Owner's Manual
Security
Xerox ColorQube™ 9201/9202/9203
System Administrator Guide
143
User Data Encryption
User Data Encryption ensures all data or job-sensitive data on the device’s hard drive is protected.
User Data Encryption is automatically enabled on the device and no further configuration is required
by the administrator.
When enabled, the data on the hard drive will not be meaningful when the hard drive has been
separated from the device it was originally installed on.
If the hard disk is removed from the network controller then the encrypted data remains protected
because the encryption key is not stored on the network controller hard drive.
To Disable User Data Encryption
1. At your Workstation, open the web browser and enter the IP address of the device in the Address
bar, and press [Enter].
2. Click on the [Properties] tab.
3. If prompted, enter the Administrator User ID and Password. The default is [admin] and [1111].
4. Click on the [Login] button.
5. Click on the [Security] link.
6. Select [User Data Encryption] in the directory tree.
7. In the User Data Encryption Enablement area, select [Disabled].
8. Click on the [Apply] button.
Note: Changing the User Data Encryption setting will reboot the Network Controller. This may
result in a loss of user data and will interrupt or delete current jobs on the device.
User Information Database
User Information Database is a local database that contains user data for access by Authentication
and basic Authorization.
The User Information Database allows you to add new users to the database. User information can be
edited and deleted form the database.
Password Settings allow you to change password rules.
Note: If the Password rules are changed, old passwords are NOT AFFECTED by the new rules.
If users are created locally on the device using the User Information Database, those users will
be authenticated only if the Authentication Configuration method is set to “Locally on the
Device”. If the authentication method is switched to “Remotely on the Network”, those users will
not be authenticated unless their credentials are also accessible remotely. For further information
on Authentication Configuration, refer to Authentication on page 121.










