beautypg.com

Configuring the applications, Changing the panel login timeout, Installing certificates manually – Dell B3460dn Mono Laser Printer User Manual

Page 5

background image

Configuring the applications

Configuring printer settings for use with the applications

Even if the printer has been set up previously, make sure all settings have been configured to enable the security
features of each application to work correctly.

Changing the panel login timeout

To help prevent unauthorized access if a user leaves the printer unattended with a Smart Card inserted or while logged
in, you can limit the amount of time a user stays logged in without activity. If the user does not touch the screen within
the specified time, then the session ends and the user is logged out, even if a Smart Card is still inserted.

1

From the Embedded Web Server, click Settings or Configuration.

2

Click Security > Miscellaneous Security Settings > Login Restrictions.

3

Set the Panel Login Timeout value (in seconds). The recommended value is 30 seconds.

4

Click Submit.

Installing certificates manually

Note: In select printer models, you can automatically download the CA. For more information, see

“Installing

certificates automatically” on page 6

.

Before configuring Kerberos or domain controller settings, you must install the appropriate certificates on the printer.
At minimum, you must install the certificate of the Certificate Authority (CA) that issued the domain controller
certificate. The CA certificate is used for domain controller validation. Additional certificates can be installed if needed.
For example, if you plan to use chain validation to validate the domain controller certificate, then you must install the
entire certificate chain. Each certificate must be in a separate PEM (.cer) file.

For each certificate you want to install, do the following:

1

From the Embedded Web Server, click Settings or Configuration.

2

Click Security > Certificate Management > Certificate Authority Management > New.

3

Upload the file containing the certificate, and then click Submit.

Note: The file must be in PEM (.cer) format. The contents of the file should resemble the following:

-----BEGIN CERTIFICATE-----

MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs

l3DTbPe0mnIbTq0iWqKEaVne1vvaDt52iSpEQyevwgUcHD16rFy+sOnCaQ==

-----END CERTIFICATE-----

Configuring the applications

5