IMPORTANT
|
To use Active Directory Authentication, you must match the current time on the server in which Active Directory is running with the machine (and the computer to log in with).
When using Server Authentication, make sure you register a Server Authentication administrator. If you do not register a Server Authentication administrator, some settings and management functions may not be available, depending on the application. The registration method differs depending on your system environment.
The user that belongs to the "Canon Peripheral Admins" group on Active Directory is the administrator for Server Authentication by default. (You can also set other groups to the administrator.) Follow the instructions in the manual for Active Directory to create the "Canon Peripheral Admins" group, and then register a Server Authentication administrator.
If the default password is being used, the screen for changing the password is automatically displayed for security purposes. Change the password. (See "Registering/Editing User Data for Local Device Authentication.")
|
IMPORTANT
|
This version of SSO-H is compatible with both 128-bit AES (Advanced Encryption Standard) and DES (Data Encryption Standard) as the Kerberos encryption type to be used when performing Domain Authentication. The encryption type automatically switches according to the Active Directory settings. AES is used in an environment that supports both encryption types.
If you use Windows Server 2003 SP2/R2 SP2 for the Active Directory, only the IPv4 communication protocol is supported (IPv6 cannot be used).
|
Port Number
|
Application
|
53
|
Communication with the DNS server
|
88
|
Domain Authentication with the KDC (Key Distribution Center)
|
389
|
LDAP communications with the directory service (Default is 389, but it can be changed to a user-defined port in the LDAP service properties.)
|
Operating System
|
Web Browser
|
Java Runtime Environment
|
Windows XP Professional SP3
|
Internet Explorer 7
Internet Explorer 8
|
Java Runtime Environment 1.5 or later*
|
Windows Vista SP2
|
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
|
|
Windows 7 SP1
|
Internet Explorer 8
Internet Explorer 9
|
|
Windows Server 2003 SP2
Windows Server 2003 R2 SP2
|
Internet Explorer 7
Internet Explorer 8
|
|
Windows Server 2008 SP2
|
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
|
|
Windows Server 2008 R2 SP1
|
Internet Explorer 8
Internet Explorer 9
|
|
Mac OS X v 10.5
|
Safari 4.0.5
Safari 5.0.5
|
Java 2 Platform Standard Edition 5.0
|
Mac OS X v 10.6
|
Safari 4.0.5
Safari 5.0.5
Safari 5.1
|
|
Mac OS X Lion
|
Safari 5.1
|
Operating System
|
Web Browser
|
Java Runtime Environment
|
Windows XP Professional SP3
|
Internet Explorer 7
Internet Explorer 8
|
Java Runtime Environment 1.5 or later*
|
Windows Vista SP2
|
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
|
|
Windows 7 SP1
|
Internet Explorer 8
Internet Explorer 9
|
|
Windows Server 2003 SP2
Windows Server 2003 R2 SP2 |
Internet Explorer 7
Internet Explorer 8
|
|
Windows Server 2008 SP2
|
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
|
|
Windows Server 2008 R2 SP1
|
Internet Explorer 8
Internet Explorer 9
|
IMPORTANT
|
For information on obtaining the Java Runtime Environment or Java 2 Platform Standard Edition, see the Oracle Web site.
You must use the user logon name (pre-Windows 2000) registered in Active Directory in order to enter a user name for Domain Authentication. You can use only alphanumeric characters for Domain Authentication.
You cannot use symbols (\ / : * ? l <> [ ] ; , = + . "), or spaces. You can log in only if you use valid characters.
User names and passwords are registered in a database in the machine.
When using the Local Device Authentication system, you can use only alphanumeric characters for the user name.
|
NOTE
|
Port number is a default value. If you change the settings, the port number is different. (See "Before Logging In to SSO-H.")
|