HP Digitial Sending Software 5.0 Digital System Administrator Guide C03806318
User Manual: HP HP Digital Sending Software 5.0 - System Administrator Guide
Open the PDF directly: View PDF
.
Page Count: 122
| Download | |
| Open PDF In Browser | View PDF |
HP DIGITAL SENDING SOFTWARE 5.0 System Administrator Guide HP Digital Sending Software 5.01 System Administrator Guide Copyright Trademarks © 2013 Copyright Hewlett-Packard Development Company, L.P. Microsoft®, Windows®, Windows NT®, Windows® XP, Windows Vista® are U.S. registered trademarks of Microsoft Corporation. Reproduction, adaptation or translation without prior written permission is prohibited, except as allowed under the copyright laws. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Edition 3, 5/2013 Pentium® is a trademark of Intel Corporation in the U.S. and other countries. UNIX® is a registered trademark of The Open Group. Table of contents 1 Introduction to Digital Sending .......................................................................................................................... 1 Digital sending overview ....................................................................................................................... 2 Introduction to DSS .............................................................................................................................. 3 Advantages of DSS ............................................................................................................. 3 Features overview ............................................................................................................... 3 Supported devices ............................................................................................................... 5 Embedded Digital Sending vs DSS ...................................................................................................... 6 Differences ........................................................................................................................... 6 DSS vs Web Jetadmin ......................................................................................................................... 9 2 Theory of operations ....................................................................................................................................... 11 Components ....................................................................................................................................... 12 Configuration Utility ............................................................................................................ 12 Remote Configuration Utility ............................................................................. 13 DSS Service ...................................................................................................................... 13 DSS-enabled device .......................................................................................................... 14 I.R.I.S. OCR engine ........................................................................................................... 14 Database ........................................................................................................................... 15 Local Data Store ................................................................................................................ 16 Third-party tools ................................................................................................................. 16 Understand DSS data structures ........................................................................................................ 17 Understand licensing .......................................................................................................................... 17 Licensing requirements ...................................................................................................... 18 Trial license ........................................................................................................................ 18 Auto-generate licenses ...................................................................................................... 18 License activation and rehosting ....................................................................................... 18 Understanding DSS Address Books .................................................................................................. 19 Address Book Manager ..................................................................................................... 19 DSS Address Books .......................................................................................................... 19 Public Address Book ......................................................................................... 19 Private Address Books ...................................................................................... 19 Personal Address Books ................................................................................... 19 ENWW iii Replicated LDAP Address Book ....................................................................... 20 Accessing the Address Books from the device control panel ........................... 20 3 Installation and configuration .......................................................................................................................... 23 Planning the DSS deployment ........................................................................................................... 24 System and environment requirements ............................................................................. 24 Software requirements ...................................................................................... 24 Temporary jobs folder ....................................................................................... 25 Changing the location of the Jobs Folder ......................................... 25 Hardware requirements ..................................................................................... 26 Device firmware requirements .......................................................................... 28 Multiple DSS servers ......................................................................................... 29 Port requirements .............................................................................................. 30 Ports used ........................................................................................ 30 DSS Address Book access for FutureSmart devices ....................... 31 Summary .......................................................................................... 32 System security requirements for using DSS .................................................................... 32 Security to start the Configuration Utility ........................................................... 32 Permissions needed to run DSS with full functionality ...................................... 32 Device credentials for FutureSmart devices ..................................................... 33 FutureSmart device accounts and credentials ................................. 33 DSS configuration and use of FutureSmart device credentials ........ 34 Installation .......................................................................................................................................... 37 Pre-installation checklist .................................................................................................... 37 Installer screens and options ............................................................................................. 37 Configuration ...................................................................................................................................... 45 Configuration Utility ............................................................................................................ 45 Licensing ............................................................................................................................ 46 Add licenses ...................................................................................................... 46 Remove licenses ............................................................................................... 47 Auto-generated licenses ................................................................................... 48 Backup and Restore .......................................................................................................... 49 Backup .............................................................................................................. 49 Restore .............................................................................................................. 50 Device management .......................................................................................................... 50 Add and remove devices ................................................................................... 52 Device configuration .......................................................................................... 54 Understanding the Device List icons ................................................................. 55 Device grouping ................................................................................................ 56 Authentication .................................................................................................................... 57 Configure DSS .................................................................................................. 57 iv ENWW Authentication methods .................................................................... 57 Configure the Device ......................................................................................... 63 General Device configuration ............................................................................................ 63 General subtab .................................................................................................. 64 Addressing subtab ............................................................................................ 65 Log subtab ........................................................................................................ 66 Preferences subtab ........................................................................................... 66 Send to Folder ................................................................................................................... 67 Configure DSS .................................................................................................. 67 Configure the Device ......................................................................................... 71 Send to E‑mail ................................................................................................................... 71 Configuration overview ...................................................................................... 71 Configure DSS .................................................................................................. 71 Configure the Device ......................................................................................... 74 Send to Fax ....................................................................................................................... 74 Configuration overview ...................................................................................... 74 Analog fax ......................................................................................... 75 Digital fax .......................................................................................... 75 Configure DSS .................................................................................................. 75 Internet fax ........................................................................................ 75 LAN fax ............................................................................................. 77 Configure the Device ......................................................................................... 78 Send to Workflows ............................................................................................................. 78 Configuration overview ...................................................................................... 78 Workflow organizational structures ................................................... 79 Configure DSS .................................................................................................. 79 Configure the menu structure (groups, menus, and forms) .............. 80 Configure the Device ......................................................................................... 89 Addressing ......................................................................................................................... 90 Address Book Manager ..................................................................................... 90 Importing addresses using the Address Book Manager ................... 91 Configuring address books on the Addressing tab ........................... 91 Personal address books .................................................................................... 95 Exchange contacts ............................................................................................ 95 Guest address book .......................................................................................... 96 Public address book .......................................................................................... 96 LDAP replication ............................................................................................... 96 LDAP filters ....................................................................................................... 96 Configure DSS for Windows Active Directory Services .................................... 97 Configure Authentication .................................................................. 97 Configure Addressing ....................................................................... 98 ENWW v DSS templates ................................................................................................................... 99 Create a template ............................................................................................ 100 Use the Template Configuration tab to manage templates ............................. 101 Template groups ............................................................................. 102 Template list ................................................................................... 104 Apply a template ............................................................................................. 105 External Database Configuration ..................................................................................... 106 4 Support and troubleshooting ......................................................................................................................... 107 Obtaining support ............................................................................................................................. 108 HP Customer Care service and support .......................................................................... 108 Finding documentation and other supporting information ................................................ 108 Using Internet support ..................................................................................................... 108 DSS error messages ........................................................................................................................ 109 Index ................................................................................................................................................................. 111 vi ENWW 1 Introduction to Digital Sending This chapter contains the following topics: ENWW ● Digital sending overview ● Introduction to DSS ● Embedded Digital Sending vs DSS ● DSS vs Web Jetadmin 1 Digital sending overview HP Digital Sending technology offers a fast, simple, and reliable way to capture valuable information from paper-based documents and convert it to a digital format, which can be further processed and routed to a number of different destinations. Routing destinations include, but are not limited to, the following: ● Network folders ● E‑mail ● FTP sites ● Fax ● Microsoft SharePoint® The digital file types available include, but are not limited to, the following: ● JPEG ● TIFF ● PDF ● Searchable PDF/A Optical Character Recognition and Compression are also available offering a wide range of digital file types of varying sizes and quality that the user can select to meet their needs. Additional data, or metadata, can also be specified and routed along with the scanned images as a method for enabling more complex workflows. Digital Sending is available from most HP Multifunction devices, the Digital Sender line of products, and some HP Enterprise Scanners. These products offer a wide range of digital sending capability "out of box" via the product firmware. This out of box functionality is referred to as embedded digital sending. The functions available via embedded digital sending varies by product. See Table 1-1 Feature comparison on page 6 for more information. The digital sending functionality which is provided in the device firmware can be extended with the server based HP Digital Sending Software (DSS). Some features DSS adds to embedded digital sending are shared address books, secure e‑mail, a single point for e‑mail routing, and Optical Character Recognition (OCR). 