Server (CAS)
Device Control Engine (DCE)
Core Accounting Server (CAS)
– Database
Document Routing Engine (DRE)
Print Server
– with Rules and Routing or Secure Document Release
Software Platforms
•Windows Server
• Windows Server 2008 R2 (x64)
•Windows Server
•Windows Server
• Windows Small Business Server 2011 Essentials/ Standard
• SharePoint Server 2007 and 2010
• RightFax Server 9.4 and higher
• Microsoft SQL Server 2008 and 2008 Express
• Microsoft SQL Server 2012 and 2012 Express
• Windows Server 2008 (x86, x64)
012
(x64), 2012 R2 (x64)
2
• Windows Small Business Server 2011 Essentials/ Standard
• SUSE Linux 10 SP4 OES2 SP3 iPrint (x86, x64)
1
3
2008 (x86 or x64)
5
2012
(x64)
2012
R2 (x64)
4,5
5
, 2008 R2 (x64)5,
Recommended Hardware
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Hard disk: 2.2 GB required for SQL Server 2012
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater + allocation for print jobs
2
Core Accounting Server (CAS)
Device Control Engine (DCE)
– Cluster server
Document Routing Engine (DRE)
Print Server
– Cluster server
1-6 Installation Guide
• Windows Server 2008, 2008 R2, 2012, 2012 R2
• Windows Server 2008, 2008 R2 cluster
Note: Windows Server 2012, 2012 R2 cluster not supported on DRE
cluster
5
5
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater + allocation for print jobs
Xerox Secure Access Unified ID System® 5.3 Introduction
Management Tools Requirements
012
1
5
R2 (x64)
Enterprise/Ultimate (x86,
, 2008 R2 (x64)5,
Recommended Hardware
• Processor: 2 GHz or greater
• Memory: 2 GB or greater
• Hard disk: 50MB or greater
Management Tools
System Manager
Software Platforms
• Windows Server 2008 (x86, x64) 012
(x64), 2
2
• Windows Small Business Server 2011 Essentials/
Standard
• Windows Vista Business/
x64)
• Windows 7 Professional/
Enterprise/Ultimate (x86,
x64)
• Windows 8 and 8.1 Professional/
Enterprise (x86,
x64)
Footno tes
1
For all software platforms, ensure that the latest service packs are applied.
2
This column indicates minimum hardware requirements only; high printing or high scanning volumes, and/
or large installations may require substantially higher performance hardware.
3
Users/Site Network Administrators are responsible for securing Microsoft Client Access Licenses as required.
4
x86 refers to 32-bit architecture; x64 refers to 64-bit architecture (IA64 chip set is not supported).
2
5
Windows Server 2008 Server Core and Windows Server 2012 Server Core are not supported.
Note
The system operating requirements are updated regularly. Please refer to the latest Xerox Secure Access Technical Specifications document available from the Equitrac Partner Portal for the most up-to-date information.
Installation Guide 1-7
Introduction Xerox Secure Access Unified ID System® 5.3
Virus Scanning Setup
To ensure successful communication between Xerox Secure Access services, there are certain folders and file extensions that you should exclude from virus scanning.
Server Folders to Exclude
It is recommended that the following server folders be exclude from virus scanning:
The folder and sub-folders containing Xerox Secure Access
The SPOOL folder that the Windows spooler service is configured to use. The default location for all printer spool files is %SystemRoot%\System32\Spool\Printers.
•C:\Users\<userid>\AppData\Local\Temp
•C:\Users\<userid>\AppData\Local\Xerox Secure Access
Where <userid> is the account under which the Xerox Secure Access services are running.
Note
The installation path depends on the location where Xerox Secure Access was installed on the server. If you installed Xerox Secure Access services on another drive letter or at another location altogether, substitute that drive letter and path in the paths listed above.
On a cluster, also exclude cache folders on any shared disks used by Xerox Secure Access components, including the spool folders used by print spooler shared disks.
File Extensions to Exclude
Exclude the following file extensions from virus scanning:
database files (mdf, ldf)
trace log files (log)
Additional Documentation
To learn more about the advanced features and functionality of the Xerox Secure Access Suite, refer to the following guides:.
Guide When to refer to this guide
Planning Guide Use this guide to evaluate and plan an Xerox Secure Access deployment on your
network.
Administration Guide After installing Xerox Secure Access, use this guide to configure Xerox Secure Access for
use in your organization.
Cluster Deployment Guide If you are deploying Xerox Secure Access in an existing cluster environment, use this
guide to plan the installation.
Xerox Embedded Guides Use these specific guides for Xerox embedded clients.
1-8 Installation Guide
2
Server Installation
To pi cs
Local Installation Workflow
Installing the Server Components
Installing the Master CAS
Applying Xerox Secure Access Licenses
Installing DRE
Installing DRE
Installing DCE
Verifying the Server Installation
Installation Troubleshooting
This chapter provides the steps required to install all Xerox Secure Access components on either a single machine, or across multiple machines. A local installation places all Xerox Secure Access server components and Administrative Applications on a single machine. This type of installation is appropriate for small site deployment. If you want to install all components on a single machine, refer to Local Installation Workflow on page 2.
Xerox Secure Access server components can be installed across multiple machines to balance the print and transaction load. This distribution of components is called a Remote installation, and involves two or more networked machines that will house specific Xerox Secure Access components. You must determine the appropriate network deployment for your enterprise before you install a single Xerox Secure Access component. If you are deploying Xerox Secure Access across a large site, refer to Installing the Master CAS on page 7.
Ensure that you follow the workflow steps carefully to guarantee a successful installation. Refer to
ReleaseNotes.pdf on the CD for potential important installation or upgrade information not contained in this
document.
Installation Guide 2-1
Server Installation Xerox Secure Access Unified ID System® 5.3
Local Installation Workflow
Before installing Xerox Secure Access, ensure that the network and database are prepared for the installation. See Preparing the Network and Database on page 5 for instructions.
1. Install Server Components – Install the Xerox Secure Access server components and the Administrative Applications on the server system(s). See
2. Apply Licenses – Activate and register all Xerox Secure Access server components. You require the serial numbers for each component. See Applying Xerox Secure Access Licenses on page 12
3. Verify the Installation – Create a printer and ensure that print tracking is successful. See Ver ifying th e
Server Installation on page 16
.
Installing the Server Components on page 2.
.
Installing the Server Components
When installing Xerox Secure Access, the installation wizard allows you to select the server components to install per machine. For a local installation, install all components on the same machine. If you are installing all server components on a single machine, you only need to run the wizard once.
Note
For Windows Servers 2008, 2008 R2, 2012 and 2012 R2, make sure the server is up to date with the latest service packs, or manually download and install the latest version of Windows Installer from
www.microsoft.com. Windows Installer 4.0 (or higher) is required to install Xerox Secure Access 5.3. If you do
not have Windows Installer 4.0 (or higher) the following error displays: “This installation package cannot
be installed by the Windows Installer service. You must install a Windows service pack that contains a newer version of the Windows Installer Service.”
2-2 Installation Guide
Loading...
+ 30 hidden pages