Canon Authorized Send Installation and Configuration Guide for imageRUNNER Machines Version 4.
This page is intentionally left blank.
Contents Preface ........................................................................................................7 How to Use This Manual............................................................................................... 7 Symbols Used in This Manual ................................................................................... 7 Keys and Buttons Used in This Manual ..................................................................... 8 Displays Used in This Manual..................
3.15 3.16 3.17 3.18 3.19 Configuring Scan Settings ............................................................................. 108 Configuring Optional Settings ........................................................................ 113 Configuring Log Settings................................................................................ 117 Changing the Login ID and Password............................................................ 122 Using the Brand Configuration Tool (Optional) .................
6.5.2 SCAN TO FAX Input Request Messages.................................................... 173 6.5.3 SCAN TO FAX Notification Messages ........................................................ 174 6.5.4 SCAN TO FAX Error Messages .................................................................. 174 6.6 SCAN TO FOLDER Screen Notification Messages ....................................... 175 6.6.1 SCAN TO FOLDER Warning Message ....................................................... 175 6.6.
This page is intentionally left blank.
Preface Thank you for purchasing the Authorized Send software application. Please read this manual thoroughly before operating the product on your MEAP-enabled machine to familiarize yourself with its capabilities, and to make the most of its many functions. After reading this manual, store it in a safe place for future reference. How to Use This Manual This manual assumes that the reader has a good understanding of MEAP (Multifunctional Embedded Application Platform).
Keys and Buttons Used in This Manual Keys for using the machine’s main functions are located on the top of the touch panel display. To use any of the desired function’s features, you must first press the key or application tab for the desired function. Press [ ] (arrow key) to access installed MEAP applications. On the MEAP Application screen, there may be several application tabs that you can select. Select only the proper tab for the application that you want to use.
The following key and button names are a few examples of how keys and buttons to be pressed and clicked are represented in this manual: Touch Panel Display Keys: Examples: [Key Name] [Scan] [Cancel] Control Panel Keys: Examples: Key Icon (Key Name) ~ (Start) (Stop) Buttons on Computer Operations Screens: Examples: [Key Name] [Install] [OK] Displays Used in This Manual Most screen shots used in this manual are those taken when Authorized Send is being installed using MEAP SMS (Service Management Servic
Abbreviations and Terms Used in This Manual The following abbreviations are used in this manual.
Legal Notices Trademarks Canon, the Canon logo, imageRUNNER, Color imageRUNNER, imagePRESS, and MEAP are registered trademarks, and the MEAP logo is a trademark, of Canon Inc. in the United States and may also be trademarks or registered trademarks in other countries. Windows and .NET Framework are registered trademarks of Microsoft Corporation in the United States and are trademarks or registered trademarks of Microsoft Corporation in other countries.
This page is intentionally left blank.
Chapter 1 Overview Authorized Send is a customized MEAP application. It should be installed and operated on a Canon MEAP-enabled device, and provides authenticated scan to e-mail, scan to fax, and scan to folder functionalities. Authorized Send does not require the user to be authenticated to use the native functions of the machine, such as Copy, Print, and Scan, and does not interfere with any of these functions.
• Authenticate to a separate domain when scanning to a folder. • Provide the ability to use NTLM Authentication for Scan to Folder, regardless of the authentication method used. • Provide the ability to dynamically locate the closet available domain controller within the domain, and cache that domain controller until it becomes no longer available. • Provide the ability to populate the User Name text box from a login application. • Authenticate to a separate SMTP server.
1.1 System Requirements Authorized Send requires the proper installation and configuration of all items documented in this guide. Failure to correctly install or configure the application will affect its operation. If Authorized Send is not working properly, the problem can likely be traced to an installation or configuration issue. Please consult the appropriate chapters (including Chapter 5, “Troubleshooting,” on p. 149) before contacting Canon U.S.A.’s e-Support. 1.1.
IMPORTANT • MEAP and Use HTTP settings (from the Additional Functions screen) on the MEAP device must be enabled. (See the Reference Guide or the appropriate e-manual that came with your machine.) • Access to System Manager Settings (from the Additional Functions screen) on the MEAP device is necessary. • There must be network connectivity between the MEAP device, Active Directory servers, an e-mail server, and shared file servers.
1.1.3 Software Requirements Microsoft Internet Explorer 6.0 or later, with JavaScript enabled, must be installed and configured prior to installing the Authorized Send application. KDC is necessary for running Kerberos authentication. 1.1.4 Home Directory Requirements If the System Administrator wants to configure the Retrieve Home Directory (Active Directory only) feature, the following three types of configurations are supported.
■ Local Path This configuration illustrates when the home directory exists on the authentication server as a local folder. Home Directory as a Local Path When the home directory exists on the authentication server as a local folder, it is impossible for Authorized Send to use the text as it is. Therefore, some text manipulation is required. In this case, Authorized Send removes the leading drive letter (in this case, “C:”), and then the rest of the text is treated as a local share.
1.1.5 Distributed File System Requirements Authorized Send supports the following two DFS (Distributed File System) roots. ■ Stand-alone DFS root ■ Domain-based DFS root Successful domain-based DFS root support for Authorized Send requires that certain configuration settings be implemented and understood. 1. End users can only access the domain-based DFS roots that belong to the domain against which they were authenticated. 2.
1.1.6 Communication Interfaces The table below shows the different communication interfaces, their specific port numbers, and descriptions used with Authorized Send. Communication Interface 20 Port Description NTLM Determined by AD server Used for authentication. Kerberos UDP/TCP Port 88 Used for authentication. LDAP TCP Port 389 Used to retrieve e-mail addresses. SMB TCP Port 139 and TCP Port 445 Used for the Scan to Folder function. SMTP TCP Port 25 Used for the Scan to E-Mail function.
1.1.7 Supported Authentication Protocols Kerberos and NTLM are the supported protocols when communicating with a Microsoft Active Directory server. Simple Binding is the supported protocol when communicating with Novell eDirectory and Lotus Domino. Anonymous Binding is the protocol reserved for communication with any of the supported address book servers (when applicable).
1.2 Communication Environment Authorized Send must be installed on a MEAP-enabled device. There must be network connectivity between the MEAP device, DNS, authentication servers, address book servers, SMTP server, and shared file servers. It is necessary to configure Authorized Send to communicate with the authentication servers and address book servers. The following table lists the supported authentication servers and authentication methods.
The following illustrations represent a flow of operations for the Scan to E-Mail, Scan to Fax, and Scan to Folder functions of the Authorized Send application. Scan to E-Mail 1. The user makes an address book query from the Scan to E-Mail function on the MEAP machine. The machine sends an LDAP query to the address book server to retrieve the desired list of e-mail addresses. 2. Once all e-mail addresses are verified and selected, the machine sends the e-mail message to the E-mail or SMTP server.
