Xerox Secure Access measures, monitors, and manages document output on your network. By regulating
devices on the network, and local desktop printers, Xerox Secure Access tracks and controls photocopies, print
jobs, scan jobs, and faxes with minimal administration.
There are several different installation methods you can follow to get Xerox Secure Access up and running.
Read this chapter before beginning the installation to confirm the best option for your site, the system
requirements, and the tasks to complete before you can install the software.
Installation Guide 1-1
IntroductionXerox Secure Access Unified ID System® 5.3
Installation Overview
Xerox Secure Access provides installation wizards to guide you through the server installs. There are several
different types of deployment. Follow the instructions indicated to install the components in the correct
order.
DeploymentDescription
Local• All Xerox Secure Access server components are installed on a single machine.
See
Local Installation Workflow on page 2.
Remote• Xerox Secure Access server components are deployed across multiple networked machines.
See
Installing the Master CAS on page 7.
Cluster• Xerox Secure Access components are distributed in a Windows cluster environment. See the
Deployment Guide
Upgrade• An existing Xerox Secure Access 4.x installation currently in place.
See
Upgrade Xerox Secure Access on page 1.
Note
Refer to ReleaseNotes.pdf on the Partner Portal for potentially important installation or upgrade information
not contained in this document.
.
Cluster
1-2 Installation Guide
Xerox Secure Access Unified ID System® 5.3Introduction
DRE
DCE
Admin
Apps
Windows Server
CAS
Xerox Secure Access Server Components
Xerox Secure Access is comprised of core server components. Core server components are essential and must
be installed on a Windows Server system.
Every Xerox Secure Access installation relies upon a set of core components to provide basic accounting
functionality. Core components can reside on a single Windows Server or you can deploy these components
across multiple servers as outlined in Installing the Master CAS on page 7.
Core ComponentDescription
Core Accounting
Server (CAS)
Document
Routing Engine
(DRE)
Device Control
Engine (DCE)
• verifies users, calculates printing charges, and assigns charges to an appropriate user or group
account
• calculates charges using page count and job attribute information
• contains an accounting database where all printer, user, department, billing code, transaction,
and balance information is stored
• provides primary and secondary pricing structures to track different costs/billing scenarios
• provides dual pricing capabilities
• routes network print jobs to the appropriate device
• communicates with attached printers to determine size and attributes of each print job; passes
the information to the Core Accounting Server (CAS)
• fully integrated with the Windows printing subsystem
• enables the Port Monitor to receive and route print jobs to parallel or network-connected
printers
• enables document flow from user workstations to output devices such as printers, digital copiers,
scanners, and plotters
• provides transaction tracking at the device level
• communicates via different interfaces to control and management copy, fax, and hardware
devices.
• provides the ability to optionally configure caching of login credentials, enabling users to log in
on embedded clients even when network connection to CAS is lost
Installation Guide1-3
IntroductionXerox Secure Access Unified ID System® 5.3
Xerox Secure Access Administrative Applications
Xerox Secure Access Administrative Applications provide the tools to configure and manage network printing
and tracking. When deploying Xerox Secure Access, you must install the Administrative Applications on each
machine that will host CAS.
When installing CAS, the installation wizard also selects all Administrative Applications, forcing you to install
these tools on the CAS server system. If you want to manage the system remotely, simply install the
Administrative Applications on another machine within the deployment. If you correctly identify the master
CAS server, and have Admin Access Permissions when you launch the tools, you can easily manage the
system remotely. For information on settings Access Permissions, see the
System® Administration Guide
Admin ToolPrimary Function
System Manager• manage system settings and configuration, including licensing
.
Xerox Secure Access Unified ID
Refer to the
tools.
Xerox Secure Access Unified ID System® Administration Guide
for detailed information on these
Virtual Server Support
Xerox Secure Access is fully supported on all hardware platforms compatible with Windows Server 2008,
2008 R2, 2012 and 2012 R2. The use of Xerox Secure Access under virtual environments such as Virtual
Server or VMWare is generally supported and is fully expected to work correctly, as long as such
environments fully support the server operating system (e.g. Windows Server 2008), as Xerox Secure Access
does not make any assumptions about the underlying hardware platform. Care must be taken when
configuring the virtual environment to ensure adequate CPU and memory resources are available to the
systems running the Xerox Secure Access solution. If adequate resources are not defined or available there
can be an impact on performance. Consult your account representative for details.
Account Synchronization Support
Xerox Secure Access supports account synchronization with Active Directory (AD), Active Directory
Lightweight Directory Services (AD LDS) and Lightweight Directory Access Protocol (LDAP).
