Application Access Manager Administrator's Guide June 2013 A00 www.dell.com | dell.
Contents 2 Contents Overview.....................................................................................................3 Configuring the application..........................................................................4 Securing an application or device function...............................................................................................4 Setting the session timeout..............................................................................................................
Overview 3 Overview Application Access Manager lets you associate application and device functions with authentication modules, securing those functions through authentication and authorization. A session‑based feature lets users access multiple secured functions over a specified period of time.
Configuring the application 4 Configuring the application Securing an application or device function To secure application and device functions on printers running eSF version 3.0 or later, use the security page on the Embedded Web Server. For more information, see the Embedded Web Server Administrator's Guide. Notes: • When using the security page on the Embedded Web Server to secure functions, you will be asked to set up a building block first.
Troubleshooting 5 Troubleshooting I cannot find the functions I want to secure Make sure the application you want to secure is installed and running properly. If you want to secure a device function, then see the Embedded Web Server Administrator's Guide. Note: You can secure device functions only on printers that support eSF version 2.0 or later. For more information, see “Checking which version of the Embedded Solutions Framework is installed on a printer” on page 6.
Appendix 6 Appendix Checking which version of the Embedded Solutions Framework is installed on a printer 1 Obtain the printer IP address: • From the printer home screen • From the TCP/IP section in the Network/Ports menu • By printing a network setup page or menu settings page, and then finding the TCP/IP section Note: An IP address appears as four sets of numbers separated by periods, such as 123.123.123.123. 2 Open a Web browser, and then type the printer IP address in the address field.
Notices 7 Notices Edition notice June 2013 The following paragraph does not apply to any country where such provisions are inconsistent with local law: THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you.
Notices 8 property rights in and to Software are owned and retained by the manufacturer or owner of the Software. All rights not expressly granted under this Agreement are reserved by the manufacturer or owner of the Software. By opening or breaking the seal on the Software packet(s), installing, downloading, activating the Software, click-accepting these terms, or using the Software, you agree to be bound by the terms of this Agreement.
Notices 9 PARTICULAR PURPOSE OR ANY WARRANTY REGARDING TITLE OR AGAINST INFRINGEMENT, FOR THE SOFTWARE AND ALL ACCOMPANYING WRITTEN MATERIALS. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS; YOU MAY HAVE OTHERS, WHICH VARY FROM JURISDICTION TO JURISDICTION.
Notices 10 U.S. Government Restricted Rights The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S. Government end users acquire the software and documentation with only those rights set forth herein.
Notices 11 Copyright (c) 2001 Markus Friedl Copyright (c) 2002 Olaf Kirch Copyright (c) 2003 Kevin Stefanik Redistribution and use in source an binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. 2.
Index Index A adding security application function 4 device function 4 Application Access Manager overview 3 application function securing 4 authentication modules are missing 5 D device function securing 4 E Embedded Solutions Framework checking version number 6 F function is set to an unknown state 5 functions are missing 5 M missing authentication modules 5 missing functions 5 O overview Application Access Manager 3 S session timeout 4 setting session timeout 4 T troubleshooting missing authentic