Scan to Folder 1. The user browses for the desired folder on the file server directly from the machine. 2. Once the directory is found and selected, the machine sends the file to the designated location on the file server. NOTE When a user accesses a network share, they are authenticated against that share using their credentials. If they do not have access rights to that share, they will be prompted to enter a user name and password. Scan to Folder with NTLM Authentication 1.
Scan to a Dynamically Created Folder 1. The authenticated user selects a folder, enters a document name, and scans the document. 2. The scanned document is automatically stored in a sub-folder (that was dynamically created) of the selected folder. Dynamic Domain Controller Location 1. 2. 3. 4. 5. The user tries to log on to the machine using one of the authentication methods. The system is unable to contact the authentication server previously cached.
1.2.1 Communication Diagrams This section shows the flow of communication protocols based on the authentication method that you select. You can configure up to 10 authentication servers. 1.2.1.
1.2.1.
This page is intentionally left blank.
Chapter 2 Installing Authorized Send This chapter describes how to install Authorized Send on a MEAP-enabled machine using the MEAP SMS program. The System Administrator for the target MEAP device is best suited for installing the Authorized Send application, using a networked computer that is connected to the Internet and the device. Before installation, you must obtain the license file from www.canon.com/Meap, and have the IP address of the MEAP-enabled device.
2. Enter MeapSmsLogin in [Password] ➞ click [Log In]. The SMS Application List screen is displayed. 3. Click the [Install] tab. The SMS Install Application/License screen is displayed.
4. Under , click [Browse] to the right of Path. 5. Navigate to the drive or directory containing the .jar file ➞ select the file ➞ click [Open]. IMPORTANT Make sure that you select the file that ends with the .jar extension for the application file. 6. Verify that the correct file was selected.
7. Under , click [Browse] to the right of Path. IMPORTANT The license file must be downloaded from the LMS beforehand. For more information, contact your local authorized Canon dealer. 8. Navigate to the drive or directory containing the .lic file ➞ select the file ➞ click [Open]. IMPORTANT Make sure that you select the file that ends with the .lic extension for the license file. 9. Verify that the correct file was selected ➞ click [OK].
10. Click [OK]. During installation, the message is displayed.
11. Click the [Authorized Send] radio button ➞ click [Start]. Note that the status of the Authorized Send application is before clicking [Start]. The status will change to if successful. Installation is complete. 12. Click [Log Out] to exit SMS.
Chapter 3 Configuring Authorized Send This chapter describes how to configure Authorized Send from a Web browser and set up the authentication servers, address book servers, share names, and options for the Scan to E-Mail, Scan to Fax, and Scan to Folder functions. It also describes how to configure the application’s interface appearance using the optional Brand Configuration Tool.
2. Enter your user name in [Login ID] and your password in [Password] ➞ click [Login]. The default Login ID is ‘Administrator’, and the default password is ‘Admin’. The Authentication Servers screen is displayed. IMPORTANT If you are using a temporary license and the license has expired, the message will be displayed. You must update your license file, or you will not be able to access the Configuration servlet. 3. Click [Add].
4. Select the authentication method ➞ configure the settings based on the selected authentication method ➞ click [Create]. (See “Creating an Authentication Server,” on p. 49.) The available settings vary, depending on the selected authentication method. The Authentication Server is created, and is added to the list on the Authentication Servers screen. 5. Click [E-Mail Service] ➞ [General]. The E-Mail Service screen is displayed.
6. Configure the settings under ➞ click [Save]. (See “Configuring E-Mail Service Settings,” on p. 65.) 7. Click [E-Mail Service] ➞ [Address Book]. The Address Book Servers screen is displayed. 8. Click [Add]. The Create Address Book Server screen is displayed.
9. Configure the settings on the Create Address Book Server screen ➞ click [Create]. The address book server is created, and is added to the list on the Address Book Servers screen. 10. Click [Scan to E-Mail]. The Scan to E-Mail screen is displayed.
11. Click the [Enable Scan to E-mail] check box ➞ click [Save]. If you want to restrict users to only send e-mail messages to themselves, select the [E-mail to self only] check box. If you want to restrict access to the [Address Book] key or the [To], [Subject], [Body], or [File Name] text boxes on the SCAN TO EMAIL screen on the machine, select the respective check boxes under . If you want to restrict the [To] text box to only show the user’s e-mail address, select the [Self] check box.
12. Click [Scan to Fax]. The Scan to Fax screen is displayed. 13. Click the [Enable Scan to Fax] check box ➞ enter the appropriate template configuration in the [Fax Recipient Template] text box ➞ click [Save]. (See “Configuring Scan to Fax Settings,” on p. 97.) A message is displayed, informing you that the settings have been saved. NOTE The Scan to Fax function is disabled by default.
14. Click [Scan to Folder] ➞ [General]. The Scan to Folder screen is displayed. 15. Select the [Enable Scan to Folder] check box ➞ configure the Scan to Folder Access Controls ➞ enter the IP address of the NetBIOS name server in [WINS Server IP] ➞ click [Save]. Select the [Scan to Home Directory/Preselected Share only] check box if you want to automatically disable the [Preset Share], [File Server/Path], and [Browse] check boxes with one click.
Select the [Test] check box if you want the connection to the WINS server to be verified before you save the settings. Select the [Enable Dynamic Folder Creation] check box if you want a sub-folder to be automatically created when a user tries to scan to a folder that does not exist. Select the [Only for Preset Shares] check box to restrict a user to only scan to a dynamic folder that was created as a preset share by the System Administrator beforehand.
17. Click [Add] ➞ specify the Share Name settings ➞ click [Create]. (See “Creating a Preset Share,” on p. 103.) The new preset share is added to the list on the Preset Shares screen. 17.1 If you want to specify your home directory as a preselected share that will automatically appear in the Preset Share drop-down list on the SCAN TO FOLDER screen, select [Home Directory (if exists)] from the Preselected Share drop-down list ➞ click [Save]. (See “Creating a Preset Share,” on p. 103.
18. Click [Scan Settings] The Scan Settings screen is displayed. 19. Specify the scan settings, as necessary ➞ click [Save]. (See “Configuring Scan Settings,” on p. 108.) A message is displayed, informing you that the settings have been saved.
20. Click [Options]. The Options screen is displayed. 21. Specify the optional settings, as necessary ➞ click [Save]. (See “Configuring Optional Settings,” on p.113.) A message is displayed, informing you that the settings have been saved.