Note
AD LDS synchronization is supported under certain conditions. Please refer to Microsoft TechNote entitled
“Synchronize with Active Directory Domain Services” (http://technet.microsoft.com/en-us/library/
cc794836(WS.10).aspx) for further information.
1-4 Installation Guide
Xerox Secure Access Unified ID System® 5.3Introduction
Preparing the Network and Database
Although the Xerox Secure Access installation process is quite simple, you must gather network details and
prepare the database prior to the install. It is recommended that the SQL Express database be installed prior
to running the Xerox Secure Access installation.
Prior to install, you should:
1.Plan system roles.
2.Determine the installation destination for each of the Xerox Secure Access components.
Note
Before you deploy Xerox Secure Access on the network, ensure that you have Administrator privileges on
all machines that must be installed and configured.
3.Verify that your network configuration is prepared to handle the communication between Xerox Secure
Access components, including document routing to the network printers.
4.Install and configure TCP/IP protocol on the intended print server machine and on network printers.
Determining the Install Locations
Depending on the size of the Xerox Secure Access deployment and your network requirements, you can
choose to install all server components on a single machine or you can deploy across multiple servers. If you
deploy on a single machine, the install is referred to as “local”. See Local Installation Workflow on page 2. If
you deploy across multiple servers, the install is considered “remote”. See Installing the Master CAS on
page 7.
Installation Guide1-5
IntroductionXerox Secure Access Unified ID System® 5.3
System Requirements
Before you install Xerox Secure Access ensure that the client and server machines you plan to use meet the
minimum operating requirements outlined below. To maximize performance in high-volume print
environments, you require additional disk space and memory, and a faster processor.
Note.
Net Framework packages 3.5 and 4.5 must be installed on Windows 8 and Windows 8.1 prior to installing the
Windows Client.
Server Requirements
Server Components
Core Accounting Server (CAS)
Device Control Engine (DCE)
Core Accounting Server (CAS)
– Database
Document Routing Engine
(DRE)
Print Server
– with Rules and Routing or
Secure Document Release
Software Platforms
•Windows Server
• Windows Server 2008 R2 (x64)
•Windows Server
•Windows Server
• Windows Small Business Server 2011 Essentials/
Standard
• SharePoint Server 2007 and 2010
• RightFax Server 9.4 and higher
• Microsoft SQL Server 2008 and 2008 Express
• Microsoft SQL Server 2012 and 2012 Express
• Windows Server 2008 (x86, x64)
012
(x64), 2012 R2 (x64)
2
• Windows Small Business Server 2011 Essentials/
Standard
• SUSE Linux 10 SP4 OES2 SP3 iPrint (x86, x64)
1
3
2008 (x86 or x64)
5
2012
(x64)
2012
R2 (x64)
4,5
5
, 2008 R2 (x64)5,
Recommended Hardware
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Hard disk: 2.2 GB required
for SQL Server 2012
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
+ allocation for print jobs
2
Core Accounting Server (CAS)
Device Control Engine (DCE)
– Cluster server
Document Routing Engine
(DRE)
Print Server
– Cluster server
1-6 Installation Guide
• Windows Server 2008, 2008 R2, 2012, 2012 R2
• Windows Server 2008, 2008 R2 cluster
Note: Windows Server 2012, 2012 R2 cluster not
supported on DRE
cluster
5
5
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 1 GB or greater
+ allocation for print jobs
Xerox Secure Access Unified ID System® 5.3Introduction
Management Tools Requirements
012
1
5
R2 (x64)
Enterprise/Ultimate (x86,
, 2008 R2 (x64)5,
Recommended Hardware
• Processor: 2 GHz or
greater
• Memory: 2 GB or greater
• Hard disk: 50MB or
greater
Management Tools
System Manager
Software Platforms
• Windows Server 2008 (x86, x64)
012
(x64), 2
2
• Windows Small Business Server 2011 Essentials/
Standard
• Windows Vista Business/
x64)
• Windows 7 Professional/
Enterprise/Ultimate (x86,
x64)
• Windows 8 and 8.1 Professional/
Enterprise (x86,
x64)
Footno tes
1
For all software platforms, ensure that the latest service packs are applied.
2
This column indicates minimum hardware requirements only; high printing or high scanning volumes, and/
or large installations may require substantially higher performance hardware.
3
Users/Site Network Administrators are responsible for securing Microsoft Client Access Licenses as required.