2 Chapter 1 Introduction to Digital Sending ENWW Introduction to DSS This section contains the following topics: ● Advantages of DSS ● Features overview ● Supported devices Advantages of DSS The HP Digital Sending Software (DSS) extends the embedded Digital Sending functionality of supported devices by adding the following capabilities: ● Routing e‑mail through a central point (the DSS server), which simplifies SMTP security management in environments with Access Control List security. ● Multiple SMTP gateways for redundancy in delivering e‑mail jobs. ● Encrypted e‑mail channel with SMTP over SSL. ● Sending fax through LAN Fax and Internet Fax servers. ● Public- and Personal Address Books. ● Access to Microsoft® Exchange Contacts from the front panel of the device with the Exchange Contacts feature. ● The LDAP Replication feature allows access to the company directory while off-loading the LDAP servers. ● The Workflow feature allows easy and consistent scanning into company workflow processes. Metadata can be collected for each job from users using configurable prompts or from internal device system information, allowing integration with third-party applications. ● OCR processing of jobs through the I.R.I.S OCR engine to create searchable output. ● Easy and intuitive interface to manage Digital Sending features through the Configuration Utility. ● Central logging of document sending activity for tracking, auditing, and troubleshooting purposes. DSS runs as a software service on a networked server. Supported devices are "DSS aware," which means they have components built into the firmware that allow them to make use of the services/ features offered by DSS. Once a device is added into DSS, all of the Digital Sending features are managed through the Configuration Utility. Features overview This section gives a basic overview of the various features of the DSS. ● E‑mail ◦ ENWW Route e‑mail jobs from multiple devices through a single point. DSS makes it possible to route e‑mail jobs either through DSS or directly from the device to the SMTP gateway. Introduction to DSS 3 Routing e‑mail through the DSS server simplifies SMTP security management in environments with Access Control List security on the SMTP gateways. ● ● ● ◦ SMTP gateway redundancy. Multiple SMTP gateways for redundancy in delivering e‑mail jobs. ◦ Encrypted e‑mail channel. DSS can provide a secure e‑mail channel using SMTP over SSL. Fax ◦ Manage analog fax settings. The DSS Configuration Utility provides an intuitive interface for managing fax settings on devices that have an analog fax accessory installed. ◦ Electronic faxing. Integrates with LAN Fax servers via a shared folder interface and integrates with Internet Fax servers via an e-mail interface. Address Books. Devices attached to DSS have access to the DSS address books, which provide the following functionality: ◦ Public Address Book. Allows the administrator to create an address book which is accessible from all attached devices. ◦ Personal Address Book. Each user can create, use and manage a personal address book from any attached device. ◦ Exchange Contacts. Each user can access their Microsoft Exchange® Contacts from the front panel of any attached device. ◦ LDAP Replication. DSS can be configured to replicate addresses from an LDAP server at a regular interval so devices can obtain addresses from the DSS server rather than by querying the LDAP server in real time. This feature allows access to the company directory while off-loading the LDAP servers. ◦ Address Book Management. Allows the administrator to manage all DSS address books. Workflow ◦ ● Optical Character Recognition (OCR) ◦ ● Easy and intuitive interface to manage Digital Sending features through the Configuration Utility. Logging ◦ 4 Searchable documents. OCR can process jobs through the I.R.I.S OCR engine to create searchable output in file formats such as PDF, PDF/A, XPS, HTML, RTF, etc. Digital Sending management ◦ ● Integration with third-party applications. The Workflow feature allows easy and consistent scanning into company workflow processes, through a shared folder, Microsoft Sharepoint, or an FTP site. Metadata can be collected either directly from the system or by prompting users for input. The metadata is stored in a file that will be sent to the destinations along with the scanned image file. Central logging of document sending activity for tracking, auditing and troubleshooting purposes. Chapter 1 Introduction to Digital Sending ENWW Supported devices DSS supports most recent high-end HP multifunction devices, Digital Senders, and some ScanJet products. This document refers to these devices as DSS-enabled devices. For a list of all compatible products currently available, see Table 3-4 Device firmware requirements on page 28. For an up to date list of supported devices, go to www.hp.com/support/dss. ENWW Introduction to DSS 5 Embedded Digital Sending vs DSS There are two ways to implement Digital Sending: 1. Embedded Digital Sending. Embedded Digital Sending indicates device-specific Digital Sending capabilities. These Digital Sending capabilities are embedded in the firmware of the DSS enabled device. Embedded Digital Sending includes capabilities such as e‑mail and fax. 2. Digital Sending Software (DSS). DSS is a software service running on a network that expands the existing embedded capabilities of DSS enabled devices. DSS includes capabilities such as Send to E‑mail (encrypted e‑mail), Send to Fax, Send to Workflow, and Send to Network Folder. Differences The following product groups are represented in the Features Comparison table below. ● Pre-FutureSmart ● FutureSmart Table 1-1 Feature comparison Area Feature Authentication LDAP Pre-FutureSmart FutureSmart LDAP over SSL Microsoft Windows Send to E‑mail Folder Printer 6 LAN Fax DSS Internet Fax DSS Analog Fax E DSS Chapter 1 Introduction to Digital Sending E** ** DSS ENWW Table 1-1 Feature comparison (continued) Area Feature Addressing Direct LDAP Other Pre-FutureSmart FutureSmart Replicated LDAP DSS DSS Public Address Book DSS DSS Personal Address Books DSS Exchange Contacts DSS Local Address Book E E Optical Character Recognition (OCR) DSS DSS*** Workflow DSS DSS Configurable metadata DSS DSS FileNet integration DSS DSS Single point for e‑mail routing DSS DSS SMTP gateway redundancy DSS DSS SMTP over SSL DSS Quick Sets NA Compact PDF DSS Signed e‑mail E Encrypted e‑mail (message) E Metadata support Legend ● ● ● ENWW DSS — Requires DSS — Available both embedded and when managed by DSS E — Available only in embedded Digital Sending Embedded Digital Sending vs DSS 7 8 ● ** — Not available on the HP ScanJet Enterprise 7000n Document Capture Workstation. ● *** — Enterprise ScanJet products and MFP workflow products have this feature available both embedded in the product firmware and when managed by DSS. Chapter 1 Introduction to Digital Sending ENWW DSS vs Web Jetadmin HP Digital Sending Software and HP Web Jetadmin are two different software products available from HP with very different value propositions. However, while the products are different there is still some overlap in functionality. The purpose of this section is to provide a basic understanding of the differences between DSS and HP Web Jetadmin. HP Web Jetadmin is a fleet management tool designed to manage printers, including DSS-enabled, multifunction devices, on a network. Features include device configuration, firmware installation, remote diagnostics, alerting, and reporting. For instance, system administrators can use this tool to get alerts for specific error conditions, update firmware on the entire fleet of devices, and create usage reports. HP Digital Sending Software extends the embedded Digital Sending features of supported devices with features such as LAN Fax, OCR, Workflows, and Personal Address Books. DSS and Web Jetadmin functionality overlap in that both can be used to configure digital sending settings on DSS enabled devices. When a device is connected to DSS its digital sending settings can only be managed by DSS. Web Jetadmin can still be used to manage all other settings on the device. For more information on the values and capabilities of DSS, please refer to other sections of this document. ENWW DSS vs Web Jetadmin 9 10 Chapter 1 Introduction to Digital Sending ENWW 2 Theory of operations This chapter contains the following topics: ENWW ● Components ● Understand DSS data structures ● Understand licensing ● Understanding DSS Address Books 11 Components Figure 2-1 DSS Components DSS can be viewed as a system that consists of a number of components, where each component provides a specific set of features that allows the system to function as a whole. The above diagram shows the DSS components and how they are connected. The following covers each of these in detail. Configuration Utility The role of the Configuration Utility is to act as a management console for DSS. It provides a user friendly interface to manage all settings for DSS functions as well as devices. The Configuration Utility is always installed with DSS, but can also be installed separately on a different computer on the network. When installed separately it is typically referred to as the "Remote Configuration Utility", since in this mode it is used to manage a remote DSS server. The address of the server to be managed is entered in the startup dialog. 12 Chapter 2 Theory of operations ENWW Figure 2-2 Configuration Utility Remote Configuration Utility The Remote Configuration Utility is a version of the Configuration Utility that is designed to install and operate on a remote computer. Using the Remote Configuration Utility allows DSS configuration across the network. 1. Launch the Configuration Utility. 2. Click Another Computer. Figure 2-3 Remote Configuration Utility 3. Type in the network name of the DSS server. 4. Click OK. DSS Service The core component of the HP Digital Sending Software system of the HP Digital Sending Software is the service named "HP Digital Sending Software", typically called the "DSS service". This is the key component of the software that ties together all other components and enables the DSS system to function. The DSS service is implemented as a Windows System Service. ENWW Components 13 Internally, the DSS service is divided into several subcomponents and has dependencies. The below figure shows this at a high level: Figure 2-4 DSS Service Architecture DSS-enabled device DSS-enabled devices are the HP MFPs, Digital Senders, or ScanJet products that support DSS. These devices allow end-users to make use of DSS functionality by scanning to the various destination types, using the address book etc. For a complete list of supported devices, see Supported devices on page 5. The firmware in these devices has a component built-in which enables use of DSS functionality. In Pre-FutureSmart products this is enabled through DSMP (Digital Sending Management Protocol). In HP's FutureSmart products this component has been replaced by a WS-* (Web Services Star) based interface. Since all DSS features must be supported by the device firmware, DSS 5.0 has a minimum firmware version requirement, which can be found here Table 3-4 Device firmware requirements on page 28. Over time, as new features become available in DSS, it might be necessary to update the device firmware for compatibility. These changes will be documented in detail in the DSS release notes. I.R.I.S. OCR engine DSS uses I.R.I.S. OCR engine version 12 to provide Optical Character Recognition (OCR) and High Compression PDF functionality. The engine features Intelligent High Quality Compression (iHQC) technology™. The engine features Intelligent High Quality Compression (iHQC) technology™, and the ability to create searchable PDF/A documents. 14 Chapter 2 Theory of operations ENWW Figure 2-5 OCR engine The figure above shows the process flow for OCR processing in DSS. When DSS receives a job that requires OCR processing, it invokes the I.R.I.S. OCR engine using COM (Component Object Model). The image data/document is transferred together with control parameters, such as the required output file type. Once OCR processing is completed, the searchable document is passed back to DSS which delivers the document to the destination. DSS is a multi-threaded application and will launch multiple instances of the OCR engine when there are multiple jobs in the queue that require OCR processing. We refer to this as ‘parallel processing of OCR jobs’. This makes the OCR feature scalable, which means that average job processing times will be improved if the server's resources are improved. For instance, adding additional CPUs and more memory to the server will improve the average processing time of each OCR job when the server is processing multiple jobs simultaneously. This is a significant improvement over previous versions of DSS, where OCR processing was serial. Database DSS uses Microsoft SQL Server 2008 SP3 Express Edition to host the DSS database. The database is used to hold job logs, address books, event logs, and some configuration data. Microsoft SQL Server 2008 is a database management system (DBMS). Within the DBMS, DSS creates two databases for specific use by DSS, named as follows: ● DSS_Customer ● DSS_Machine The SQL Server 2008 database instance name is “HPDSS2008.” It is possible to configure DSS to use a DBMS other than Microsoft SQL Server 2008 SP3 Express Edition. If a different DBMS is specified during installation, DSS will not install SQL server on the local server. Even if the local database that DSS installs is used at first, the system can be configured later to use a different DBMS, but some data will be lost during the switch. ENWW Components 15 Local Data Store The Local Data Store is the series of files located in the DSS installation directory, which is used to store the DSS configuration data, device information, and debug logs. This is also where the job queue resides. Table 2-1 Local Data Store – Technical Detail Technical detail Default installation folder: C:\Program Files (x86)\Hewlett-Packard\HP Digital Sending Software 5.0 Default temporary jobs folder:\CustomerData\DSS\Jobs Configuration folder: \Product\DSS\Configuration NOTE: The temporary jobs folder can be configured to reside somewhere other than the default location. For information on changing the location of the temporary jobs folder, see Changing the location of the Jobs Folder on page 25. Third-party tools As the name indicates, third party tools are not a part of the DSS system. However, they are mentioned here because third party tools are required to deliver some of the DSS functionality as listed here: 16 ● LAN Fax. This feature requires a compatible LAN Fax product. DSS enables the functionality by providing a Fax interface at the Digital Sending-device and then passing the fax job along with an HPF file (metadata) to a watched folder. ● Internet Fax. This feature requires an Internet Fax server. DSS enables the functionality by providing a Fax interface at the Digital Sending-device and then sending out an e‑mail with the fax job attached. ● Workflow. One of the main ideas behind the Workflow feature is the ability to capture metadata at the Digital Sending-device and pass it on to a folder that is watched by a third party application. This application is then able to read the metadata and further process and route the job. ● Personal Address Book. This feature requires a Microsoft Exchange Server that supports HTTP connections. Chapter 2 Theory of operations ENWW Understand DSS data structures The following describes the different types of data that makes up the DSS system and where they are stored. Table 2-2 DSS data Component Location Description Job logs Database Job logs for all devices are stored in the DSS database. Error logs Database and Windows Event Log The error logs show system events for information, warning and error conditions such as service stop and security audit. Debug logs [Install Path]\FileSystems\MachineData \Logs DSS maintains a set of debug log files. These files are designed to help HP support debug issues with the DSS service, such as crashes, hangs etc. DSS configuration settings [Install Path]\FileSystems\Product\DSS \Configuration Configuration data used by DSS is stored in a series of files found in the Configuration folder. This data includes things like SMTP gateway settings, LDAP addressing settings, Workflow settings etc. Managed device Information DSS maintains a list of all the devices it manages in a binary configuration file. This file also contains some basic information about the device, such as the hostname, device model etc. Device configuration settings Stored on the device All the device-specific configuration data is stored on the device itself. When required DSS will read back the data from the device, manipulate it and send it back. Configuration Utility UI ‘convenience’ data Windows Registry For usability the DSS Configuration Utility will remember entries made into selected list boxes, as well as the state of the Configuration Utility window when closed. Job data temporary storage \FileSystems \CustomerData\DSS Location for the temporary storage of job data. This location can be configured to a location other than the default location. See Temporary jobs folder on page 25. Understand licensing This section contains the following topics: ENWW ● Licensing requirements ● Trial license ● Auto-generate licenses Understand DSS data structures 17 ● License activation and rehosting Licensing requirements DSS server software does not require a license to operate. A license seat is required for each device which is managed by DSS. Licenses can come in bundles of 1, 5, 10, 50, and 250 seats. Licenses can be combined in a DSS server in any combination up to 1000 seats. Trial license When DSS is first installed on a new server it comes with a sixty day, fifty seat trial license. If a purchased license is installed in DSS during the trial period, the trial license becomes invalid and only purchased licenses will work on that instance of DSS. When the trial period ends, if no purchased licenses have been added to DSS, the software is unable to manage or process any jobs from devices. Auto-generate licenses The HP 9200C Digital Sender and HP 9250C Digital Sender devices auto-generate licenses after being added to a DSS server. These are the only two DSS-enabled devices that auto-generate licenses. License activation and rehosting Purchase DSS licenses from HP or HP authorized resellers. Once purchased, the customer will receive documentation which includes the Entitlement Order Number (EON). Activate the DSS license in order to use it by locking the license to a server. DSS licenses are locked to servers by the server MAC address. The output from locking a license is a license key code which users type into the DSS user interface to enable DSS to use the license. The EON and the server MAC address are required to activate a license. From time to time it may be necessary for a customer to use a license on a server to which it is not currently locked. The process of changing the server to which a license is locked is called “rehosting.” Conduct DSS license activation and rehosting via the licensing website: www.hp.com/software/ licensing. For more details on the license activation and rehosting sequence of steps, see the white paper “DSS License Activation and Rehosting”. Access the white paper on the DSS support web site www.hp.com/support/dss5. Once at the website home page, click the “Documentation” link on the left hand side to find this white paper. 