XEROX WorkCentre 3550 Information Assurance Disclosure Paper
5)If the LDAP Query is successful, the user’s email address is placed in the From: field. Otherwise, the
default From: is used.
6)The user may then add recipient addresses by accessing the Address Book on the LDAP server. Please see the User Manual for details. Each addition is a separate session to the LDAP server.
3.2.2.2.SMB Authentication (Windows NT 4 or Windows 2000/Windows 2003)
This is also an option that may be enabled on the device, and is used in conjunction with scan to network and scan to email features. The authentication steps vary somewhat, depending on the network configuration. Listed below are 3 network configurations and the authentication steps.
Basic Network Configuration: Device and Domain Controller are on the same Subnet
Authentication Steps:
1)The device broadcasts an authentication request that is answered by the Domain Controller.
2)The Domain Controller responds back to the device whether or not the user was successfully authenticated.
If (2) is successful, steps 3 – 5 proceed as described in steps 4 – 6 of the Kerberos section.
Device and Domain Controller are on different Subnets, SA defines IP Address of Domain Controller
Authentication Steps:
1)The device sends an authentication request directly to the Domain Controller through the router using the IP address of the Domain Controller.
2)The Domain Controller responds back to the device through the router whether or not the user was successfully authenticated.
If (2) is successful, steps 3 – 5 proceed as described in 4 - 6 of Kerberos section.
Subnet 1
Domain Controller
Router
1
2 | 2 |
Subnet 2 |
|
| 3 |
WorkCentre or | 4 |
| |
WorkCentre Pro | 5 |
LDAP Server
Figure 3-1 SMB Authentication with IP Address
Device and Domain Controller are on different Subnets, SA defines Hostname of Domain Controller Authentication Steps:
| 22 |
Ver. 1.3, March 2011 | Page 22 of 32 |