22. Click [Logs]. The Logs screen is displayed. 23. Check the [Enable Logging] check box ➞ specify the Severity Level ➞ configure the syslog servers ➞ click [Save]. (See “Configuring Log Settings,” on p. 117.) You can also view, download, or delete the current log file. For more information, see “Configuring Log Settings,” on p. 117.
24. If you want to verify the version number of Authorized Send, click [About]. 25. Click [Logout].
3.2 Creating an Authentication Server You can create up to 10 domains for authentication. IMPORTANT If you select the Kerberos protocol for the authentication method, make sure that the device clock setting is properly synchronized with the configured authentication server and address book server. For more information on synchronizing the device clock with the server clock, see “Synchronizing the Device and Server Time,” on p. 142. 1. Display the Authorized Send Configuration screen.
4. Click the Method drop-down list to select the authentication method. [Kerberos]: The machine communicates directly to Active Directory. [NTLM]: The machine communicates directly to Active Directory. [Simple]: Necessary if you use Domino or eDirectory for authentication. [Anonymous]: Configuring an anonymous authentication server enables you to use Authorized Send without logging on to the application.
5. Specify the settings for the selected authentication method. 5.1 If you select [Kerberos] as the authentication method, specify the Authentication Settings, Retrieve User E-Mail Address During Authentication, Scan to Home Directory Settings, and Scan to Folder Authentication Settings. Authentication Settings Method: Kerberos Pull Host from DNS: Select [Yes] to automatically pull the host information from the DNS after you click [Create].
Port: This text box is only displayed if Pull Host from DNS is set to ‘No’ and if the [Pull Port from DNS] check box is not selected. Enter the connecting port number of the authentication server. You can enter a maximum of five numbers. The default port number is ‘389’. SSL: This check box is only displayed if Pull Host from DNS is set to ‘No’ and if the [Pull Port from DNS] check box is not selected. Select this check box if you want the authentication server to use SSL.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the authentication server. This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
Scan to Folder Authentication Settings NTLM Authentication: Select this check box to use NTLM as the authentication method for the Scan to Folder feature, regardless of the authentication method you selected for the authentication server. NTLM domain name: Enter the domain name to be used for NTLM authentication of a share for the Scan to Folder feature.
Authentication Settings Method: NTLM Pull Host from DNS: Select [Yes] to automatically pull the host information from the DNS after you click [Create]. Select [No] if you want to manually configure the host information. The default setting is ‘No’. If you select the [Yes] radio button, the first “live” domain controller is used as the authentication server after you click [Create]. Host: This text box is only displayed if Pull Host from DNS is set to ‘No’.
Retrieve User E-Mail Address During Authentication Address Book Server: If you have already configured an address book server select the address book server from which your e-mail address will be retrieved from the drop-down list. Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the authentication server.
Scan to Folder Authentication Settings 5.3 NTLM Authentication: Select this check box to use NTLM as the authentication method for the Scan to Folder feature, regardless of the authentication method you selected for the authentication server. NTLM domain name: Enter the domain name to be used for NTLM authentication of a share for the Scan to Folder feature.
Port: Enter the connecting port number of the authentication server. You can enter a maximum of five numbers. The default port number is ‘389’. SSL: Select this check box if you want the authentication server to use SSL. If you select this check box, the host port number automatically changes to ‘636’. Test: Select this check box if you want the connection to the authentication server to be verified before you save the settings. The [Test] check box is selected by default.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the authentication server. This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
5.4 If you select [Anonymous] as the authentication method, specify the Anonymous User Information, and Address Book Server for E-Mail Lookup. Authentication Settings Method: Anonymous Anonymous User Information 60 Anonymous User Name: Enter the user name for anonymous sending. You can enter a maximum of 40 characters. Validation cannot occur if this text box is blank. The default setting is ‘anonymous’.
IMPORTANT • If an anonymous authentication server is configured, the SIGN IN screen on the machine is bypassed, and the user is logged on as an anonymous user. If more than one Authorized Send function is enabled, the MAIN screen on the machine is displayed. If only one Authorized Send function is enabled, that function’s screen is displayed. • If the [Anonymous User E-Mail] text box is blank, the Scan to Fax and Scan to E-Mail functions do not work on the machine.
3.3 Editing an Authentication Server You can edit a previously created authentication server from the Authorized Send Configuration screen. 1. Click [Authentication] ➞ select the check box next to the authentication server you want to edit ➞ click [Edit].
2. Edit the settings for the authentication server as necessary ➞ click [Update]. If you make a mistake, click [Reset] to return the settings to their original values. To cancel editing the authentication server and return to the Authentication Servers screen, click [Cancel].
3.4 Deleting an Authentication Server You can delete a previously created authentication server from the Authorized Send Configuration screen. 1. Click [Authentication] ➞ select the check box next to the authentication server you want to delete ➞ click [Delete]. 2. Click [OK]. If you do not want to delete the authentication server, click [Cancel]. The authentication server is deleted from the list.
3.5 Configuring the E-Mail Service Settings You can configure the settings for the SMTP server. NOTE The E-Mail Service Settings must be configured to use the Scan to E-Mail and Scan to Fax functions. 1. Click [E-Mail Service] ➞ [General]. If necessary, see the screen shot in step 5 of "Flow of Configuration Operations," on p. 35. 2. Configure the settings as necessary. General Settings SMTP Server Address: Enter the IP Address or DNS name of the SMTP server.
Use Public Credentials: Select [Yes] to configure the SMTP public credentials (Public User Name, Public Password). If [Yes] is selected, enter the user’s SMTP public name and password for SMTP authentication. If [No] is selected, the user’s normal login credentials are used. SMTP Public Username: If [Yes] is selected for Use Public Credentials, you must enter the user name for SMTP authentication.
3.6 Creating an Address Book Server You can create up to 10 address book Servers. When you create an address book server, you can either associate it with an authentication server, which has been previously created, or you can create a standalone address book server with no association to an authentication server. IMPORTANT • You must configure an address book for an authentication server to retrieve an e-mail address for the end user when authenticating against the authentication server.
2. Specify whether you want to create an address book server with or without an association to an authentication server. 2.1 If you want to create an address book server with an association to an authentication server, select [Kerberos], [NTLM], [Simple], or [Anonymous] from the Authentication Server drop-down list under .
2.1.1 If you select a Kerberos or NTLM authentications server, specify the Address Book Settings and Scan to Home Directory Settings ➞ proceed to step 4. Address Book Settings Same as Authentication Server: Select [Yes] to create the address book with the same credentials as the selected authentication server. If you select [No], proceed to step 3 and enter the configuration information for the authentication method.
