WorkCentre 7220-7225 Information Assurance Disclosure PaperVer. 1.0, January 2013 Page 47 of 614.4. User Permissions Role Based Access Control(RBAC)The User Permissions feature has been added to Xerox devices to expand control of access to device services andfeatures which will in turn improve security, enable cost control for media and consumables, and will eliminateunauthorized pages.User Permissions does as the name suggests and provides permissions based on the authentication of the user eitherthrough the Local UI or network authentication. Commonly referred to as Role Based Access Control it assigns eachuser the permissions to use the MFP based on a default role, a customized role or a Non-Logged-In User role.The System Administrator can set up 192 Custom Roles to restrict use of color printing, duplex or 2-sided printing,Secure Print, access to certain paper trays, applications that may be used to print, and even times of day that adevice may be used. In addition, users can be assigned multiple roles.Through the Web UI on the Xerox device, the SA may perform the following functions:• Configure Job Types which will be allowed such as SecurePrint, Normal Print, Sample Set, Delayed Print, Saved Job,and All Others• Restrict Access to specific Paper Trays• Restrict Printing times (When Users Can Print)• Allow or Restrict 1 Sided Printing• Allow or Restrict Applications from printing to the device. Many applications are shown by default such as Officeapplications and Browsers. In order to add a new custom application, use your application to send a print job viathe Xerox print driver; your application's ID will be added to the Custom Application ID list.Then, Reload the page after sending a print job from the application.Once configured by the Admin user, and the user has authenticated via network directory services or locally on thedevice, permissions are granted to features and applications as defined in the Role or Roles assigned to the user.Detailed procedures for the configuration of Roles can be found in the Systems Administrators Guide in the sectionentitled User Permissions.