18 Chapter 2 Theory of operations ENWW Understanding DSS Address Books DSS can maintain several different address books to make available to the devices maintained by DSS. This section will explain the different types of address books and when the addresses from each are available to users at a device control panel. Address Book Manager The Address Book Manager, or ABM, is a feature within DSS that allows for the management of several of the DSS address books. It is started from the Addressing tab of the Configuration Utility. DSS Address Books Public Address Book Entries ● When a device is added to DSS, the device’s local address book entries are added. ● Entries can be made via the Address Book Manager Modify/Delete ● The Public address book can only be modified via the ABM Private Address Books Private address books are kept for specific users depending on the user’s signed-in status at the device. The “Private MFP Guest” address book is for user’s that are not signed-in, while “Private MFP User” address books are kept for each user that is signed-in. Entries ● When user’s at the device control panel type in new addresses and choose to save them, they are saved in the appropriate Private address book depending on their sign-in status. ● Entries can be made via the Address Book Manager Modify/Delete ● Entries can be made to Private address books via the ABM Personal Address Books Personal Address Books hold a signed-in user’s MicroSoft Outlook contacts. These are temporary address books only available while the signed-in user is accessing addresses, and then only when the system has been configured to collect the Outlook contacts. Entries ● From the Outlook contacts of a signed in user. Modify/Delete ● ENWW Personal address books are temporary and only maintained while a signed-in user is using the address book at the device control panel. Understanding DSS Address Books 19 Replicated LDAP Address Book DSS is capable of replicating address information from an LDAP server into the DSS database. This allows users to access these addresses via the DSS server instead of directly from the LDAP server at job creation time, offloading some load from the LDAP server to DSS. A replication schedule can be configured to collect addresses at regular intervals to keep the replicated data synchronized with the LDAP server data. Entries ● Only via the replication mechanism that can be configured and run from the Addressing tab in the Configuration Utility. Modify/Delete ● The LDAP addresses can be cleared from the DSS database using the Clear LDAP Cache button on the Addressing tab of the Configuration Utility. Accessing the Address Books from the device control panel Addresses become available to a user at the device control panel when they click the address book icon while creating e-mail or fax jobs. Which DSS address book are available to a user at the device control panel depend on the user’s signed-in status, the device type (FutureSmart versus preFutureSmart), and the address book view selection made by the user. When using address books from the device, the user has the option of selecting an address book view. An example of the selections is shown below: Figure 2-6 Address book view example The tables below show which DSS address books are available based on View, sign-in status, and device type. Table 2-3 Accessing Address Books form a FutureSmart MFP 20 View Non Signed-In user Signed-in User All View Public + LDAP + Private MFP Guest Public + LDAP + Private MFP User + Personal (when configured) + Private MFP Guest Chapter 2 Theory of operations ENWW Table 2-3 Accessing Address Books form a FutureSmart MFP (continued) View Non Signed-In user Signed-in User Local View Private MFP Guest Private MFP Guest Personal View Private MFP User + Personal MFP User Table 2-4 Accessing Address Books from a pre-FutureSmart MFP View Non Signed-In user Signed-in User All View Public + LDAP + Private MFP Guest Public + LDAP + Private MFP User + Personal (when configured) + Private MFP Guest Local View Private MFP Guest Personal View ENWW Private MFP User + Personal MFP User Understanding DSS Address Books 21 22 Chapter 2 Theory of operations ENWW 3 Installation and configuration This chapter contains the following topics: ENWW ● Planning the DSS deployment ● Installation ● Configuration 23 Planning the DSS deployment This section contains the following topics: ● System and environment requirements ● System security requirements for using DSS System and environment requirements This section contains the following topics: ● Software requirements ● Temporary jobs folder ● Hardware requirements ● Device firmware requirements ● Multiple DSS servers ● Port requirements Software requirements The following table shows the server software requirements. Table 3-1 DSS software requirements Area Requirements Operating systems ● Microsoft Windows 7, 32 and 64–bit ● Microsoft Windows Server 2008, including R2, 32 and 64–bit ● Microsoft Windows Server 2012 NOTE: 64-bit operating systems are supported, but DSS runs in 32-bit mode Virtual servers 24 ● VMware ESX 3.5 and later ● Microsoft HyperV Chapter 3 Installation and configuration ENWW Table 3-1 DSS software requirements (continued) Area Requirements External database Compatible databases which can be used if you choose not to install the default DSS database: Miscellaneous ● Microsoft SQL Server 2005 (full or express versions) ● Microsoft SQL Server 2008 (full or express versions) ● Microsoft SQL Server 2012 (full or express versions) .NET Framework 3.5 and 4.0 NOTE: If the .NET Framework 4.0 is not present on the system where DSS is being installed, the installer will install .the .NET Framework 4.0 during the installation process. If the .NET Framework 3.5 is not installed on Windows 7 or Windows Server 2008 systems where DSS is being installed, the installer will install the .NET Framework 3.5 during the installation process. For Windows Server 2012 systems where DSS is being installed, the .NET Framework 3.5 must either be installed before running the DSS installer, or the DSS installer must be able to access the internet to download the .NET Framework 3.5 for installation. Temporary jobs folder DSS 5.0 temporarily stores job files on disk while processing jobs. All job files are deleted after the job has finished processing. By default, this jobs folder for temporary storage is located within the installation folder sub-folders. Some customers might choose to change the location of this jobs folder. In DSS 5.0, this change is made by editing a configuration file. Changing the location of the Jobs Folder The file that controls the location of the temporary jobs folder is: ● \filesystems\core\bin\xp-x86\release\nvram.csv Within the nvram.csv file find the line that reads: ● FE966859-E2D0-48e6-8467-BF6F5A417643,CustomerDataPartition,str,..\..\.. \..\CustomerData\Dss To change the location where temporary job files are stored, replace the part of the line that reads “.. \..\..\..\CustomerData\DSS” with the path of the folder where you want the temporary files to be stored. For example, to store the files on the d: drive in a folder named dsstemp, change the line to the following: ● FE966859-E2D0-48e6-8467-BF6F5A417643,CustomerDataPartition,str,d: \dsstemp. After editing the file and saving the changes, the DSS service must be stopped and restarted for the change to take effect. ENWW Planning the DSS deployment 25 Hardware requirements DSS hardware requirements vary with the load put upon the system. The primary load is due to processing of jobs that come in from devices. It is strongly recommended that DSS run on its own server with no other server applications running. If other applications do run, they will also use system resources, and the resources used for those applications must be added to the consideration for resource usage by DSS when deciding what hardware is needed by the DSS server. The primary factors that affect load are: ● Peak job requests per unit time ● Size of the job being transferred from devices ● Server based operations such as OCR and LAN fax with Notification support Jobs that are not configured to be processed by the DSS OCR engine are created in the devices in their final format and transferred to DSS for routing to their destinations. Jobs that are to use the DSS OCR engine are sent to DSS as 300 dpi color JPEG images. There are many factors that affect the size of jobs that are created in the devices including, but not limited to: ● Number of pages ● File format ● Resolution ● Compression ● File content There are so many factors that affect the load on the DSS server that not all variations can be tested. Below are tables of three different load scenarios and the recommended hardware for each load. But given the variables, it is highly recommended that administrators use tools, such as Microsoft Performance Monitor, to monitor their DSS servers’ critical resources of processor bandwidth, memory usage, free disk space, and network bandwidth for any usage or performance bottlenecks. The load scenarios tested are below. An equal percentage of e-mail, folder and workflow jobs were used during the testing. Table 3-2 Load scenarios Load Scenario Job frequency (peak) Average Job Size % OCR Minimum <4 2.3 MB 10% Medium 8 jobs/min 2.3 MB 10% High 15 jobs/min 2.3 MB 10% Table 3-3 Recommended hardware configurations for load scenario 26 Load scenario Processor Memory Free disk space for Installation Free disk space for temporary job files Network bandwidth Minimum 1 core x2 GHz 2 GB 1 GB 100 MB 100 Mb/s Chapter 3 Installation and configuration ENWW Table 3-3 Recommended hardware configurations for load scenario (continued) ENWW Load scenario Processor Memory Free disk space for Installation Free disk space for temporary job files Network bandwidth Medium 2 core x2 GHz 2 GB 1 GB 100 MB 100 Mb/s High 4 core x2 GHz 2 GB 1 GB 100 MB 100 Mb/s Planning the DSS deployment 27 Device firmware requirements To support DSS features, some devices require a minimum revision of firmware. Over time, as new features become available in DSS, it may be required to update the device firmware for compatibility. These changes will be documented in detail in the DSS release notes. Table 3-4 Device firmware requirements Model number Minimum firmware revision Firmware date Firmware version HP LaserJet 4345MFP 09.220.7 12/8/2010 N/A HP LaserJet 4730MFP 46.300.3 11/24/2010 N/A HP LaserJet 9040MFP 08.210.5 11/27/2010 N/A HP LaserJet 9050MFP 08.210.5 11/27/2010 N/A HP LaserJet 9500MFP 08.210.6 11/29/2010 N/A HP LaserJet M3035MFP 48.171.5 11/29/2010 N/A HP LaserJet CM3530MFP 53.101.5 12/6/2010 N/A HP LaserJet M4345MFP 48.171.5 11/29/2010 N/A HP LaserJet CM4730MFP 50.151.0 12/6/2010 N/A HP LaserJet M5035 48.171.5 11/29/2010 N/A HP LaserJet CM6030MFP 52.121.2 12/6/2010 N/A HP LaserJet CM6040MFP 52.121.2 12/6/2010 N/A HP LaserJet M9040MFP 51.121.2 12/6/2010 N/A HP LaserJet M9050MFP 51.121.2 12/6/2010 N/A HP 9200C 09.220.1 11/13/2010 N/A HP 9250C 48.160.3 11/18/2010 N/A HP Color LaserJet Enterprise CM4540 MFP 2200643_228337 6/23/2012 FutureSmart 2 SP1 HP LaserJet Enterprise M4555 MFP 2200643_228339 6/23/2012 FutureSmart 2 SP1 HP LaserJet Enterprise 500 MFP M525 2200643_228344 6/23/2012 FutureSmart 2 SP1 HP LaserJet Enterprise flow MFP M525 Any Any Any HP LaserJet 500 Enterprise color MFP M575 2200643_228345 6/23/2012 FutureSmart 2 SP1 HP LaserJet Enterprise color flow MFP M575 Any Any Any HP LaserJet 700 Enterprise color MFP M775 Any Any Any HP ScanJet Enterprise 7000n 2200643_228343 6/23/2012 FutureSmart 2 SP1 HP ScanJet Enterprise 8500 2200643_228339 6/23/2012 FutureSmart 2 SP1 pre-FutureSmart devices MFPs Digital senders FutureSmart Devices MFPs Scanjet Enterprise 28 Chapter 3 Installation and configuration ENWW Multiple DSS servers There are several reasons for considering using multiple DSS servers: ● If there are more than 1000 products to be managed, then more than one server is necessary. ● If the load on any one server is too great for its hardware capability. This can happen if many devices are regularly sending very large jobs, if OCR is used frequently, or if network bandwidth is limited. ● For highly distributed systems of devices (depending on the available network infrastructure), multiple, distributed DSS servers help to ensure network reliability and bandwidth between the DSS servers and the products they manage. DSS servers function independently of any other DSS server and do not, by themselves, form any type of clustering for enhanced functionality. This means that DSS servers will not share licenses. Each server must have the appropriate number of license seats to support its attached devices. Separate DSS servers also do not share address books or job logs. DSS servers can be installed into a Microsoft Windows Server 2008 cluster for enhanced failover functionality. For detailed instructions on how to install DSS into an MS Server 2008 clustered environment, please see the white paper on this subject that is available at www.hp.com/support/dss. ENWW Planning the DSS deployment 29 Port requirements DSS 5.0 uses a number of industry standard network protocols and their corresponding TCP and UDP ports in order to facilitate its Digital Sending functionality, such as Send to E‑mail, Send To Folder, Authentication, and LDAP Replication. This section gives an overview of which ports are used in different configurations. In its most basic configuration, DSS 5.0 requires ports 1783, 5213, 7627, and 161 to function. Administrators can refer to the table in this section to determine which ports are required for their specific configuration of DSS 5.0. Ports used DSS uses the TCP/IP protocol to communicate on the network. Which TCP or UDP ports are used depends on which features are enabled in DSS 5.0 and which underlying protocols facilitate these features. Also, note that for each protocol DSS acts as a server or client, or both. The following table provides an overview. Administrators should ensure that the required ports are open at appropriate points in the network, for example, desktop firewall, switches, and routers. Table 3-5 Ports used by DSS 5.0 30 Feature Type Protocol Port Role of DSS Can it be changed? Device communication with preFutureSmart devices Required DSMP (HP Proprietary) 1783 (TCP) Server & client No WS-* (WS-STAR), used for device communication with FutureSmart devices and for communication between DSS and the Configuration Utility Required HTTPS 7627 (TCP) Server & client No DSS Address Book access for FutureSmart devices Required Secure SQL 5213 Server No Device data collection 3 Optional SNMP 161 (UDP) Client No E‑mail notifications, e‑mail via service Optional1 SMTP 25 (TCP) Client Yes Send to Folder (Network UNC path)2 Optional CIFS / SMB 445 (TCP) Client No Send to FTP Optional FTP 21 (TCP) Client No LDAP Replication & Authentication, simple bind Optional LDAP 389 (TCP) Client Yes Chapter 3 Installation and configuration ENWW Table 3-5 Ports used by DSS 5.0 (continued) 1 2 3 Feature Type Protocol Port Role of DSS Can it be changed? LDAP Replication & Authentication, simple over SSL bind Optional LDAP 636 (TCP) Client Yes LDAP Replication & Authentication SPNEGO Optional Kerberos 88 (TCP) Client No LDAP Replication & Authentication, Global Catalog Optional LDAP 3268 (TCP) Client Yes DNS hostname resolution Optional DNS 53 (TCP) Client No WINS hostname resolution Optional