LDAP Match Attribute: Enter the LDAP Match Attribute to be used for e-mail address retrieval. If the [Retrieve Home Directory (Active Directory only] check box is selected under , the value entered here is also used for Home Directory retrieval. An example for Active Directory is ‘sAMAccountName’ or ‘userPrincipalName’. LDAP Email Attribute: Enter the e-mail LDAP attribute to pull the user’s e-mail address. An example for Active Directory is ‘mail’.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
2.1.2 If you select a Simple authentication server, specify the Address Book Settings and Scan to Home Directory Settings ➞ proceed to step 4. Address Book Settings Same as Authentication Server: Select [Yes] to create the address book with the same credentials as the selected authentication server. If you select [No], proceed to step 3 and enter the configuration information for the authentication method.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
2.2 If you want to create a standalone address book server with no association to an authentication server, select [None] from the Authentication Server dropdown list under . NOTE • The items in the Authentication Server drop-down list correspond to previously registered authentication servers.
3. Select the authentication method from the Method drop-down list. [Kerberos]: The machine communicates directly to Active Directory. [NTLM]: The machine communicates directly to Active Directory. [Simple]: Necessary, if you use Domino or eDirectory for authentication. [Anonymous]: Authorized Send will not use any user login credentials to search the address book for e-mail addresses.
3.1 If you select [Kerberos] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Kerberos Pull Host from DNS: Select [Yes] to automatically pull the host information from the DNS after you click [Create]. Select [No] if you want to manually configure the host information. The default setting is ‘No’.
SSL: This check box is only displayed if Pull Host from DNS is set to ‘No’ and if the [Pull Port from DNS] check box is not selected. Select this check box if you want the address book server to use SSL. If you select this check box, the host port number automatically changes to ‘636’. Test: This check box is only displayed if Pull Host from DNS is set to ‘No’. Select this check box if you want the connection to the address book server to be verified before you save the settings.
Search Root: Depending on your environment, you must enter the Base DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. LDAP Match Attribute: Enter the LDAP Match Attribute to be used for e-mail address retrieval.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
3.2 If you select [NTLM] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: NTLM Pull Host from DNS: Select [Yes] to automatically pull the host information from the DNS after you click [Create]. Select [No] if you want to manually configure the host information. The default setting is ‘No’. If you select the [Yes] radio button, the first “live” domain controller is used as the address book server after you click [Create].
SSL: This check box is only displayed if Pull Host from DNS is set to ‘No’ and if the [Pull Port from DNS] check box is not selected. Select this check box if you want the address book server to use SSL. If you select this check box, the host port number automatically changes to ‘636’. Test: This check box is only displayed if Pull Host from DNS is set to ‘No’. Select this check box if you want the connection to the address book server to be verified before you save the settings.
LDAP Match Attribute: Enter the LDAP Match Attribute to be used for e-mail address retrieval. If the [Retrieve Home Directory (Active Directory only] check box is selected under , the value entered here is also used for Home Directory retrieval. An example for Active Directory is ‘sAMAccountName’ or ‘userPrincipalName’. LDAP Email Attribute: Enter the e-mail LDAP attribute to pull the user’s e-mail address. An example for Active Directory is ‘mail’.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
3.3 If you select [Simple] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings 84 Method: Simple Host: Enter the DNS name or IP address of the address book server. Port: Enter the connecting port number of the address book server. You can enter a maximum of five numbers. The default port number is ‘389’. SSL: Select this check box if you want the address book server to use SSL.
Use Public Credentials: Select [Yes] to configure the public credentials (Public DN and Public Password), or select [No] to use anonymous binding. Public DN: This text box is only displayed if Use Public Credentials is set to ‘Yes’. Enter the user’s login Distinguished Name to use when performing the first bind of the Simple Binding process. Public Password: This text box is only displayed if Use Public Credentials is set to ‘Yes’.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
3.4 If you select [Anonymous] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Anonymous Host: Enter the DNS name or IP address of the address book server. Port: Enter the connecting port number of the address book server. You can enter a maximum of five numbers. The default port number is ‘389’. SSL: Select this check box if you want the address book server to use SSL.
Search Root: Depending on your environment, you must enter the Base DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. If the directory server is authenticating against eDirectory or Domino and the organization is, for example, Canon, then the search root is o=canon.
Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP attribute of “Home Directory.” This will create a Home Directory element in the Preselected Share drop-down list on the Scan to Folder Preset Shares configuration screen.
3.7 Editing an Address Book Server You can edit a previously created address book server from the Address Book Servers configuration screen. 1. Click [E-Mail Service] ➞ [Address Book] ➞ select the check box next to the address book server you want to edit ➞ click [Edit].
2. Edit the settings for the address book server as necessary ➞ click [Update]. If you make a mistake while editing the address book server settings, click [Reset] to return the settings to their original values. To cancel editing the address book server and return to the Address Book Servers screen, click [Cancel].
3.8 Deleting an Address Book Server You can delete a previously created address book server from the Address Book Servers configuration screen. 1. Click [E-Mail Service] ➞ [Address Book] ➞ select the check box next to the address book server you want to delete ➞ click [Delete]. 2. Click [OK]. If you do not want to delete the address book server, click [Cancel]. The address book server is deleted from the list.
3.9 Configuring Scan to E-Mail Settings You can enable the Scan to E-Mail function, restrict user access to the [Address Book] key and [To], [Subject], [Body], and [File Name] text boxes on the SCAN TO EMAIL screen on the machine, as well as enable E-mail CC to self. 1. Click [Scan to E-Mail]. If necessary, see the screen shot in step 10 of “Flow of Configuration Operations,” on p. 35. 2. Click the [Enable Scan to E-mail] check box.
3. Configure the settings under . Access Controls E-mail to self only: Select this check box if you want to restrict users to only send e-mail messages to themselves, and to automatically disable the [Address Book] key and the [To] text box on the SCAN TO EMAIL screen on the machine. Disabled Column 94 Address Book: Select this check box if you want to restrict user access to the [Address Book] key on the SCAN TO EMAIL screen on the machine.
Self This check box is only displayed when the [E-mail to self only] check box is not selected. When the [Self] check box is selected, the e-mail address of the user logged on to Authorized Send is displayed in the [To] text box on the SCAN TO EMAIL Screen. Subject: Select this check box to disable the [Subject] text box on the SCAN TO EMAIL screen. Required: Select this check box if you require the user to enter a subject for their e-mail messages.