4
x86 refers to 32-bit architecture; x64 refers to 64-bit architecture (IA64 chip set is not supported).
2
5
Windows Server 2008 Server Core and Windows Server 2012 Server Core are not supported.
Note
The system operating requirements are updated regularly. Please refer to the latest Xerox Secure Access
Technical Specifications document available from the Equitrac Partner Portal for the most up-to-date
information.
Installation Guide1-7
IntroductionXerox Secure Access Unified ID System® 5.3
Virus Scanning Setup
To ensure successful communication between Xerox Secure Access services, there are certain folders and file
extensions that you should exclude from virus scanning.
Server Folders to Exclude
It is recommended that the following server folders be exclude from virus scanning:
•The folder and sub-folders containing Xerox Secure Access
•The SPOOL folder that the Windows spooler service is configured to use. The default location for all
printer spool files is %SystemRoot%\System32\Spool\Printers.
Where <userid> is the account under which the Xerox Secure Access services are running.
Note
The installation path depends on the location where Xerox Secure Access was installed on the server. If you
installed Xerox Secure Access services on another drive letter or at another location altogether, substitute
that drive letter and path in the paths listed above.
On a cluster, also exclude cache folders on any shared disks used by Xerox Secure Access components,
including the spool folders used by print spooler shared disks.
File Extensions to Exclude
Exclude the following file extensions from virus scanning:
•database files (mdf, ldf)
•trace log files (log)
Additional Documentation
To learn more about the advanced features and functionality of the Xerox Secure Access Suite, refer to the
following guides:.
GuideWhen to refer to this guide
Planning GuideUse this guide to evaluate and plan an Xerox Secure Access deployment on your
network.
Administration GuideAfter installing Xerox Secure Access, use this guide to configure Xerox Secure Access for
use in your organization.
Cluster Deployment GuideIf you are deploying Xerox Secure Access in an existing cluster environment, use this
guide to plan the installation.
Xerox Embedded GuidesUse these specific guides for Xerox embedded clients.
1-8 Installation Guide
2
Server Installation
To pi cs
Local Installation Workflow
Installing the Server Components
Installing the Master CAS
Applying Xerox Secure Access Licenses
Installing DRE
Installing DRE
Installing DCE
Verifying the Server Installation
Installation Troubleshooting
This chapter provides the steps required to install all Xerox Secure Access components on either a single
machine, or across multiple machines. A local installation places all Xerox Secure Access server components
and Administrative Applications on a single machine. This type of installation is appropriate for small site
deployment. If you want to install all components on a single machine, refer to Local Installation Workflow
on page 2.
Xerox Secure Access server components can be installed across multiple machines to balance the print and
transaction load. This distribution of components is called a Remote installation, and involves two or more
networked machines that will house specific Xerox Secure Access components. You must determine the
appropriate network deployment for your enterprise before you install a single Xerox Secure Access
component. If you are deploying Xerox Secure Access across a large site, refer to Installing the Master CAS
on page 7.
Ensure that you follow the workflow steps carefully to guarantee a successful installation. Refer to
ReleaseNotes.pdf on the CD for potential important installation or upgrade information not contained in this
document.
Installation Guide 2-1
Server InstallationXerox Secure Access Unified ID System® 5.3
Local Installation Workflow
Before installing Xerox Secure Access, ensure that the network and database are prepared for the
installation. See Preparing the Network and Database on page 5 for instructions.
1.Install Server Components – Install the Xerox Secure Access server components and the Administrative
Applications on the server system(s). See
2.Apply Licenses – Activate and register all Xerox Secure Access server components. You require the serial
numbers for each component. See Applying Xerox Secure Access Licenses on page 12
3.Verify the Installation – Create a printer and ensure that print tracking is successful. See Ver ifying th e
Server Installation on page 16
.
Installing the Server Components on page 2.
.
Installing the Server Components
When installing Xerox Secure Access, the installation wizard allows you to select the server components to
install per machine. For a local installation, install all components on the same machine. If you are installing
all server components on a single machine, you only need to run the wizard once.
Note
For Windows Servers 2008, 2008 R2, 2012 and 2012 R2, make sure the server is up to date with the latest
service packs, or manually download and install the latest version of Windows Installer from
www.microsoft.com. Windows Installer 4.0 (or higher) is required to install Xerox Secure Access 5.3. If you do
not have Windows Installer 4.0 (or higher) the following error displays: “This installation package cannot
be installed by the Windows Installer service. You must install a Windows service pack that contains a
newer version of the Windows Installer Service.”
2-2 Installation Guide
Loading...
+ 30 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.