NetBIOS/WINS 137,138,139 Client No SMTP and LDAP server discovery – when an MFP sends out a broadcast packet looking for SMTP or LDAP servers DSS will respond with any servers it knows about Optional Broadcast 22986 Server No SMTP and LDAP server discovery – DSS will broadcast this packet when asked to search for LDAP or SMTP servers Optional Broadcast 22986 Client No If a mail gateway is not required, enter a dummy address (0.0.0.0) in the Configuration Utility. Does not apply to local folders, for example. c:\myfolder. SNMP is only required to get and set paper sizes in pre-FutureSmart devices and to get the firmware version from preFutureSmart devices for use in LanFax job logs. We are working to remove these last uses of SNMP in future versions of DSS DSS Address Book access for FutureSmart devices HP’s FutureSmart devices now access the DSS Address Book by connecting directly to the SQL database on port 5213. Therefore, port 5213 must be open between FutureSmart devices and the SQL database server. The database server is the DSS server by default, but can optionally be configured to be a database on a different server. Pre-FutureSmart devices continue to make address book requests of the DSS service, not directly to the SQL database, via port 1783. The DSS service accesses the database and returns address information to the device, also via port 1783. ENWW Planning the DSS deployment 31 Summary In its most basic configuration, DSS 5.0 requires ports 1783, 7627, and 5213 to function. At installation, DSS will register itself with the desktop firewall to ensure connections are allowed on these ports. Administrators can refer to the matrix in this document to determine which ports are required for their specific configuration of DSS 5.0. System security requirements for using DSS Security to start the Configuration Utility The DSS Configuration Utility uses Windows security to determine which users are allowed to start and run the Configuration Utility. When the Configuration Utility is first started, the user is prompted to enter the address of the server on which the DSS service is running that they want to control with this Configuration Utility session. Users are allowed to run the Configuration Utility under any of the following conditions: ● The user is a member of the local or global administrators group on the server running the DSS service ● The user is a member of a group on the server running the DSS service that has been configured to allow Configuration Utility access. By default, DSS is configured to use a group named "DSSAdmins" for this purpose. If you want to use a group by that name you must create it on the system. The name of the group can be configured, or multiple groups configured, to allow DSS access. This configuration is contained in the file “ \FileSystems\Product \DSS\Configuration\HP.Dss.App.Service.Config.xml.” ● If a user attempts to run the Configuration Utility without being a member of the administrators group or the configured group, they will be prompted for the credentials of a user that is a member of one of those groups. When changing the configuration of the group(s) that allow non-administrators to access the Configuration Utility, the DSS service should be stopped, the configuration file edited, and then the DSS service restarted. Permissions needed to run DSS with full functionality Administrators have all the permissions necessary to run DSS. But if the DSS server has Windows User Account Control (UAC) enabled, the administrator might have to use the “Run as Administrator” command to have the necessary permissions. Non-administrators can start the Configuration Utility if they are members of the proper Windows group, but this does not give them the necessary OS permissions to execute the tasks the Configuration Utility performs. In order for proper Configuration Utility operation, the user must have the following OS permissions on both the remote server (if they are running the Configuration Utility from one system to control the DSS service on another server) and the sever which is running the DSS service. ● Read/write access to the following area of the file system: ◦ ● 32 \Hewlett-Packard\HP Digital Sending Software 5.00 Read/write access to the following areas of the registry: Chapter 3 Installation and configuration ENWW ● ◦ HKEY_CURRENT_USER\Software\Hewlett-Packard\HP Digital Sending Software ◦ HKEY_LOCAL_MACHINE\SOFTWARE\Hewlett-Packard\HP Digital Sending Software 5.00 ◦ HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters \SslBindinginfo Users must also have permission to host a service on port 7627. The following command can be used to give this permission to a Windows group. The group should be given permission and non-administrator users should be made members of this group. This command must be run by an administrator on the system. In the example below, “DSS_Server” is the server where DSS is installed and “DSSAdmins” is the name of the group to give permissions. If a group was already created to give non-admins permissions to start the Configuration Utility, then it makes sense to give port 7627 permissions to that same group. ◦ >netsh http add urlacl url=https://+:7627/ user=DSS_Server\DSSAdmins This command can only be used to give permissions to a single group. If permission has been given to one group and you wish to give permissions to a different group instead the following command must be run first: ◦ >netsh http delete urlacl url=https://+:7627/ Device credentials for FutureSmart devices HP Digital Sending Software communicates with FutureSmart devices for many purposes, including adding and removing devices, getting status from devices, configuring devices and processing jobs from devices. When a FutureSmart device has a password set, the device's security model requires that DSS know and use that password to enable device communication. This section describes the various device passwords that can be set. It also describes how DSS uses the credentials it has stored for device communication and how to configure those credentials within DSS. FutureSmart device accounts and credentials HP LaserJet printers have for many years had an Embedded Web Server (EWS) interface. This can be accessed by using a web browser and typing in the IP address of the device. Within the devices is the concept of an Admin User that has access to all of the capabilities available via the EWS. The Admin User also has access to all the applications on the device such as the Copy application, Send to Network Folder application, etc. As a factory default, the Admin User’s password is blank which means that anyone that accesses the EWS has permissions to all the capabilities provided by the EWS. Within the EWS there is a place where the Administrator User’s password can be set. Once the password is set then a user connecting to the EWS must sign in with the password to have Administrator level permissions. If the Administrator password is set, DSS must also know and use that password for any of the communication tasks (add/remove, get status, configure, process job) it wants to accomplish with the device. Starting with the spring 2012 release of FutureSmart firmware, a new factory defined user will be available in the devices. This is the Config User. For devices with this spring 2012 firmware (or newer) DSS can communicate if it has either the Admin User or the Config User’s password. The Config User can not be used by users connecting to the EWS with a web browser; it is only available for use by remote applications such as DSS and HP Web Jetadmin. ENWW Planning the DSS deployment 33 Like the Admin User, the Config User’s password ships as blank as a factory default. The password can be set within the EWS in the same location as the Admin User’s password. These are set on the Security Tab in the General Security section. Unlike the Admin user however, the Config user is inactive if the password blank. This user is only activated when the password is configured within the EWS. See the screenshot below. The Config User has been added so that companies can change the Admin password, if their company security policies require, without changing the Config User password. This means that DSS can be given the Config User’s password, instead of the Admin password, and continue to operate properly when the Admin password is changed. Figure 3-1 DSS General Security screen DSS configuration and use of FutureSmart device credentials DSS stores a single set of device-specific credentials for each device, and is also capable of storing one set of common credentials it can use for communication with FutureSmart devices. See Set the DSS common credentials on page 35 for instructions of how to set these credentials. If DSS tries to use the common credentials with a device and they work, then those common credentials will be copied to the device-specific credentials for that device. See Figure 3-2 DSS common and devicespecific credentials flow on page 35 for the logic of how DSS uses the common credentials and device-specific credentials when adding a FutureSmart device. 34 Chapter 3 Installation and configuration ENWW Figure 3-2 DSS common and device-specific credentials flow Set the DSS common credentials 1. ENWW Click the Device Sign In button in the Configuration Utility. Planning the DSS deployment 35 2. In the Administrator credentials are required dialog, use “admin” or “config” for the Username field, and then enter and verify a password in the Password and Verify Password fields. Figure 3-3 Set the DSS common credentials 3. 36 Click the Apply button to set the common credentials. Chapter 3 Installation and configuration ENWW Installation This section contains the following topics: ● Pre-installation checklist ● Installer screens and options Pre-installation checklist 1. Review the hardware and software requirements for the DSS server. See System and environment requirements on page 24 for more information. 2. Verify that devices planned for connection to DSS have the minimum required firmware. 3. If you are upgrading from a previous version of DSS, make a backup of the existing configuration. Installer screens and options Follow these steps to install the HP Digital Sending Software 5.0. 1. After downloading the software to your computer or network, close all programs that are open on the computer. 2. Navigate to the location on the computer or network where you downloaded the HP Digital Sending Software 5.0 software, and double-click the setup.exe file. NOTE: If the downloaded software is in a compressed format, uncompress the installer files before running the setup.exe file. NOTE: Windows administrator rights are required for installing DSS. However, if User Account Control (UAC) is turned on it may prevent the installation program from completing some tasks successfully, such as installing SQL Server. If UAC is turned on, you might have to right click the DSS installer setup.exe file and select Run as administrator from the menu to install DSS. 3. The Welcome screen appears. Click Next to continue. Figure 3-4 Software Installation – Welcome screen (1 of 11) ENWW Installation 37 4. The License Agreement screen appears. Click Print to print a copy of the license agreement. Click I do not accept the terms in the license agreement, and then click Next to cancel the installation. After reading the license agreement, click to select I accept the terms in the license agreement, and then click Next to continue the installation. Figure 3-5 Software Installation – license agreement (2 of 11) 5. The Destination Folder screen appears. Accept the default installation folder or click the Change button to select a different folder. Select the Full Installation check box or the Configuration Utility Only check box, depending on the type of installation you need. Click the Next button. Figure 3-6 Software Installation – installation location (3 of 11) 38 Chapter 3 Installation and configuration ENWW 6. The Windows Firewall Configuration screen appears. Click to select the Allow DSS Installer to open the required ports in Windows Firewall. check box, and then click Next to continue. Figure 3-7 Software Installation – firewall configuration (4 of 11) 7. The External Database Configuration screen appears. This screen allows for a database other than the default Microsoft SQL Server database installed by DSS to be used with DSS. When this feature is used, the DSS installer does not install the default MS SQL Server database. The DSS installer creates two separate, uniquely-named databases within a single SQL Server instance; one database for customer data and one database for machine data. Figure 3-8 Software Installation – external database configuration (5 of 11) Use the following steps to configure an external database for use with DSS a. ENWW Select the Use external database check box, and then click the Configure connection settings button. Installation 39 Figure 3-9 Software Installation – external database configuration (6 of 11) b. The HP DSS 5.0 External Database Configuration Tool screen appears. Figure 3-10 Software Installation – external database configuration (7 of 11) The following settings are required for configuring an external database: ● 40 Create database using area: Enter values for the User name and Password fields. These credentials are used by DSS to configure databases for DSS use. DSS will not do the initial creation of these databases, but DSS will configure the databases with the structure they need such as tables, keys, etc. These credentials are used only for Chapter 3 Installation and configuration ENWW initial database configuration. Enter the credentials for a SQL-authorized user account, not a Windows-authorized user account. The “Create database using” user must have, as a minimum, the following roles in SQL Server: ● ◦ Server role: public ◦ Database roles for the two DSS databases: db_owner The Access database using area: Enter values for the User name and Password fields. DSS uses these credentials for all database operations, except the database initialization process The “Access database using” user must have, as a minimum, the following roles in SQL Server: ● ◦ Server role: public ◦ Database roles for the two DSS databases: db_datareader, db_datawriter The Connect using area: ◦ ● ENWW Database type: Select one of the three SQL Server versions: ● SQL Server 2005 ● SQL Server 2008 ● SQL Server 2012 ◦ Autoclose: When set to On, the SQL Server instance and its databases are closed and their resources are freed when the last associated DSS instance is closed. The SQL server instance and its databases are opened automatically when a DSS user requires them. When set to Off, the SQL Server instance and its databases remain open even when the last associated DSS instance is closed. ◦ Command timeout: The amount of time DSS waits for a connection to the SQL Server before terminating the connection attempt. ◦ Server name: The name of the server where the DSS SQL server is installed. ◦ DB instance name: The name of the SQL Server instance. ◦ Machine database name: The name to use for the machine data database. This database must exist within the SQL Server instance before DSS can be configured to use it. DSS will fill out the structure of the database but will not do the initial creation. ◦ Customer database name: The name to use for the customer data database. This database must exist within the SQL Server instance before DSS can be configured to use it. DSS will fill out the structure of the database but will not do the initial creation. The Optional parameters area: Use the For machine database and For customer database fields to enter additional connection strings parameters appended to the connection string when connecting to these databases. The syntax of these additional connection string parameters must adhere to the SQL Server connection string format. Installation 41 The Configuration preview field displays the connection strings for the machine and customer databases as the connections strings are being entered. When the HP DSS 5.0 External Database Configuration Tool is opened after the initial configuration, the Configuration preview field displays the saved connection string settings. ● ● ● 8. Click the Test Connection button to test the following configuration settings: ◦ The SQL Server instance exists ◦ The “create database” credentials are valid ◦ The “access database” credentials are valid Click the OK button to test, and then save the following configuration settings: ◦ The SQL Server instance exists ◦ The “create database” credentials are valid ◦ The “access database” credentials are valid Click the Cancel button to close the HP DSS 5.0 External Database Configuration Tool without saving any changes. The Ready to Install the Program screen appears. Click Back to go back to change installation options. Click Install to start the installation. Figure 3-11 Software Installation – ready to install screen (8 of 11) 42 Chapter 3 Installation and configuration ENWW 9. The Microsoft SQL Server 2008 Setup Progress screen displays the installation progress for the SQL server. The DSS install program will install the IRIS OCR engine, an instance of SQL Server (unless an external database is to be used), and then the DSS software itself. If the install program detects that some necessary OS components are missing, such as .NET 3.5, it will also install those components. Figure 3-12 Software Installation – SQL Server setup progress screen (9 of 11) 10. The Installing HP Digital Sending Software 