WorkCentre 7220-7225 Information Assurance Disclosure PaperVer. 1.0, January 2013 Page 28 of 613.System Access3.1. Authentication ModelThe authentication model allows for both local and network authentication and authorization. In the local andnetwork cases, authentication and authorization take place as separate processes: a user must be authenticatedbefore being authorized to use the services of the device.If the device is set for local authentication, user account information will be kept in a local accounts database (seethe discussion in Chapter 4 of Xerox Standard Accounting) and the authentication process will take place locally. Thesystem administrator can assign authorization privileges on a per user basis. User access to services will be providedbased on the privileges set for each user in the local accounts database. .When the device is set for network authentication, the user’s network credentials will be used to authenticate the userat the network domain controller.Users can be authorized on an individual basis to access one or any combination of the available services such as:Copy, Fax, Server Fax, Reprint Saved Jobs, Email, Internet Fax, Workflow Scanning Server, Extensible InterfacePlatform Services.Also users can be authorized to access one or any combination of the following machine pathways: Services, JobStatus, or Machine Status.User Permissions, the new authorization method determines your authorization be Role. Roles are stored in the localaccount database and users are either directly assigned to the roles in the database, or the role is associated with anLDAP/SMB group. Once the device determines what group the user is a member of, it determines what roles in thelocal database are associated with that group and define access based on the roles. Assignment of users to theSystem Administrator role or the Accounting Administrator is also managed via User Permissions.Figure 3-1 provides a schematic view of the authentication and authorization subsystem. Use of the local accountsdatabase or the network can be set independently for both authentication and authorization, meaning that it ispossible to enable network authentication and local authorization, or vice versa. Usually the device will be set forboth authentication and authorization to take place against the same database, either local or network.