Xerox AltaLink EIP configuration

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/lightbulb_on.png  This manual was created based on Xerox AltaLink C8030 and should be applicable to most AltaLink MFDs, although slight differences may occur.

Before installation of YSoft SafeQ Embedded Terminal

SNMPv3

Go to Properties → Connectivity → Setup then edit SNMP from list of protocols.

images/download/attachments/115323201/snmp.JPG

Enable SNMP v3 Protocol and allow SNMP v3 Set. Edit SNMP v3 Properties.

images/download/attachments/115323201/enable_snmp.JPG

Choose Authentication/Encryption algorithm, enable Administrator Account and fill Authentication Password and Encryption password used in your organization.

images/download/attachments/115323201/snmp3_settings.JPG

The same SNMP3 settings have to be used in device configuration in SafeQ.

images/download/attachments/115323201/image2018-7-4_14-33-50.png

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/lightbulb_on.png  Proceed with the MFD installation in SafeQ to complete the installation of YSoft SafeQ Embedded Terminal. Check the installation status and installation steps.

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/warning.png  If there are some warnings present during the installation, you will need to do some further settings based on the messages.

How to enable Job Management API on the MFD

The option is available in the MFD Properties menu > Apps > Printing > Printing Web Services > Web Services:

images/download/attachments/115323201/Capture.PNG

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/lightbulb_on.png  You need to enable both Job Management Extension and Allow Open Access to Job Information in order to make it work in Altalink without credentials. It will allow access to any request to JobManagement API called from localhost and it's totally independent from the Jobs app in the MFD.

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/warning.png  The setting available under Login/Permissions/Accounting > User Permissions > Non-logged-in User > Apps & Tools is actually just for the Jobs app which is in the device screen and it seems that actually enables somehow JobManagement API (probably because of depencencies).

After installation of YSoft SafeQ Embedded Terminal

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/lightbulb_on.png  These settings are necessary only if requested by the Embedded Terminal installation or if some customization of configuration is requested.After installation of YSoft SafeQ Embedded Terminal

Go to Properties > Login/Permissions/Accounting and edit Card Reader Setup

Login without card

images/download/attachments/115323201/login_methods.JPG

Change Prevent use of device when USB card reader is disconnect to No.

images/download/attachments/115323201/login_without_card.JPG

Creating color copy rule

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/lightbulb_on.png  Color copy restriction rules documented below are used only when property XeroxAccessDefinitionMethod is set to LDAP and property enableXeroxAccessDefinition is set to Enabled. Rules for application restriction are created during SafeQ installation.

1) Restrict color copy for user with copy rights:Go to Properties > Login/Permissions/Accounting > User Permissions and then edit User Permission Roles. Then change tab to Logged-In Users.

a) Press Edit user mapping for  __EIP__Copy  and  __EIP__ID Card  Copy (application names are generated by MFD)

b) In tab choose Apps & tools and change Color copy to Not allowed

images/download/attachments/115323201/image2018-7-4_14-7-9.png

c) Press Apply and then Close

2) Create new rule for user with allowed color copy:

a) Press Add new Role. Fill role name (e.g. copycolor) and press Create.

b) In tab Assign Groups to Role into Find / Add Groups input copycolor and press Add. In list of Assigned Groups should be visible item copycolor.

images/s/en_GB/7502/85262de2dab440f060366aadca149a69d65c1f59/_/images/icons/emoticons/warning.png  Inserted group name in this step has to be set to copycolor.

images/download/attachments/115323201/image2018-10-26_11-32-24.png

c)  In tab choose  Apps & tools  and then set all applications except Copy and ID Card Copy to Not AllowedCopy and ID Card Copy should be set to Allowed if not.

images/download/attachments/115323201/image2018-7-4_13-33-3.png

d) Press Apply and then Close

Install Certificate Authority certificate

Go to Properties > Security > Certificates > Security Certificates.

Select tab Root/Intermediate Trusted Certificate(s).

Press Install Certificate.

images/download/attachments/115323201/properties_certificates_root.png

Choose a certificate file path. Enter decryption password. Press Next and follow instructions to complete installation process.

images/download/attachments/115323201/install_certificate.png

Secured LDAP

images/s/-3eliqb/8502/404359a7d2ab19c9c7c58d12013124a386b28257/_/images/icons/emoticons/warning.svg  By default secured LDAP (without server certificate validation) is configured during installation of the device. You can disable it by enabling property internalLdapAllowNonsecureProtocol and manually disable secured LDAP on device. But you can allow an attacker to bypass access restrictions for operations on Xerox devices.

Enable server certificate validation for secured LDAP

images/s/-3eliqb/8502/404359a7d2ab19c9c7c58d12013124a386b28257/_/images/icons/emoticons/warning.svg Issuer of server certificate (CA certificate) has to be uploaded at first.

Go to Properties > Login/Permissions/Accounting > Login Methods. and edit LDAP Servers.

images/download/attachments/115323201/properties_login_methods.png

Press Edit... on selected LDAP server.

images/s/-3eliqb/8502/404359a7d2ab19c9c7c58d12013124a386b28257/_/images/icons/emoticons/information.svg  Only LDAP server with images/download/thumbnails/115323201/LDAP_icon.png is used for authentication or access restrictions control.

images/download/attachments/115323201/properties_login_LDAP.png

Scroll to section Secure LDAP Connection.

Enable Validate Server Certificate (trusted, not expired, correct FQDN). 

Select issuer of the server certificate from dropdown menu Root/Intermediate Trusted Certificates.

images/s/-3eliqb/8502/404359a7d2ab19c9c7c58d12013124a386b28257/_/images/icons/emoticons/warning.svg LDAP server certificate is the same which is configured in Terminal Server for secured connection with devices. Follow these instructions Selecting certificate of Terminal Server.

images/download/attachments/115323201/LDAP_server.png

Press Apply.

images/s/-3eliqb/8502/404359a7d2ab19c9c7c58d12013124a386b28257/_/images/icons/emoticons/information.svg Some devices need reboot. If notification appears on the screen then press OK.