5.0 screen shows the progress of the software installation. Figure 3-13 Software Installation – installation progress screen (10 of 11) ENWW Installation 43 11. When the installation completes, the InstallShield Wizard Completed screen appears. Based on your configuration and the options installed, a reboot of the DSS server might be required. Click the Launch HP Digital Sending Software 5.0 check box to launch the software when the installer closes. Click the Show me the readme file check box if you want to see the product readme file when the installer closes. Click the Show the Windows Installer log check box to view the Windows log file for the installation. Click Finish to complete the installation. Figure 3-14 Software Installation – installation complete screen (11 of 11) 44 Chapter 3 Installation and configuration ENWW Configuration The HP Digital Sending Software (DSS) executes as a Windows service and allows users to scan documents at DSS-enabled devices, and send the scanned images to various types of destinations (such as e‑mail, fax and folder). This software package includes a Configuration Utility that allows you to set up DSS features in a way that works best in your environment. Each DSS feature must be configured before it is available for use on DSS-enabled devices. Most DSS functions require some configuration of settings within the DSS service as well as settings within devices managed by DSS to operate as desired. The Configuration utility is used to configure both service settings and device settings. If you have groups of devices that will share settings, using templates can help with configuration of device settings. This section contains the following topics: ● Configuration Utility ● Licensing ● Backup and Restore ● Device management ● Authentication ● General Device configuration ● Send to Folder ● Send to E‑mail ● Send to Fax ● Send to Workflows ● Addressing ● DSS templates ● External Database Configuration Configuration Utility The Configuration Utility manages settings that apply across all DSS-enabled devices, such as an e‑mail server and Authentication method, and also settings that apply to specific devices. The Configuration Utility has several display elements to assist you in knowing what data is required to make DSS features available on devices. ENWW Configuration 45 Figure 3-15 Configuration Utility elements Table 3-6 Configuration Utility elements Callout Component Description 1 Exclamation point An exclamation point (!) next to the name of a tab indicates that required data for that feature has not been supplied, or that some data is invalid. If an exclamation point exists on any tab you must navigate to that tab and change the settings so that the exclamation point is removed. There will be a blue field at the top of the dialog explaining what needs to be changed, and the fields that require change in the dialog will be surrounded with a blue border. DO NOT try to apply settings until all exclamation points are removed. 2 Asterisk An asterisk (*) next to the name of a tab indicates that data has been entered, but not yet applied. The Apply button must be clicked in order to save the settings. 3 Outline Required data is highlighted with an outline around the necessary setting. In this diagram the Name and UNC Folder Path settings are highlighted to indicate that those are required. Licensing This section contains the following topics: ● Add licenses ● Remove licenses ● Auto-generated licenses Add licenses 1. 46 In the DSS Configuration Utility, click the General tab. Chapter 3 Installation and configuration ENWW Figure 3-16 General tab – DSS Configuration Utility 2. In the Licenses section, click Add.... The Add License dialog box appears. Figure 3-17 Add License dialog box 3. Type in the 20-digit license key code for the license you are installing, and then click OK. 4. The new license appears in the Licenses list and the Seats field updates to reflect the additional seats provided by this license. Remove licenses In rare instances it is necessary to remove licenses from the DSS server. One condition that would prompt license removal from a DSS server would be to install those licenses on a new DSS server. 1. ENWW In the DSS Configuration Utility, click the General tab. Configuration 47 Figure 3-18 General tab – DSS Configuration Utility 2. In the Licenses section, click the license you want to remove, and then click Remove. 3. The license is removed from the Licenses list and the Seats field updates to reflect the current number of seats provided by any remaining licenses. NOTE: If by removing a license, your total number of seats falls below the number of devices you currently have configured for Digital Sending features, you will be required to remove devices from the Device List on the Device Configuration tab to match the number of remaining sets available. Auto-generated licenses The HP LaserJet 9200c and 9250c devices auto-generate a license for use in DSS. This means that no additional license seat is required for these devices. Once these devices are managed by DSS, they will automatically generate a license that shows up in the DSS Configuration Utility. 48 Chapter 3 Installation and configuration ENWW Backup and Restore Backup Figure 3-19 DSS Backup Click the Backup button on the General tab of the Configuration Utility to reveal the DSS backup dialog box. The DSS Backup backs up DSS data stored on the DSS server. The DSS Backup does not include data which is stored on the devices themselves. When a device is opened for configuration via the Device Configuration tab of the CU, DSS displays device data that is not backed up. When performing a DSS backup, all of the server data is collected; users cannot back up a portion of the DSS data. However, when restoring data from a backup file, an administrator can select which data to restore. Restoring all of the data at the same time is not a requirement. By default, DSS assumes backup files will be encrypted. Encrypted backup files contain passwords that are stored in DSS. Passwords can exist in many places in DSS including (but not limited to): ● Credentials for SMTP server authentication ● Credentials for LDAP server access for authentication or addressing ● Credentials for folder access in Send to Folder, Send to Workflow, or Send to LanFax Administrators must provide an encryption key for encrypted backup files. Administrators must remember this key. DSS prompts administrators for it when attempting a Restore from this backup file. If the backup is not encrypted, the file will not contain passwords and will be stored in an xml format. This may be useful in some circumstances (for example, when debugging some error conditions). In general, HP strongly suggests encrypting back up files. Encryption strengthens security and saves the administrator from having to remember and re-enter passwords after a Restore. ENWW Configuration 49 Restore Figure 3-20 DSS Restore Administrators may access the Restore functionality in the CU by selecting the Restore button in the General tab. The Restore function first prompts the administrator to select a DSS backup file from the file system. The DSS Restore dialog box appears when the administrator selects a backup file. Administrators must provide an encryption key for encrypted backup files. This is the same encryption key provided at the time the backup file was created. By default, the Restore feature assumes that all data in the backup file will be restored. However, administrators can restore selected portions of data by clicking the Selective Restore radio button, then selecting the check boxes beside the desired data items. By default, the Restore function replaces the data currently on the DSS server with the data from the backup file. For some types of data, those for which there are lists of items, administrators can configure Restore to merge the data currently on the system with data from the backup file. Select the checkbox next to the desired data type to merge data in the Merge Settings area of the Restore dialog box. Restore resolves duplicates by renaming one of them when merging settings. For example: if the current DSS server and the DSS backup file each contain a folder named FOLDER X, then the item from the backup file will be renamed FOLDER X(2) when it is restored. Device management The Device Configuration tab on the Configuration Utility specifies which devices are using the DSS service and also provides an interface for customizing DSS features for specific devices. 50 Chapter 3 Installation and configuration ENWW Figure 3-21 Device Configuration tab 1 2 3 4 5 7 8 9 10 6 11 The Device Configuration tab contains the following elements. Table 3-7 Device Configuration tab ENWW Callout Component Description 1 Group List Use this list to organize the devices using the DSS service. ● Add Group. Click to create a new group. ● Remove Group. Click to remove a group. ● Rename. Click to change a group name. Configuration 51 Table 3-7 Device Configuration tab (continued) Callout Component Description 2 Device List This list shows the individual devices using the DSS service as well as the features that are enabled or not enabled on each device. The Device List contains the following headings: ● Status ● Name ● Send to E‑mail icon ● Send to Fax icon ● Send to folder icon ● Workflow icon ● Authentication icon ● Addressing icon ● Model ● IP Address ● Hostname (will be blank if the device has been added by IP address) ● Description ● Firmware 3 Add Device Click to connect a new device to the DSS service. Once added, the device will appear in the Device List. 4 Remove Device Click to select a device from the list, then click this button to remove the device. 5 Device Sign-in Click this button to enter in a default set of credentials that can be used for communicating with FutureSmart devices that have their EWS password enabled. 6 Total Devices Displays the total number of devices in the Device List. 7 Export Saves, to a .csv file, the list of devices managed by DSS. 8 Import Imports, from a .csv file, a list of devices that will be added to any devices currently in the device list. 9 Create Template Select a device in the list and then click the Create Template button to create a template of device settings that match the settings in the selected device. 10 Configure Device Click to select the device you want to configure, then use the sub-tabs to configure DSS features for the selected device. 11 Apply Click this button to save changes made on this tab. Add and remove devices Add a device 1. 52 On the DSS server, open the Configuration Utility, and then click the Device Configuration tab. Chapter 3 Installation and configuration ENWW Figure 3-22 Device Configuration tab 2. Click Add Device.... The Add Devices dialog box appears. Figure 3-23 Add Devices dialog box 3. If you know the hostname or TCP/IP address of the device, you can type it in the Hostname or IP Address text box under Manually enter a device's network name heading. Click the rightarrow > or press the Enter key to add the device to the Device List. -orSelect a device from the Devices on the network list, and then click the right-arrow > or press the Enter key to add the device to the Device List. 4. Click the OK button to close the Add Devices dialog box. NOTE: You can add only as many DSS-enabled devices as there are seats available in the DSS license. The number of seats available appears near the top of the Add Devices dialog box. Remove a device 1. ENWW On the DSS server, open the Configuration Utility, and then click the Device Configuration tab. Configuration 53 Figure 3-24 Device Configuration tab 2. In the Device List, click to select the device you want to remove, and then click Remove Device. The Remove Device dialog box appears. Figure 3-25 Remove Device dialog box 3. Click Yes to remove DSS-enabled devices. Device configuration After adding a new device (or group of devices), use the following procedure to configure the Digital Sending features for the device or group. 1. On the DSS server, open the Configuration Utility and click the Device Configuration tab. 2. Select a device from the Device List. 3. Click Configure Device. The dialog box that appears looks similar to the main Configuration program interface. Use this interface to customize the specific Digital Sending settings for this device. NOTE: Use this interface to enable the Digital Sending features for the individual devices. Even if a feature is enabled on the DSS configuration tabs, it is not available on the device until it has been enabled in the Configure Device interface. 54 Chapter 3 Installation and configuration ENWW 4. On the General tab, server administrators name, phone number, e-mail address, and optional location. 5. On the Authentication tab, click to select the check box for the authentication method you want to use to enable authentication for the selected device. Select the check boxes next to the features that are being enabled. Enabling authentication requires the user to log in before using the selected features. Select the network domain from the Default Domain drop-down menu. 6. On the Send to E‑mail tab, select the Enable Send to E‑mail check box, and then select either Directly from the device or via the Digital Sender service in the Send E‑mail drop-down list. When sending e-mail directly from the device, specify the SMTP server, port number, and server usage settings to use. Then use the controls in the Address and Message Field Control and File Settings sections to customize the Send to E‑mail settings for the selected device. 7. On the Fax tab, select the Enable Fax Send check box to enable the fax feature. Select the desired fax method in the drop-down menu. 8. On the Send to Folder tab, select the Enable Send to Folder check box to enable this feature. 9. On the Send to Workflows tab, select the Enable Send to Workflows check box to enable workflows and configure settings. 10. On the Addressing tab, select the Enable Network Contacts (use LDAP server) check box if DSS should retrieve e‑mail addresses directly from an LDAP server. Enter the LDAP server Hostname or IP address, or click the "Auto Find" button. Then enter the LDAP port number (usually 389). 11. The Log tab will show a list of job logs for jobs that have been sent from that device. 12. On the Preferences tab, set the default scanner settings and the timeout settings for digital sending operations. The Preferences tab is only available for pre-FutureSmart devices. 13. Click Apply to save all of the changes. NOTE: The settings are not propagated to the device until Apply is selected. Understanding the Device List icons The Device List on the Device Configuration tab shows the DSS-enabled devices that are currently being served by DSS. The icon to the left of the device name indicates the status of the device. Table 3-8 Device List icons Icon Description Communication with the device is established and the configuration settings are known. The device configuration has not been retrieved since the Configuration Utility was loaded. DSS can communicate with the device but the device is no longer configured to be managed by DSS. It is possible that device settings have been reset by an administrator or service technician from the control panel or using the Embedded Web Server. ENWW Configuration 55 Table 3-8 Device List icons (continued) Icon Description The device was seized by another computer that is running the Configuration Utility. The TCP/ IP address of the other computer is available under the Status heading on the Device List. To reclaim ownership of a seized device, right-click the crossbones icon and click OK in the two dialog boxes that appear. DSS is unable to establish communication with the device and the settings are unknown. Device grouping Device grouping provides the ability to organize devices for more efficient configuration and management. Figure 3-26 Device grouping Create a device group 1. Open the Configuration Utility, and then click the Device Configuration tab. 2. Select the group in which you want to add a new group or select All Devices. Device groups can be nested within other groups. 3. Click Add group. 4. Type a name for the new group. Add devices to a group 56 1. Right-click on a device and select Add to Group. 2. Click the desired group for this device. Chapter 3 Installation and configuration ENWW Remove devices from a group 1. Right-click on a device and select Remove. 