4. If necessary, click the [E-mail CC to self] check box ➞ click [Save]. If you select [E-mail CC to self], a copy of each e-mail message sent via SCAN TO EMAIL will be sent to the currently logged on user’s e-mail address. IMPORTANT You must select the [Self] check box next to the [To] text box if you selected to disable the [Address Book] and [To] check boxes under at the same time, and the default value for the [To] text box is blank.
3.10 Configuring Scan to Fax Settings You can enable the Scan to Fax function and configure the General Settings. 1. Click [Scan to Fax]. If necessary, see the screen shot in step 12 of “Flow of Configuration Operations,” on p. 35. 2. Click the [Enable Scan to Fax] check box. If you want to disable the Scan to Fax function, click the [Enable Scan to Fax] check box to clear the check mark. NOTE • The Scan to Fax function is disabled by default.
3. Specify the General Settings ➞ click [Save]. General Settings Fax Recipient Template: Enter the appropriate template configuration. For example, if you enter ${FAXNUMBER}@faxserver.company.com as the string, and the fax number entered by the user (for example, ‘1234567’) when sending from the Scan to Fax screen, Authorized Send sends an e-mail message to the SMTP server with “1234567@faxserver.company.com” in the “To:” text box.
NOTE • The user does not see the template. The user only has to enter the fax number(s) on the Authorized Send SCAN TO FAX screen on the machine. • If you upgrade Authorized Send from version 3.x to 4.0 or later, the fax template is automatically updated to the current format, which would include: '${FAXNUMBER}' as the prefix to what was configured in version 3.x. For example, if the Domain text box on the Scan to Fax screen of the Authorized Send Configuration servlet was configured with “auth.send.
3.11 Configuring Scan to Folder Settings You can enable the Scan to Folder function and configure the Access Controls and General Settings. 1. Click [Scan to Folder] ➞ [General]. If necessary, see the screen shot in step 14 of “Flow of Configuration Operations,” on p. 35. 2. Select the [Enable Scan to Folder] check box. If you want to disable the Scan to Folder function, click the [Enable Scan to Folder] check box to clear the check mark.
3. Configure the settings under . Access Controls Scan to Home Directory/Preselected Share only: Select this check box if you want to automatically disable the [Preset Share], [File Server/Path], and [Browse] check boxes with one click. Disabled Column Preset Share: Select this check box if you want to prevent the user from selecting a preset share from the Preset Share drop-down list on the SCAN TO FOLDER screen.
4. Specify the General Settings ➞ click [Save]. General Settings 102 WINS Server IP: Enter the IP address of the NetBIOS name server. Test: Select this check box if you want the connection to the WINS server to be verified before you save the settings. The [Test] check box is selected by default. Enable Dynamic Folder Creation: Select this check box to automatically create any folders in the share path that may not exist when a user scans a document.
3.12 Creating a Preset Share You can create any number of preset shares. 1. Click [Scan to Folder] ➞ [Preset Shares]. If necessary, see the screen shot in step 16 of “Flow of Configuration Operations,” on p. 35. 2. Click [Add].
If you want to specify your home directory as a preselected share that will automatically appear in the Preset Share drop-down list on the SCAN TO FOLDER screen, select [Home Directory (if exists)] from the Preselected Share drop-down list ➞ click [Save]. NOTE If you do not have a Home Directory, or if you do not select [Home Directory (if exists)] from the Preselected Share drop-down list, no share will appear on the SCAN TO FOLDER screen.
3. Specify the Share Name settings ➞ click [Create]. Create Share Name Share Name: Enter a name for the preset share. The Share Name is case-sensitive. You can enter a maximum of 31 characters. File Server: Enter the DNS name or IP Address to send documents. File Path: Enter the path of the folder to send documents. Append: Click [Append] to add a user’s name to the string in the [File Path] text box.
3.13 Editing a Preset Share You can edit a previously created preset share from the Scan to Folder configuration screen. 1. Click [Scan to Folder] ➞ [Preset Shares] ➞ select the check box next to the preset share you want to edit ➞ click [Edit]. 2. Edit the settings for the preset share as necessary ➞ click [Update]. If you make a mistake, click [Reset] to return the settings to their original values. To cancel editing the preset share and return to the Scan to Folder configuration screen, click [Cancel].
3.14 Deleting a Preset Share You can delete a previously created preset share from the Scan to Folder configuration screen. 1. Click [Scan to Folder] ➞ [Preset Shares] ➞ select the check box next to the preset share you want to delete ➞ click [Delete]. 2. Click [OK] on the confirmation dialog box. If you do not want to delete the preset share, click [Cancel]. The preset share is deleted from the list.
3.15 Configuring Scan Settings You can configure the Default File Type Settings and Default Scan Settings For File Types. This causes the default scan settings to automatically change based on the file type that is selected. 1. Click [Scan Settings]. If necessary, see the screen shot in step 18 of “Flow of Configuration Operations,” on p. 35. 2. Specify the Default File Type Settings.
3. Configure the settings under ➞ click [Save]. Default Scan Settings for File Types Scan Settings for File Type: Select [PDF], [PDF(Compct)], [PDF(OCR)], [TIFF], [TIFF(Single)], or [JPEG] from the drop-down list. This file type in conjunction with the specific scan settings that you select and save, are displayed as the new default settings for that file type on the SCAN SETTINGS screen. The default Scan Settings for File Type is ‘PDF’.
Brightness: Select this check box to disable and gray out the Brightness scroll bar on the SCAN SETTINGS screen. PDF Encryption: Select this check box to hide the PDF Encryption icon on the SCAN SETTINGS screen. NOTE The PDF Encryption check box only appears on machines that support PDF encryption. Image Mode: Select this check box to disable and gray out the Image Mode drop-down list on the SCAN SETTINGS screen.
Resolution: Select [200x200], [300x300], or [600x600] from the drop-down list to correspond with the file type that you selected from the Scan Settings for File Type drop-down list. The default Resolution depends on the file type that you selected. NOTE • If your machine does not support a particular resolution, that resolution is not displayed. • Authorized Send Version 4.0 and lower versions have a ‘DPI is user Configurable’ setting on the Options screen in the Configuration servlet.
Color Mode: Select [Auto], [Full Color], or [Black] from the drop-down list to correspond with the file type that you selected from the Scan Settings for File Type drop-down list. The default Color Mode depends on the file type that you selected. NOTE • If your machine is black-and-white only, [Black] is automatically selected and the Color Mode drop-down list is disabled and grayed out.
3.16 Configuring Optional Settings You can configure the timeout settings, decide whether to populate the User Name text box on the Authorized Send SIGN IN screen, enable USB keyboard input, and rename the tab of the Authorized Send application on the machine. IMPORTANT You can use third-party USB keyboards with Authorized Send. However, only the Cherry G84 keyboard has been tested with this application. 1. Click [Options].
