HP Jetdirect IPsec supports the Kerberos authentication method. The Kerberos authentication method supports the
HP Jetdirect is 4,096, which complies with current standards. The iteration count in HP Jetdirect and the iteration count on the Kerberos domain controller must match. To change the iteration count on the Kerberos domain controller, create the following Registry entry and provide the appropriate value. This Registry entry affects all of the Kerberos clients of the domain controller.
HKLM\SYSTEM\CurrentControlSet\Services\Kdc\IterationCount (DWORD)
The HP Web Jetadmin administrator can create an IPsec rule with Kerberos
●Use HP Web Jetadmin to configure the settings for the IPsec rule, which includes the Kerberos server admin credentials and organization unit (OU) path. HP Web Jetadmin uses these settings to create an account on the Key Distribution Center (KDC) server.
●Log in to the KDC server and manually create an account. Then access the HP Embedded Web Server (EWS) on the device, and configure the settings for the IPsec rule.
The HP Web Jetadmin administrator must not configure the settings for an IPsec rule by using
HP Web Jetadmin and then later update those settings by using the device EWS, or vice versa. The following are examples of the conflicts that can occur:
●The HP Web Jetadmin administrator uses HP Web Jetadmin to create an IPsec rule that has an encryption type of DES. Then the HP Web Jetadmin administrator uses the device EWS to change the encryption type to
●The HP Web Jetadmin administrator uses HP Web Jetadmin to create an IPsec rule. Then the
HP Web Jetadmin administrator uses the device EWS to change the settings for the rule. When the HP Web Jetadmin administrator views the rule in HP Web Jetadmin, the changes that were made by using the EWS are not displayed. In this case, HP Web Jetadmin does not display an error message and the IPsec policy might not be applied correctly.
Kerberos Authentication
Use this feature to configure the device
Authentication consists of two interdependent parts:
●The device verifies the user's credentials with the Key Distribution Center (KDC).
●After the device user has supplied valid credentials and has been authenticated, the device searches for the user's email address and name.
If either step fails, the user is denied access to the functions that have been configured to require Kerberos authentication.
Accessing the Kerberos Authentication Server
The Kerberos realm (domain) is the fully qualified domain name of the Kerberos realm (domain).
ENWW | Device Configuration Options for Security 363 |