2. Click Remove from Group. Authentication Authentication is a security feature that requires users to provide a network username and password before using Digital Sending features. Authentication can be turned on or off for individual features within each device that DSS supports. NOTE: At no time are the credentials that are used to authenticate at the device written to either the DSS server or the device hard disk. In addition, although the credentials that the DSS administrator uses to configure authentication or LDAP addressing are written to the DSS server hard disk, encryption is incorporated to ensure that these credentials cannot be recovered. Configure DSS This section contains the following topics: ● Authentication methods Authentication methods This section describes the two methods of authentication: ● LDAP authentication ● Windows Active Directory LDAP Server Many modern computer systems store and organize data in Directories. A Directory is a set of data where the data for a particular entity is kept in a container and all the containers are organized in a tree structure. Microsoft's Active Directory, the database associated with Windows Domain Controllers, is a Directory based database, but there are many implementations of Directories from different vendors. Directories not only store data but provide other services such as security and the ability to authenticate users for Directory access. LDAP, or Lightweight Directory Access Protocol, is an industry standard protocol for interacting with Directories. Servers that host a directory which supports the LDAP protocol are called LDAP servers. The LDAP configuration tab is where DSS is configured with all of the information it needs to interact with an LDAP server in order to authenticate a user that has entered LDAP credentials at the device control panel. ENWW Configuration 57 Figure 3-27 Authentication tab – LDAP Server 1 2 3 The LDAP Server option on the Authentication tab contains the following elements. Table 3-9 Authentication tab – LDAP Server 58 Callout Component Description 1 Authentication method Select LDAP Server from the drop-down menu. Chapter 3 Installation and configuration ENWW Table 3-9 Authentication tab – LDAP Server (continued) Callout Component Description 2 LDAP Sign In Setup Use the following fields to set up the sign-in method. Provide the appropriate LDAP attribute name for your environment. ● LDAP Server address ● Port number NOTE: Select Use a secure connection (SSL) to enable an SSL (Secure Sockets Layer) connection. ● Bind prefix: This is the attribute that guarantees uniqueness between any container in the Directory and other containers at the same level in the directory tree. The is commonly the attribute 'cn', but can be configured by the LDAP administrator to be any attribute. ● Bind and Search Root: The search root is the distinguished name (DN) of the entry in the LDAP directory where the search is to begin. A DN is made up of 'attribute=value' pairs separated by commas. In Windows Active Directory Services, the search root normally takes the form: CN=Users,DC=domain_name,DC=domain_suffix. To limit the address search even more, for example, to a single organizational unit (OU), add components to the search root. For example, to search for users in the "accounting" OU, add "OU=accounting" to the search root (OU=accounting,CN=Users,DC=domain_name,DC=domain_suf fix). By using these methods to configure the search root that is used in authentication, access to Digital Sending features can be limited to a subset of users in an organization. Several methods can be used to determine the search root. NOTE: On some LDAP servers, the search root can remain blank. In this case, the root node is assumed to be the starting place. ● Match the name entered with this attribute ● Retrieve the user's e‑mail address using this attribute ● Retrieve the device user's name using this attribute ● Retrieve the device user's group using this attribute To allow an exact match only, click to select the Exact match on Group attribute check box. 3 ENWW Test LDAP Sign in Type information into the following fields, and then click Test to test the LDAP Server sign-in setup. ● Username ● Password Configuration 59 Figure 3-28 LDAP authentication Encrypted using SSL 2. User credentials (simple bind) 3. Authentication result 1. User credentials (DSMP-encrypted) 6. Authenticated user’s e-mail addresses 4. LDAP query 5. Query results HP DSS server LDAP server Microsoft Windows When a user signs-in for Windows authentication, they provide a domain, user name, and password. DSS communicates with the domain controller associated with the domain provided by the user to authenticate the user. In addition to domain controller authentication, DSS also retrieves some data items about the user, such as e-mail address, from an LDAP database. By default, the LDAP database that DSS gathers user information from is the Active Directory database associated with the domain controller being used to authenticate the user. Figure 3-29 Authentication tab – Microsoft Windows 1 2 3 The Microsoft Windows option on the Authentication tab contains the following elements. Table 3-10 Authentication tab – Microsoft Windows 60 Callout Component Description 1 Authentication method Select Microsoft Windows from the drop-down menu. Chapter 3 Installation and configuration ENWW Table 3-10 Authentication tab – Microsoft Windows (continued) Callout Component Description 2 Windows Sign in Setup (Kerberos and NTLM) Click Add to add domains to the Trusted Domains list. Click Remove to remove domains from the list. Select the Default Windows Domain from the drop-down menu. Use the following fields to set up the sign-in method. 3 Test Windows Sign In ● Match the name entered with this attribute ● Retrieve the user's e‑mail address using this attribute Type information into the following fields, and then click Test to test the Microsoft Windows sign-in setup. ● Domain ● Username ● Password As shown in Figure 3-30 Windows Active Directory authentication on page 62, the following steps occur during Windows authentication: ENWW 1. The user types his or her username and password at the device. This information is securely transmitted to the DSS server. 2. The DSS program authenticates to the domain through the Windows API to validate the user's credentials. 3. If the user's credentials are correct, the Domain Controller returns either the security identifier (SID) or the BSID (Binary SID). 4. Using the LDAP interface, DSS queries the LDAP directory for the authenticated user's e‑mail address. 5. The LDAP directory returns the authenticated user's e‑mail address. 6. DSS inserts the authenticated user's e‑mail address in the From: text box of the e‑mail and prohibits the user from changing the field. Configuration 61 Figure 3-30 Windows Active Directory authentication 1. User credentials (DSMP-encrypted) 6. Authentication user’s e-mail address 5. Query results 4. LDAP query LDAP server 2. User credentials (API-encrypted) HP DSS server 3. Authentication result (API-encrypted) Domain controller Windows Two Server authentication DSS can be configured to use an LDAP database other than the Active Directory database for user data retrieval. The configuration for Two Server authentication is partially done using the Windows authentication user interface and partially done using a configuration file. All of the fields in the user interface are still used except for the Match the name entered with this attribute and Retrieve the user's e-mail address using this attribute fields. The Trusted Domains and Windows default domain settings from the user interface are still required. The configuration used for Windows Two Server authentication is: \FileSystems\Product\Dss\Configuration \HP.Dss.App.Utilities.TwoServerAuthentication.xml Use this file to configure information DSS needs to find and access the LDAP database and which attributes to retrieve. See the documentation in the file for further configuration information. 62 Chapter 3 Installation and configuration ENWW Configure the Device Figure 3-31 Authentication subtab – Configure Devices tab set The Authentication subtab on the Configure Devices tab set contains the following elements. Table 3-11 Authentication subtab — Configure Devices tab set Callout Component Description 1 Sign In and Permission Policies Requires Sign-In: To require that a user must sign-in to use a feature in the device, check the Requires Sign In checkbox in that feature's row. Sign In method: In the Sign-In Method drop down list, select the authentication agent to use for sign-in for that feature. Authentication agents are software that collect the user's sign-in credentials and authenticate those credentials against the appropriate authority. The device firmware has built into it two different possible authentication agents to choose from, one for Windows authentication and the second for LDAP authentication. DSS can also act as an authentication agent (if it was configured to work that way when configuring the Authentication tab in the DSS service) and can be chosen from the drop down menu as one of the selections when a device is managed by DSS. It is also possible that other, 3rd party, authentication agents will be available to choose from if they have been installed on this device. Some popular 3rd party agents are HP Access Control and Safecom. 2 Authentication Add the following information to enable authentication. ● Default domain General Device configuration This section contains information about some of the more general sub-tabs available on the Configure Devices tab set in the Configuration Utility. Use this tab set to configure individual DSSenabled devices. The following tabs are included in this section: ENWW ● General subtab ● Addressing subtab Configuration 63 ● Log subtab ● Preferences subtab For information about the remaining tabs, see the following topics: ● Table 3-11 Authentication subtab — Configure Devices tab set on page 63 ● Fax subtab — Configure the Device on page 78 ● Table 3-18 Send to Workflows subtab – Configure Devices tab set on page 89 General subtab Figure 3-32 General subtab in the Configure Devices tab set 1 The General subtab in the Configure Devices tab set contains the following elements. Table 3-12 General subtab on the Configure Devices tab set Callout Component Description 1 Administrator Information The General tab allows you to configure settings common to all the Digital Sending features supported on the device. The device displays the Administrator Contact Information when an error occurs that requires administrator intervention. 64 Chapter 3 Installation and configuration ● In the Name edit box, enter the name of the person responsible for maintaining the Digital Sending features of this device. ● In the E‑mail Address edit box, enter the e‑mail address of the person responsible for maintaining the Digital Sending features of this device. ● In the Phone Number (optional) edit box, optionally enter the phone number of the person responsible for maintaining the Digital Sending features of this device. ● In the Location (optional) edit box, optionally enter the physical location of the person responsible for maintaining the Digital Sending features of this device. ENWW Addressing subtab Figure 3-33 Addressing subtab on the Device Configuration tab set The Addressing tab is used to configure a device's ability to get address information directly from an LDAP server, without the use of DSS. This direct device addressing can be used whether or not DSS LDAP replication is enabled. Any addresses collected directly by the device will be merged with addresses from DSS address books for the user to select from at the control panel. ENWW Configuration 65 Log subtab The Log subtab on the Configure Device tab set displays the job log information for jobs sent from that device. Figure 3-34 Log subtab in the Configure Devices tab set Preferences subtab The Preferences subtab is only available on pre-FutureSmart devices. Figure 3-35 Preferences subtab in the Configure Devices tab set 1 2 The Preferences subtab contains the following controls. 66 Chapter 3 Installation and configuration ENWW Table 3-13 Preferences subtab on the Configure Devices tab set Callout Component Description 1 Default Scanner Settings Use Default Scanner Settings to set the default settings for document size, expected page content, and duplexing: ● Original Size ● Optimize Text/Picture ● Original Sides NOTE: On FutureSmart devices these settings are set individually for each send feature – e-mail, fax, folder, and workflow. On pre-FutureSmart devices these settings are set once and apply globally to all the send features. 2 Timeouts Use the controls in the Time-outs group box to control the delay before the device returns to its default digital-send settings. The following options are available to control the auto settings resets: NOTE: These specific time-outs do not exist for FutureSmart devices. ● Immediate reset to defaults ● Delay reset to defaults ● Number of seconds combo box – choose from 1 to 30 seconds. Send to Folder The Digital Sending features of the device can send scanned documents directly to a network folder, transforming paper-based information into digital images that can be shared, stored, or edited. Configure DSS Use the Configuration Utility Send to Folder tab to set up the Send to Folder feature and select network folders to send to. Figure 3-36 The Send to Folder tab 1 2 ENWW Configuration 67 Table 3-14 Send to Folder tab Callout Component Description 1 Predefined folders The Predefined folders list shows the folders as they are added to the DSS service. These folders are available at the device. The Display name, UNC Folder path, and Credentials for each folder are listed here. The following controls are also available for configuring the folders. 2 Credentials to Access Public Folders ● Add. Click to add a new folder ● Edit. Click to edit settings for the selected folder. ● Copy. Click to copy a folder. ● Remove. Click to remove a folder from the list of available folders. ● Test. Click to test folder settings. Use the Credentials to Access Public Folders to define a common set of service credentials that can be used for Windows folder access. When defining a folder destination, then these credentials can be configured to be what DSS uses for folder access rights. ● Username. Type in the username. ● Password. Type in the password. ● Domain. Type in the domain. To configure the Send to Folder feature 1. On the DSS server, open the Configuration Utility, and then click the Send to Folder tab. 2. Select the Enable Send to Folder check box. 3. Click Add… to add a new folder. The Predefined Folder dialog box appears. 4. Type a name and description for the folder into the Name and Description text boxes. The name and description appear on the device control-panel interface. 5. Click to select one of the following folder types: NOTE: Supported operating systems for folder destinations are CIFS/SMB-compliant file systems. ● 68 Save to a standard shared network folder.. Chapter 3 Installation and configuration ENWW Figure 3-37 Add a Predefined Folder screen 1. ENWW Click the Add button to open the Add Network Folder Path screen. Configuration 69 Figure 3-38 Add Network Folder Path screen 70 2. Click the Browse button to select a folder path. 3. Select the credentials that should be used to gain access to the folder in the Authentication Settings section. Click to select Use credentials of user to connect after Sign-in at the control panel to use the credentials of the user when logged into the device. Or click to select Use common credentials to use the credentials designated in the Credentials to Access Public Folders section on the Send to Folder tab. Click Verify Access to test authentication. 4. Click the OK button to save the settings. The new folder(s) is added to the Folder Destinations list. ● Save to a personal shared folder. This feature will save to a folder path that is stored in an LDAP attribute. The LDAP attribute is associated with the user name of a signed-in user, so this feature can only be used when user sign-in is enabled. Type in the name of the LDAP attribute in which to find the UNC path to the user's folder. ● Create subfolder based upon user name. This feature customizes the path in which data is stored by appending the signed-in user's name to the provided UNC path for the final destination path. User sign-is required for send to folder for this feature to be used. If the Only allow access to user's own Directory checkbox is not checked then the destination folder will inherit the permissions of its parent. If the Only allow access to user's own Directory is checked then DSS will modify the folder permissions so that only the user and administrators will have access. 6. Click the Verify folder access prior to job start check box to ensure the target folder is accessible before each job. 7. Click OK to save the settings. The new folder is added to the Predefined Folders list. Chapter 3 Installation and configuration ENWW 8. Repeat steps 1 through 7 to add more folders. 9. Click the OK button to save the folder settings. Configure the Device In the Configuration Utility, use the Send to Folder subtab on the Device Configuration tab set to set up the Send to Folder feature on the device. Configure the device to use Send To Folder 1. Click to select the Enable Send to Folder check box on the Send To Folder subtab on the Configure Devices tab set. 2. To enable options for OCR processing the scanned documents, select an OCR file type from the Default File Type drop-down menu. 3. For pre-FutureSmart devices managed by DSS, send to folder jobs always flow through DSS. For FutureSmart devices, the jobs can be configured to flow through DSS or to be sent directly from the device. Send to E‑mail This section contains the following topics: ● Configuration overview ● Configure DSS ● Configure the Device Configuration overview The Digital Sending features of the device can send scanned documents directly to e‑mail, transforming paper-based information into digital images that can be shared, stored, or edited. This saves the device user from having to first create and save an electronic copy of a hard-copy document, and then send it via their mail application. This can now all be done in one step at the device. Configure DSS Use the E‑mail tab of the Configuration Utility to configure and organize the SMTP e‑mail servers that DSS uses to send e‑mail messages. ENWW Configuration 71 Figure 3-39 E‑mail tab 1 The E‑mail tab contains the following elements. Table 3-15 E‑mail tab Callout Component Description 1 Outgoing E‑mail Server (SMTP) Gateway Server Use the Outgoing E‑mail Server (SMTP) Gateway Server to manage e‑mail servers for the DSS server. The e‑mail servers are listed here by priority. Use the up and down arrows to move e‑mail servers up or down in the list. The following controls are available for configuring the e‑mail servers. ● Add. Click to add a new e‑mail server. ● Edit. Click to edit the settings for an e‑mail server. ● Remove. Click to remove an e‑mail server from the list. ● Test. Click to test an e‑mail server. Configure the e‑mail feature on DSS 1. 