Enable USB Keyboard input: Select this check box to enable your machine to utilize an attached USB keyboard. If this check box is not selected, your machine cannot utilize an attached USB keyboard and automatically uses the MEAP virtual keyboard instead. If you select the [Enable USB Keyboard input] check box, the [Only Use Cherry G84 Keyboard] check box is selected automatically. The [Enable USB Keyboard input] check box is not selected by default.
Only Use Cherry G84 Keyboard: Select this check box if you want to only use the Cherry G84 keyboard. By default, this check box is selected. NOTE • The [Only Use Cherry G84 Keyboard] check box is displayed only if the [Enable USB Keyboard input] check box is selected. • If a Cherry G84 keyboard and another HID are connected to your machine at the same time, only the Cherry G84 keyboard is functional for Authorized Send.
Application Display Name (up to 20 characters): Enter the application display name. You can enter a maximum of 20 characters. Valid characters are the printable ASCII characters and the carriage return. The default setting is ‘Authorized Send’. If the application display name is changed, restart the machine for the change to take effect. If you want to return to the default setting, leave this text box blank.
3.17 Configuring Log Settings You can enable the Log function and view or delete the current log file. 1. Click [Logs]. If necessary, see the screen shot in step 22 of “Flow of Configuration Operations,” on p. 35. 2. Click the [Enable Logging] check box. When the [Enable Logging] check box is selected, Authorized Send will log debug and error messages up to a maximum file size of 1 MB (1,024 KB). There are can be two log files, each with a maximum file size of 512 KB.
3. Select the severity level from the Severity Level drop-down list. The table below shows the supported levels of increasing severity and their respective numeric codes. Severity Level Emergency Alert Critical Error Warning Notice Info Debug Numeric Code 0 1 2 3 4 5 6 7 When you select a severity from the drop-down list, that severity and all severities with a lower numeric value are logged. The default setting is ‘Debug’. If [Debug] is selected, all severities are logged.
4. Select the [Enable Syslog] check box. If you select the [Enable Syslog] check box, at least one syslog server must be configured. Authorized Send supports only the user-level messages (Numeric Code = 1) and security/authorization messages (Numeric Code = 4) Facilities of the Syslog RFC3164 Protocol. User-level messages are logged locally within the Authorized Send application. Security/authorization messages are also logged locally, as well as sent to all configured remote syslog servers.
5. Enter a syslog server’s IP address under in the table ➞ enter the corresponding UDP port number for the syslog server under in the table. You can configure up to three syslog servers. You can enter a maximum of five numbers for the UDP port. 6. Click [Save]. 7. To view the log file, click [Current Log] or [History Log] (if available). A browser window opens to display a snapshot of the contents of the log file. NOTE • The log file contents displayed are not live.
9. To delete the log file, click [Delete]. If you want to disable the Log function, click the [Enable Logging] check box to clear the check mark ➞ click [Save].
3.18 Changing the Login ID and Password You can change your Login ID and password to log on to the Authorized Send Configuration servlet. 1. Display the Authorized Send Configuration screen and log on to the Authorized Send Configuration servlet. If necessary, see steps 1 and 2 of "Flow of Configuration Operations," on p. 35. 2. Click [Change ID & Password].
3. Enter the new login ID in the [New Login ID] text box ➞ confirm the ID in the [Confirm New Login ID] text box ➞ enter the new password in the [New Password] text box ➞ confirm the password in the [Confirm New Password] text box ➞ click [OK]. If you want to cancel changing the login ID and password, press [Cancel]. NOTE • There is no limit to the number of characters that can be used for the new login ID and new password. • Any alphanumeric character can be used for the new login ID and password.
3.19 Using the Brand Configuration Tool (Optional) This section describes how to dynamically modify the appearance of the end user’s interface screens using the optional Brand Configuration tool. You can customize the application’s banner image and colors, portal service logo, screen colors, button colors, and special button colors.
The following section describes the different areas that make up the Brand Configuration tool screen. Description Area: The description area displays an explanation of the Brand Configuration tool’s purpose. Preview Area: The preview area displays a preview of how the end user’s interface screens appear after changing the selected images and colors. This area displays a Banner Foreground, Screen Foreground, Normal Button, Special Button, and all of the images and colors relevant to each.
Status Area: The status area displays messages as various brand configuration operations are performed. It also displays informative messages whenever errors occur. If a message is larger than the display area, a scrollbar appears to enable you to view the entire message.
Settings Area: The settings area displays the text boxes used for modifying image and color settings seen in the preview area. The settings area is made up of the Portal Service Logo, Banner, Screen, Button, and Special Button.
Portal Service Logo: The Portal Service Logo provides a text box for entering the location of the application logo you want, and provides a preview of the selected image. Banner: The Banner area provides text boxes for specifying the background and foreground colors, and entering the location of the banner you want. Screen: The Screen area provides text boxes for specifying the background, foreground, and border colors.
2. Select [Clear All], [Default], or [Current]. [Clear All]: Click to clear all of the settings. [Default]: Click to load the default values for each setting and populate the corresponding text boxes in the settings area. [Current]: Click to load the currently saved values for each setting and populate the corresponding text boxes in the settings area. 3. If you want to specify the end user’s interface portal service logo: 3.
4. If you want to specify the background and foreground colors, and select the image to be displayed in the end user’s interface banner area: 4.1 Click the [Background Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 4.2 Click the [Foreground Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 4.
5. If you want to specify the background, foreground, and border colors to be displayed in the end user’s interface screen area: 5.1 Click the [Background Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 5.2 Click the [Foreground Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 5.
6. If you want to specify the end user’s interface background and foreground colors for the normal buttons: 6.1 Click the [Background Color] text box under
7. If you want to specify the end user’s interface background and foreground colors for the special buttons: 7.1 Click the [Background Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 7.2 Click the [Foreground Color] text box under ➞ enter three comma-separated digits representing the desired RGB color. 7.
This page is intentionally left blank.
Chapter 4 Configuring the MEAP Device This chapter describes how to configure your MEAP-enabled device so that you can use it with the Authorized Send application. IMPORTANT Inbox 99 must be available for use on the MEAP device (i.e., is not full), and with no password protection. Authorized Send temporarily stores scanned images in this inbox, and therefore, it is important that Inbox 99 have sufficient space available for these images to be stored.
2. Press [System Settings]. If the System Manager ID and System Password have been set, enter the System Manager ID and System Password using ⓪ – ⑨ (numeric keys) ➞ press (Log In/Out).
