beautypg.com

Basic concepts, Admin and key user accounts, Http, https, and ssl/tls – Dell 7130cdn Color Laser Printer User Manual

Page 38

background image

Security Features

Dell 7130cdn Professional Color Printer
System Administrator Guide

38

Basic Concepts

This section includes:

Admin and Key User Accounts

HTTP, HTTPS, and SSL/TLS

Certificates

ColorTrack Lists

Admin and Key User Accounts

Admin and Key User accounts in the EWS enable you to limit access to specific printer functions
by specifying passwords for user classes. The EWS requires a name and password before
access to the controlled printer functions is allowed.

The user classes are:

Administrator: The person with the ultimate management responsibility and authority for
controlling some or all of the printer functions.

Key User: A person who has some administrative responsibilities and who manages some or
all of the printer functions.

Any User: Includes the majority of people who will be sending print jobs to the printer.

Once the passwords are set, select the printer functions from the Feature Authorization list that
each user class has the right to access. The three categories of printer functions are:

Administrative

Web Server Printing

Printer Neighborhood

See also:

Configuring Administrator and Key User Settings

on page 44

HTTP, HTTPS, and SSL/TLS

HTTP (Hyper Text Transfer Protocol) is used to communicate across the Internet between the
printer Web server and the Web browser (clients). Because the data is transmitted in plain text
and passwords are only slightly encrypted, it is not secure; the data can be read or intercepted by
other people.

HTTPS (Secure Hyper Text Transfer Protocol) is a secure version of HTTP. HTTPS provides
authentication and encrypted communication to preserve the confidentiality of your data. Instead
of using plain text, HTTPS uses either the SSL (Secure Socket Layer) protocol or the TLS
(Transport Layer Security) protocol to encrypt data, thus ensuring reasonable protection from
eavesdroppers and man-in-the-middle attacks.