72 On the DSS server, open the Configuration Utility, and then click the E‑mail tab. Chapter 3 Installation and configuration ENWW Figure 3-40 The E‑mail tab 2. Click Add. The Add SMTP Gateway dialog box appears. Figure 3-41 Add SMTP Gateway dialog box 3. Type the host name or TCP/IP address of the SMTP server in the Server Name or Address field. -orOr click Auto Find to find all of the SMTP servers on the network. A list of SMTP servers appears. Select one or more SMTP servers and click OK. 4. ENWW Select any of the following additional SMTP gateway options: ● Enable SMTP SSL Protocol ● Server Requires Authentication ● E-mail: Send scanned documents and job status notifications. Configuration 73 ● Fax: send faxes when the fax send method is set to Internet Fax. Since the Send to Fax feature also uses an e-mail interface, checking this box indicates the SMTP server being configured can be used for both Send to e-mail and Send to Fax. ● Split e‑mails if larger than (MB). Use this control to set a maximum file size for the specified SMTP gateway. If an e‑mail attachment exceeds the specified file size, the attachment is divided into two or more smaller attachments. ● Send a test e‑mail to. Type an e‑mail address, and then click Send to verify the presence of the SMTP gateway. NOTE: If the test fails, double-check the gateway address, and then contact the network administrator to see if the SMTP server is functioning. 5. Click OK to add the server to the SMTP Gateway Server list. 6. If there is more than one SMTP server, use the Move arrow buttons to move SMTP servers to a different position on the list. DSS attempts to use the first SMTP server when processing an e‑mail transmission. If the first server is unavailable for use, DSS attempts to use the next server on the list. DSS continues this process until it finds an available SMTP server. Configure the Device 1. On the DSS server, open the Configuration Utility, and then select a device from the list on the Device Configuration tab. 2. Click the Configure Device... button, and then select the Send to E-mail tab. 3. Select the Enable Send to E-mail check box. 4. In the Send E-mail drop-down menu box, select via the Digital Sending Service if you want email jobs routed via DSS, or select Directly from the device if you want jobs to be sent from the device. 5. Configure the rest of the settings as needed. Send to Fax This section contains the following topics: ● Configuration overview ● Configure DSS ● Configure the Device Configuration overview This section contains the following topics: 74 ● Analog fax ● Digital fax Chapter 3 Installation and configuration ENWW Analog fax DSS can be used to configure the settings for the embedded analog fax modem in a device. Use the Send to Fax tab in the Device Configuration interface to configure these settings on individual devices. Digital fax Digital Fax is the name for a process where the original file is scanned and digitized before it is sent to its destination via a fax modem. In the DSS digital fax process the original files are scanned on the device, sent to DSS, and then routed via DSS to a third party software application. The third party software application processes the digital file and manages the sending of the file over a fax modem. DSS does not fax the scanned image, it just routes the image to the third party software. There are two types of digital fax: LAN Fax and Internet Fax. They are differentiated by the method DSS uses to interact with the fax software. For LAN Fax, DSS delivers the scanned image to the fax software using a shared folder interface. With Internet Fax, DSS delivers the scanned image via an email interface. For all digital fax jobs, DSS delivers a metadata file with the scanned image file. The metadata file contains information the fax software needs to send the fax including things like destination phone number, modem speed to use, etc. Configure DSS The Configuration Utility Fax tab controls all of the DSS fax settings. To configure the fax option, first select the fax delivery method from the Fax Send Method drop-down list. The following options are available: ● None ● LAN Fax ● Internet Fax Depending on which method is selected, the applicable settings appear on the Fax tab. Fill in these settings to complete the fax configuration process. Internet fax DSS uses an e-mail interface to communicate with a third party internet fax vendor. ENWW Configuration 75 Figure 3-42 Fax tab – Internet fax option To configure Internet fax With an Internet fax service, faxes are sent in e‑mail. When using DSS, the user specifies a fax number at the device, and then the software creates and sends the e‑mail behind the scenes. 1. On the DSS server, open the Configuration Utility and click the Fax tab. 2. Select Internet Fax from the Fax Send Method drop-down list. 3. Set up the Outgoing E‑mail Server (SMTP) Gateway Server. Click the Add... button to open the Add SMTP Gateway dialog and add the outgoing e-mail server address manually or click the Auto Find... button to search for servers. If, when configuring an SMTP server for send to e-mail, the checkbox labeled Fax: send faxes when the fax send method is set to Internet Fax was checked, then those SMTP servers will already be shown in the list of servers available for use with Internet Fax. 76 4. Type the domain name for the Internet fax provider into the Fax Provider Domain text box (for example, efax.com). DSS takes the phone number that is typed at the device and then uses this domain name to create the e‑mail (for example, [phone number]@efax.com). 5. Type a valid e‑mail address into the Default Fax Account E‑mail Address text box. The Fax Account E-mail Address is used by third party fax service for billing purposes or as a return address for notifications. This address is used if the check box labeled If available, use the user's e-mail address as the Fax Account Address is not checked, or if user sign-in is not enabled for fax. The Fax Account E-mail address is used as the "from:" address in the e-mail sent to the fax software. 6. Enter the T37 prefix. The T37 prefix is an optional data item that may be required by some third party fax software applications. 7. Select the default File Format from the drop-down menu. Chapter 3 Installation and configuration ENWW 8. Select the check box to use the authenticated user's e‑mail address as the return e‑mail address. If the device user's e‑mail address is not available, the Default Fax Account E‑mail Address e‑mail address is used. NOTE: If you select this option, the user's e‑mail address must be registered with the Internet fax service provider in order to fax successfully. 9. Click Apply to save the Internet fax settings. LAN fax DSS uses a shared folder interface to communicate with a third party LAN Fax vendor. Figure 3-43 Fax tab – LAN fax option To configure LAN fax Follow these instructions to set up faxing from the device by using the network LAN fax service. 1. On the DSS server, open the Configuration Utility and click the Fax tab. 2. Select LAN fax from the Fax Send Method drop-down list. 3. Select the LAN fax software product name from the Third Party LAN Fax Product drop-down menu. NOTE: If you are unsure about whether the product supports notification, select the Generic LAN fax product without notification support option from the drop-down menu. ENWW 4. Select the Network Type from the drop-down menu. 5. Type in the network path in the Folder Path, or click Browse to select the network folder that the fax software uses. 6. Enter the Windows credentials of domain, user name, and password that DSS will use for access rights to the shared folder. Click Verify Folder Access to test the credentials and verify access to the folder. Configuration 77 7. Complete the Dialing Settings section by typing in the values you want to use in the Maximum Retry Attempts and Retry Interval (minutes) text boxes. 8. Complete the Input Settings section by selecting the values you want to use in the Notification and Error Correction Mode drop-down menus. Type in the value you want to use in the Notification Timeout (minutes) text box. 9. Complete the Output Settings section by selecting the values you want to use in the Transmission Speed and Cover Page drop-down menus. 10. Click Apply to save the LAN fax settings. Configure the Device Use the Fax tab to configure the send-to-fax features for the selected device. Depending on the device type and hardware configuration, some of these options might not be available. To configure the fax option, first select the fax delivery method from the Fax Send Method drop-down list. A device can only be configured to use a single fax delivery method at any one time. The following options are available: ● Internet Fax Service: When this is selected, configuration is done for the device firmware's ability to send digital fax to internet fax vendors. DSS is not involved. ● Lan Fax Service: When this is selected, configuration is done for the device firmware's ability to send digital fax to LAN fax vendors. DSS is not involved. ● Internal Modem: When this is selected, the device is configured to send fax via its internal modem. DSS is not involved. ● via the Digital Send Service: When this is selected, the device is configured to send faxes via DSS. This will be either Internet Fax or LAN fax depending on how the DSS service is configured. Once the Enable Fax Send check box has been checked and the Fax Send Method is set to via the Digital Sending Service, configure other settings on the tab as appropriate for your environment. Send to Workflows This section contains the following topics: ● Configuration overview ● Configure DSS ● Configure the Device Configuration overview Workflows give device users the ability to send additional information along with the scanned document to a specified location. The additional information is in a file called a metadata file. Metadata files can be configured by DSS administrators and contain a collection of data items referred to as prompts. Prompts can be either system generated information or information provided by the end user after being prompted for input at the control panel when using the workflow. Third party applications, or in-house applications developed by customers, can be used to monitor for new scanned image files being delivered to a destination and can subsequently use the metadata files to decide how to further process the scanned image file. 78 Chapter 3 Installation and configuration ENWW The available destinations for workflow are: ● Folders ● FTP sites ● SharePoint® ● Printers Metadata files are not created and printed for send to printer workflows. Some reasons to use send to printer are: ● When printing a file scanned at a scanner only device ● When printing a file to a color printer that was scanned at a device with a color scanner but only a mono printer Workflow organizational structures Workflows are arranged in an hierarchical fashion. The top-most level is Groups. The default group is called the Common Device Group and cannot be deleted. Devices are configured to show only one Workflow group. If multiple groups are configured, a device will only show a subset of all the workflows. This can be used to manage large numbers of workflows so users at a device do not have to navigate through them all to find the one they want. For example, if you wanted the device in the marketing department to present only marketing specific workflows, you might create a Marketing Workflow Group that contained a subset of the workflows (the marketing specific ones). You would then configure the marketing department's device to use the Marketing Workflow Group (see the Send to Workflow settings in Device Configuration). All your other devices would then be configured to use the Common Device Group. The next Workflow level is Menus. Menus are the first level that is viewable at the device's control panel. Typically, Menus are used to categorize workflows. Within a Menu, you can create another Menu (up to 30 levels deep) or forms Forms are workflows. Each form contains information about the workflow destination and file settings for the scanned file image. Also included in each form is the definition of the metadata file associated with that workflow, including the metadata file format and which prompts are included. Configure DSS The Configuration Utility Workflows tab can also be used to view workflow entries or to set up workflow processes. ENWW Configuration 79 Figure 3-44 The Workflows tab 1 Table 3-16 Workflows tab Callout Component Description 1 Workflows This list shows the workflows that are set up and available for use to any of the devices connected to the DSS server. Click to select the Display Prompt Text check box to show the prompt text for each workflow in the list. The following controls are available to help configure workflows. ● Add Group. Click to add a group to a workflow. ● Add Menu. Click to add a menu to a workflow. ● Add Form. Click to add a form to a workflow. ● Add Prompts. Click to add prompts to a workflow. ● Edit. Click to change workflow settings. ● Remove. Click to remove a workflow from the list. Configure the menu structure (groups, menus, and forms) The workflow configuration process comprises three steps: 80 ● Creating the workflow group, which defines which workflow menus and forms are available on the device control panel. ● Creating the workflow menu, which creates logical groups of workflow forms. ● Creating the workflow form, which accumulates information that the user specifies at the control panel before initiating a send-to-workflow job. Chapter 3 Installation and configuration ENWW Groups The first step in creating a workflow process is to create a workflow group. NOTE: Rather than creating a new group, the default group, called the Common Device Group can also be used. This group cannot be deleted. Custom groups are optional and provide a way to associate different workflows with different devices or groups of devices. 1. On the DSS server, open the Configuration Utility and click the Workflows tab. 2. Click Add Group. The Workflow Group dialog box appears. 3. Type the name of the new group. The name must be unique. 4. Click to select either the This group does not contain the devices mentioned below option or the This group contains workflows that will be used on LJ9065, LJ90 option. 5. Click OK to save the new group. Menus The second step in creating a workflow process is to create a workflow menu. 1. In the workflow tree, click a group to select it. 2. Click Add Menu. The Workflow Menu dialog box appears. 3. Type the name of the new menu. This name must be unique within the workflow group. 