3. Press [Network Settings]. 4. Press [TCP/IP Settings].
5. Press [DNS Server Settings].
6. Press [Primary DNS Server] ➞ enter the IP address using ⓪ – ⑨ (numeric keys). IMPORTANT • It is not necessary to enter a [Secondary DNS Server] or [Host Name]; however, you must enter a [Domain Name]. • If you are using SMTP Authentication, make sure that the host name does not contain spaces (including trailing spaces) or trailing periods. 7. Press [Domain Name] ➞ enter the domain name ➞ press [OK]. 8. Press [OK]. 9. Press [Done] repeatedly until the Basic Features screen is displayed. 10.
4.2 Specifying the Auto Clear Mode for Auto Log Off If the machine is idle for a certain period of time (after a scan to e-mail, scan to fax, or scan to folder key operation or job), you will be logged off of Authorized Send. This period of time is called the "Auto Clear Time." The Auto Clear Time mode can be set from ‘0’ to ‘9’ minutes in 1 minute increments, and can also be set to ‘Off’. NOTE • If [0] is selected, the Auto Clear Time mode is not set. • The default setting is ‘2’ minutes. 1.
3. Press [Auto Clear Time]. 4. Press [-] or [+] to specify the desired Auto Clear Time ➞ press [OK]. You can also enter values using ⓪ – ⑨ (numeric keys). 5. Press [Done] repeatedly until the Basic Features screen is displayed.
4.3 Synchronizing the Device and Server Time If you configure an authentication server or address book server for Kerberos authentication, you must ensure that the device clock and server clock are synchronized within the maximum server specified clock skew tolerance of ‘5’ minutes. When you authenticate using Kerberos, if there is more than a 5 minute time difference between the device clock and server clock, an error message is displayed.
3. Press [Network Settings]. 4. Press [TCP/IP Settings].
5. Press [SNTP Settings]. NOTE If the desired setting is not displayed, press [▼] or [▲] to scroll to the desired setting.
6. Specify the SNTP settings.
7. Press [NTP Server Check] to check the status of the NTP server. If is displayed next to [NTP Server Check], time synchronization is working correctly via SNTP. If is displayed next to [NTP Server Check], check the settings for [NTP Server Address] set in step 6. 8. Press [OK]. IMPORTANT To perform time synchronization via SNTP, it is necessary to set the time zone of the region in which you are using the machine in advance.
4.3.2 Manually Adjusting the Device Time You can manually adjust the device time to match the Kerberos authentication server or address book server time. 1. On the machine’s control panel, press (Additional Functions). 2. Press [Timer Settings].
3. Press [Time Fine Adjustment]. 4. Press [-] or [+] to adjust the time as necessary ➞ press [OK]. 5. Press [Done] repeatedly until the Basic Features screen is displayed.
Chapter 5 Troubleshooting This chapter explains the various issues that may arise when installing and configuring the necessary components of the Authorized Send application, along with possible causes and remedies. Problem You cannot connect to the network. Remedy Make sure that: • The IP addresses of the MEAP device and server PCs are correct, and that you can ping the device. • The server PC is on the network. • You are not using a proxy server.
Problem The [Scan to E-Mail] button is disabled. Remedy Check to make sure that: • An e-mail address is specified in the user’s address book account. • An SMTP server address is configured for Authorized Send. • For more information, see “LDAP Failure Notification Messages,” on p. 168. IMPORTANT It is necessary for the user to log off, and then log back on after the changes mentioned above have been made to activate the [Scan to E-Mail] key.
Chapter 6 List of Error Messages This chapter explains the various messages that appear on the Authorized Send Configuration servlet screen or on the touch panel display of the MEAP device, along with possible causes and remedies. Any words that appear italicized are variables, and will be replaced with their corresponding values on the actual application screen.
6.1 Configuration Screen Error Messages Configuration screen messages are displayed on the Configuration screen of the Authorized Send Configuration servlet. If an error occurs during the configuration process, it is displayed in the body of the Configuration servlet screen, and is listed here. 6.1.1 Authentication Servers Screen Error Message This section explains the Authentication Servers screen error message, along with a possible cause and remedy.
Message Cause Remedy Authentication Port has to be a positive number. A negative number is entered in the [Port] text box. Enter the numeric value greater than zero for the connecting port number of the authentication server. Authentication Hostname is missing. The [Hostname] text box is blank. Enter the host name of the authentication server. Authentication Public DN is missing. The [Public DN] text box is blank. Enter the public DN. Authentication LDAP Match Attribute is missing.
Message Cause Anonymous User E-Mail is not valid: local part cannot contain character(s) ‘?’, ‘&’ The local part contains non-alphanumeric values other than ‘.’, ‘-’, and ‘_’ (such as ‘?’, ‘&’, ‘$’, ‘#’, ‘%’, etc.). Make sure the local part contains only the non-alphanumeric values ‘.’, ‘-’, and ‘_’. Anonymous User E-Mail is not valid: domain cannot be empty if ‘@’ is present. The symbol, ‘@’, is present, but the domain part is blank.
Message Duplicated authentication server: an authentication server with domain [x] and authentication method [y] already exists. 6.1.3 Cause Remedy An authentication server already exists where the domain is represented by x, and the authentication method is represented by y. Check the authentication server, domain, and authentication method and try again.
6.1.4 Address Book Servers Screen Error Message This section explains the Address Book Servers screen error message, along with a possible cause and remedy. For more information on the remedy, see “Creating an Address Book Server,” on p. 67. 6.1.5 Message Cause Remedy Maximum address book servers have been created. To create a new address book server, you have to delete the old one(s) first. The maximum number of 10 address book servers has been created.
Message Cause Address Book Domain is missing. Address Book Search Root is missing. Address Book LDAP Match Attribute is missing. Address Book LDAP Email Attribute is missing. The [Domain Name] text box is blank. The [Search Root] text box is blank. Connection Failed. Could not connect to x:y 6.1.6 The [LDAP Match Attribute] text box is blank. The [LDAP Email Attribute] text box is blank.
Message Cause Remedy Perform any of the following: 6.1.7 • Clear the check mark from the [Subject] check box. Default value for ‘Subject’ field cannot be empty if the field is disabled and required. The [Subject] check box is selected, the [Subject] text box is blank, and the [Required] check box is selected. Default value for ‘Subject’ field is too long. It cannot exceed 255 characters. The default value in the [Subject] text box exceeds 255 characters.
Message Connection Failed. Could not resolve host name: x. 6.1.9 Cause The connection to the WINS server failed because Authorized Send cannot resolve the WINS server host name, represented by x. Remedy Check the WINS server host name and/or server configuration and try again. Create/Update Share Name Screen Error Messages This section explains the Create Share Name and Update Share Name screen error messages, along with possible causes and remedies.
6.1.10 Options Screen Error Messages This section explains the Options screen error messages, along with possible causes and remedies. For more information on the remedies, see “Configuring Optional Settings,” on p. 113. Message 160 Cause Remedy Configuration Session Timeout cannot be zero. Zero is entered in the [Configuration Session Timeout (min)] text box. Enter a numeric value greater than zero for the configuration session timeout. Configuration Session Timeout cannot exceed 60 minutes.
Message Cause Remedy Application Display Name cannot contain the following characters: ‘x’, ‘y’, ‘z’ The [Application Display Name (up to 20 characters)] text box contains ‘x’, ‘y’, and ‘z’, which represent invalid characters. Make sure the application display name is using valid characters. See step 2 in “Configuring Optional Settings,” on p. 113. *Warning!: Due to the size of the Application Display name entered, Application Display Name may cover the Authorized Send tab icon.
6.1.12 Change Login ID & Password Screen Error Messages This section explains the Change Login ID and Password screen error messages, along with possible causes and remedies. For more information on the remedies, see “Changing the Login ID and Password,” on p. 162. Message Cause Remedy New Login ID and Confirm New Login ID do not match. The value entered for the [New Login ID] text box does not match the value entered for the [Confirm New Login ID] text box.
6.1.14 Authorized Send Configuration Servlet Log On Screen Error Messages This section explains the Authorized Send Configuration servlet log on screen error messages, along with possible causes and remedies. For more information on the remedies, see “Flow of Configuration Operations,” on p. 35. Message Cause Remedy Invalid Login ID and/or Password. Please try again. The [Login ID] or [Password] text box contains an invalid entry. Enter the correct login ID or password credentials.
6.2 SIGN IN Screen Notification Messages The SIGN IN screen notification messages are displayed on the SIGN IN screen in the upper-right hand portion of the MEAP device’s UI. You will remain at the SIGN IN screen until they are resolved. 6.2.1 General Authentication Notification Messages This section explains the general authentication notification messages, along with possible causes and remedies.
6.2.2 Kerberos Authentication Notification Messages This section explains the Kerberos authentication notification messages, along with possible causes and remedies. Message Cause Remedy Kerberos requires username, password, host and domain The entered user name or password is blank, or the Configuration servlet host or domain value is blank. Verify and reconfigure the authentication server settings for the appropriate authentication server in the Configuration servlet, and try to log on again.
Message 6.2.3 Cause Unknown host (host) The host cannot be resolved. An unknown Kerberos error has occurred Any other Kerberos error message that has not been defined as caught has occurred. Remedy • Check your Kerberos configuration. • Ensure that the configured server is active. Check your Kerberos configuration. NTLM Authentication Notification Messages This section explains the NTLM authentication notification messages, along with possible causes and remedies.
6.2.4 Simple Authentication Notification Messages This section explains the Simple authentication notification messages, along with possible causes and remedies. Message Check Public DN and Public Password and try again Anonymous binding not accepted by host (host) Confidentiality Required Cause Remedy The public DN and public password have been configured in the Configuration servlet, however they are incorrect. Verify the public DN and public password.
6.3 MAIN Screen Notification Messages The MAIN screen notification messages are displayed on the MAIN screen in the upper-right hand portion of the MEAP device’s UI. If an error has occurred during the authentication process, it will be displayed here. 6.3.1 LDAP Failure Notification Messages This section explains the LDAP failure notification messages, along with possible causes and remedies. These errors will not prevent you from authenticating into Authorized Send.
Message Cause Remedy Your E-mail was not found, invalid credentials. Invalid credentials have been supplied by the client. Check your LDAP configuration. Your E-mail was not found, invalid DN syntax. Invalid DN syntax has been supplied by the client (for example, an invalid search root is entered for the authentication server settings in the Configuration servlet). Your E-mail was not found, LDAP not supported. LDAP is not a supported protocol on the server. Check your LDAP configuration.
6.3.2 Configuration Notification Message This section explains the configuration notification message, along with a possible cause and remedy. Message Please contact administrator to configure E-Mail Service. 6.3.3 Cause There is a bad configuration. Remedy Configure a valid SMTP server for the appropriate address book server in the Configuration servlet. Warning Notification Message This section explains the warning notification message, along with a possible cause and remedy.
6.4 SCAN TO EMAIL Screen Notification Messages The SCAN TO EMAIL screen notification messages are displayed on the SCAN TO EMAIL screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed to notify you of an event. 6.4.1 SCAN TO EMAIL Warning Message This section explains the SCAN TO EMAIL warning message, along with a possible cause and remedy. Message Scanning is disabled because the device is not ready. 6.4.
Message Press key to validate. 6.4.3 Cause The USB keyboard is in use, and a text box was changed that requires validation. Remedy Press [ENTER] on the USB keyboard. SCAN TO EMAIL Notification Messages This section explains the SCAN TO EMAIL notification messages, along with possible causes and remedies. Message 6.4.4 Cause Remedy Checking SMTP Connection… You are attempting to scan and send a document via SMTP. If the connection is OK, your document is sent to the specified destination.
6.5 SCAN TO FAX Screen Notification Messages The SCAN TO FAX screen notification messages are displayed on the SCAN TO FAX screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed notifying you of an event. 6.5.1 SCAN TO FAX Warning Message This section explains the SCAN TO FAX warning message, along with a possible cause and remedy. Message Scanning is disabled because the device is not ready. 6.5.
6.5.3 SCAN TO FAX Notification Messages This section explains the SCAN TO FAX notification messages, along with possible causes and remedies. Message 6.5.4 Cause Remedy Checking SMTP Connection… You are attempting to scan and send a document via SMTP. If the connection is OK, your document is sent to the specified destination. Checking SMTP Authentication… You are attempting to scan and send a document via SMTP, and SMTP authentication is enabled.
6.6 SCAN TO FOLDER Screen Notification Messages The SCAN TO FOLDER screen notification messages are displayed on the SCAN TO FOLDER screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed notifying you of an event. 6.6.1 SCAN TO FOLDER Warning Message This section explains the SCAN TO FOLDER warning message, along with a possible cause and remedy. Message Scanning is disabled because the device is not ready. 6.6.
6.6.3 SCAN TO FOLDER Notification Messages This section explains the SCAN TO FOLDER notification messages, along with possible causes and remedies. 6.6.4 Message Cause Remedy Checking access to [share] share… The MEAP device is attempting to acquire sufficient read privileges. Not applicable. Validating File Server and File Path… The MEAP device is validating correct formatting of the file server and file path. Not applicable.