4. Click OK to save the new workflow menu. Forms The final step in creating a workflow process is to create a workflow form. Forms are destinationspecific. Four destination types are available: ● Folder ● FTP site ● Printer ● SharePoint The following sections describe how to create a workflow form for each of these destination types. Configuring metadata files Metadata files are configured within the forms for folder, FTP, and SharePoint® destinations. Each form has its own metadata file, but all the metadata files share the same configuration user interface. This section will describe the metadata configuration sub-section of form configuration. ENWW 1. From the Meta Data File Settings section of a workflow form, select the file type for the metadata file from the File Format drop-down menu. The options are None, HPS, XML, or FNA. The metadata file contains the data that is collected by the workflow prompts. If no prompts are being created, select None. 2. In the Prompts area, define any appropriate prompts and expected responses for the user of the workflow form. The prompts appear on the device control panel. The responses to the prompts Configuration 81 are saved in the metadata file, which is stored with the document image for use by the thirdparty workflow software program. Follow these instructions to add prompts. a. Click Add. The Add Prompts dialog box appears. Figure 3-45 Add Prompts dialog box b. Prompts that are already available are listed on the left hand side of the dialog. To create new prompts, click the New... button. This opens the Workflow Prompt dialog box. Figure 3-46 Workflow Prompt dialog box 82 i. Under Prompt Settings in the Workflow Prompt dialog box, type the Prompt Name. This name is used internally and is not visible to the user. It must be unique within the workflow form. ii. Select the Hidden check box if the prompt is not to be shown to the user. Hidden prompts are typically used to send specific unaltered information to the third-party programs in the metadata file. When the Hidden check box is selected, a Prompt Information text box appears. Type the information for the hidden prompt in the Prompt Information text box. iii. In the Prompt Text text box, type the text that you want to appear on the device control panel. Chapter 3 Installation and configuration ENWW iv. In the Help Text text box, type the help text for the prompt. The help text appears if the user touches HELP on the device control panel while the prompt is on the screen. v. Select a setting from the Response Settings drop-down menu. The following table provides a description of each option. Table 3-17 Response format options Format Attributes String Entry ● The user can type any alphanumeric string. ● Minimum length: 1 ● Maximum length: 127 ● The user is limited to typing numbers only. ● Decimal places range from 0 to 15 ● Minimum Value: 0 ● Maximum Value: 4294967295 Selection List ● The user can select from a list of options. Date ● The user is limited to typing a date value in the form of HH/DD/YYYY. The date format cannot be changed. Time ● The user is limited to typing a time value in the form of HH:MM:SS using the 24-hour clock. The time format cannot be changed. Number Entry vi. Click to select the User must supply a response check box to require a response to the prompt. vii. Click to select the Password Privacy check box to have passwords displayed as asterisks. viii. As appropriate, type a default response in the Default Response text box. The program uses the default response if the user does not provide a response to the prompt. Specify the Minimum Length and Maximum Length by typing values in the text boxes. ix. Click OK to save the prompt settings. The new prompt is added to the Prompts List in the Add Prompts dialog box. x. Repeat steps as needed to create more prompts. c. After creating the new prompts, move any of the available prompts you want in this metadata file by selecting the prompt and then clicking the right arrow to move it to the Prompt List. You can change the order the prompt data will appear in the file by using the up and down arrows to the right of the prompt list. d. Click OK to accept the new set of prompts. The new prompts appear in the Prompts area of the Workflow Form dialog box. Folder To create a workflow form for a folder destination 1. ENWW Click a workflow menu to select it. Configuration 83 2. Click Add Form. The Workflow Form dialog box appears. Figure 3-47 Workflow Form dialog box 3. In the Form Name text box, type a name for the new form. The name must be unique within the workflow menu. 4. Select Folder from the Destination Type drop-down list. NOTE: Based on the option selected, the options on the Workflow Form dialog box change. This procedure applies to the Folder option. See the following sections for instructions for creating a workflow form for an FTP site or a printer. 84 5. In the Authentication Settings section, click to select the Use credentials of user to connect after Sign In at the control panel option to have DSS use the credentials of the user that is logged into the device. Or click to select the Always use these credentials option. 6. Select the Network Type from the drop-down menu. Type the path for the destination folder in the Folder Path text box, or browse to select a path. Type in the Windows Domain, Username, and Password. Click Verify Access to test the credentials. 7. Select a setting from the Image Presets drop-down menu, if needed. 8. Under Scan Settings and File Settings, select the settings for the scanned file. These should be the settings that the third-party software program that processes the file requires. 9. Configure the metadata settings. See Configuring metadata files on page 81. Chapter 3 Installation and configuration ENWW 10. Click OK to accept all of the settings on the Workflow Form dialog box. The new form appears in the workflows list on the Workflows tab. NOTE: A workflow form can be edited at any time by selecting it, and then clicking Edit. 11. Click Apply to save the new workflow settings. FTP site The following instructions describe how to send a workflow document to an FTP site rather than a network folder. 1. Click a workflow menu to select it. 2. Click Add Form. The Workflow Form dialog box appears. Figure 3-48 Workflow form for an FTP site ENWW 3. In the Form Name text box, type a name for the new form. The name must be unique within the workflow menu. 4. Select FTP Site in the Destination Type drop-down menu. 5. In the FTP Server text box, type the host name or TCP/IP address of the FTP server. 6. In the FTP Path text box, type in the path to the directory on the FTP server that will hold the scanned documents. Configuration 85 7. In the Authentication Settings section, type in the username and password that are required for the FTP server. 8. Select a setting from the Image Presets drop-down menu, if needed. 9. Under Scan Settings and File Settings, select the settings for the scanned file. These should be the settings that the third-party software program that processes the file requires. 10. Configure the metadata settings. See Configuring metadata files on page 81. 11. Click OK to accept all of the settings on the Workflow Form dialog box. The new form appears in the workflows list on the Workflows tab. NOTE: A workflow form can be edited at any time by selecting it and then clicking Edit. 12. Click Apply to save the new workflow settings. Printer The following instructions describe how a workflow form can also be used to send a scanned document to a network printer to be printed. 1. Click a workflow menu to select it. 2. Click Add Form. The Workflow Form dialog box appears. Figure 3-49 Workflow form for a printer 86 Chapter 3 Installation and configuration ENWW 3. In the Form Name text box, type a name for the new form. The name must be unique within the workflow menu. 4. Select Printer in the Destination Type drop-down menu. 5. In the Select Printer drop-down menu, select a printer from the list of available network printers. DSS can only print to printers that are installed and available on the DSS server as seen in the Windows control panel's printers section. 6. Select one of the option buttons to use the default or custom printer preferences. If custom printer preferences are selected, click Preferences to set them up. NOTE: The device user cannot change any of these print settings from the device control panel. 7. Select a setting from the Image Presets drop-down menu, if needed. Options include Color Document and Photo. 8. Under Scan Settings, select the settings for the scanned file. These should be the settings that the third-party software program that processes the file requires. 9. Click OK to save the workflow form. 10. Click Apply to save the settings on the Workflow tab. NOTE: Metadata files are not available for printer destinations. Sharepoint® The following instructions describe how to send a workflow document to a Sharepoint® site rather than a network folder. 1. ENWW Click a workflow menu to select it. Configuration 87 2. Click Add Form. The Workflow Form dialog box appears. Figure 3-50 Workflow Form dialog box 3. In the Form Name text box, type a name for the new form. The name must be unique within the workflow menu. 4. Select Sharepoint® in the Destination Type drop-down menu. 5. In the Sharepoint® Path field, type the URL path to the Sharepoint® server. It is typical to get a Sharepoint® destination path by navigating to the Sharepoint® location in a web browser, and then copying the path. When this is done, the path information is in the form of a URL that may contain some ASCII equivalents for characters instead of the characters themselves. A common example is to see "%20" instead of a space character. For example: http://sharepointname.company.com/folderlevel1%20name1/folderlevel2 URL's must be converted to a form that has the characters in them, not their ASCII equivalents. Click the Generate Short URL button to perform this conversion. For the example above the URL will be converted to: http://sharepointname.company.com/folderlevel1 name1/folderlevel2 88 6. In the Authentication Settings section, type in the username and password that are required for the Sharepoint® server. 7. In the Authentication Settings section, click to select the Use credentials of user to connect after Sign In at the control panel option to have DSS use the credentials of the user that is logged into Chapter 3 Installation and configuration ENWW the device. Or click to select the Always use these credentials option and then type in the Windows Domain, Username, and Password. Click Verify Access to test the credentials. 8. Select a setting from the Image Presets drop-down menu, if needed. 9. Under Scan Settings and File Settings, select the settings for the scanned file. 10. Configure the metadata settings. See Configuring metadata files on page 81. 11. Click OK to accept all of the settings on the Workflow Form dialog box. The new form appears in the workflows list on the Workflows tab. NOTE: A workflow form can be edited at any time by selecting it and then clicking Edit. 12. Click Apply to save the new workflow settings. Configure the Device The Send to Workflows subtab is shown in the following illustration. Figure 3-51 Send to Workflows subtab in the Configure Devices tab set 1 2 Table 3-18 Send to Workflows subtab – Configure Devices tab set Callout Component Description 1 Enable Send to Workflows Click to select the Enable Send to Workflows check box. 2 Workflow Group Select a workflow group from the drop-down menu. Configure the device to use Send To Workflows ENWW 1. Click to select the Enable Send to Workflows check box on the Send To Workflows tab on the Device Configuration tab set. 2. Select a workflow from the Workflow Group drop-down menu. 3. Click Apply. Configuration 89 Addressing This section contains the following topics: ● Address Book Manager ● Personal address books ● Exchange contacts ● Guest address book ● Public address book ● LDAP replication ● LDAP filters ● Configure DSS for Windows Active Directory Services Address Book Manager Use the Address Book Manager on the Addressing tab to manage the address books for the DSS service. Figure 3-52 Address Book Manager 1 90 2 Chapter 3 Installation and configuration ENWW Table 3-19 Address Book Manager Callout Component Description 1 DSS Address Books The DSS Address Books list shows the address books available to the devices connected to the DSS server. Click an address book to see the address book contacts appear in the window to the right. Use the following controls to configure the address books 2 Address Book Contacts ● Export. Click to export an address book. ● Delete. Click to delete an address book from the list. ● Import Address Book. Click to import an address book. The address book contacts appear in this part of the window. Use the following controls to manage contacts. ● Refresh. Click to update the contacts list. ● Add Contact. Click to add a contact. ● Add Group. Click to add a group. ● Edit. Click to edit a contact. ● Delete. Click to delete a contact. ● Finish. Click to close the Address Book Manager. Importing addresses using the Address Book Manager E‑mail addresses can be imported from the Address Book Manager so that they can be made available to devices served by DSS. Four types of e‑mail address lists can be imported: ● .CSV ● .HPB ● .LDIF ● Microsoft Exchange Configuring address books on the Addressing tab Use the Configuration Utility Addressing tab to configure DSS to make centralized address books available to digital-sender users. ENWW Configuration 91 Figure 3-53 The Addressing tab 1 2 3 4 Table 3-20 Addressing tab Callout Component Description 1 Search Method Click to select Quick Search to find matches beginning with the search string. Click to select Detailed Search to find matches containing the search string. 2 Personal Contacts The personal contacts for a user can be retrieved from a Microsoft Exchange Server if the user has a personal address book (PAB) associated with his or her user account. Click to select the Enable Personal Contacts (when users sign into Windows at the device) check box to enable this feature. Then type in the Windows Domain, Username, and Password. To test the credentials, type at least 3 characters into the Test text box, and then click Test. 3 LDAP Replication Click to select the Enable Network Contacts (use LDAP server) check box, and then follow the steps below. ● ● ● 92 Chapter 3 Installation and configuration Network Directory Server (LDAP) (Step 1). Use the following controls to designate the LDAP server. ◦ Type the hostname or IP address in the LDAP Server Address text box or click AutoFind to have DSS find the LDAP server address. ◦ Click to select the Use a secure connection (SSL) check box. ◦ Type the port number in the Port text box. Server Authentication Requirements (Step 2). Click to select one of the following options. ◦ Server does not require authentication. ◦ Server requires authentication. LDAP Database Search Settings (Step 3). Use the following controls to configure the search settings. ENWW Table 3-20 Addressing tab (continued) Callout 4 Component Address Book Manager Description ◦ Type in the Path to Start Search (BaseDN, Search Root) or click Auto Find to have DSS find the path. ◦ Select a Source for Attribute Names or click Auto Find to have DSS find the source. ◦ Type in the attribute to match the recipient's name, e‑mail address, and fax number. ◦ In the Advanced Search Options section, Select the Maximum LDAP Addresses and the Maximum Search Time from the dropdown menus, and then type in the LDAP Filter Condition in the text box. ● Test for LDAP Retrieval (Step 4). Type in at least 3 characters to test the retrieval of address book entries using the LDAP setup, and then click Test. ● Sync Schedule (Step 5). Select a sync schedule from the drop-down menu, or click Sync now. The last replication shows in the text box. Click this button to launch the Address Book Manager. For more information, see Address Book Manager on page 90. Configuring Personal Contacts feature When the Enable Personal Contacts check box on the Addressing tab is selected, users can gain access to their personal Outlook contacts address books at the device. Exchange Contacts support is only available if authentication is enabled and the authentication method is set to Microsoft Windows. See Authentication on page 57 for more information. Configuring DSS address books DSS uses address books to store e‑mail addresses that a user types at the device. If user authentication is enabled on the device, addresses are stored in a user's personal DSS address book. Otherwise, the addresses are stored in a public DSS address book. These DSS address books are available to every digital sender or device that DSS supports. If the addresses that are contained in these address books are no longer needed, they can be deleted by clicking Clear in the DSS Address Books section of the Addressing tab. This lists all existing address books, so that one or more of them can be selected. Configuring LDAP directory replication The e‑mail addresses and fax numbers in the address book come from several sources: ● The LDAP server on the network ● Destinations that users have previously specified at the control panel ● E‑mail and fax address books that have been created by using the HP Address Book Manager One of two methods can be used to synchronize the digital-sender address books with the LDAP server. Table 3-21 Address book synchronization on page 94 contains descriptions of these methods. ENWW Configuration 93 Table 3-21 Address book synchronization Method Description Effect at the control panel Using a replicated LDAP address book DSS takes a snapshot of the LDAP server database and populates the device address book with the addresses that it finds. The Configuration Utility can be used to either initiate the task manually or schedule it to run automatically at a certain time. As the user types the initial characters in a name, the device attempts to complete the name from the names in the address book. The user types more characters until a match is found. When the user selects a name, the associated e‑mail address is automatically selected. Using an LDAP address book directly Firmware in the device initiates and resolves name queries directly with the LDAP server. The administrator does not need to synchronize the address book with the LDAP server, either manually or according to a schedule. The user types a partial name. The device shows the list of resulting names from the LDAP server. When the user selects a name, the associated e‑mail address is automatically selected. NOTE: If the device is configured to use an LDAP address book directly, it cannot gain access to the replicated address book. If replication is used, only the display names and e‑mail addresses are replicated. 94 Chapter 3 Installation and configuration ENWW To set up automatic replication of the LDAP address book 1. On the DSS server, open the Configuration Utility, and then click the Addressing tab. 2. Click to select the Enable Network Contacts check box. The screen expands to show the steps for configuring the LDAP server. Figure 3-54 Enable Network Contacts section 3. Click the arrow next to Sync schedule. The screen expands to show sync options. 4. Select a replication schedule from the Sync drop-down menu. Click Sync Now to replicate now. The Last Replication text box displays the last time the LDAP address book was replicated. Personal address books The Personal address book feature is automatically activated when users are authenticated at the device. The feature allows users to access and maintain a Personal address book from the front panel of any devices connected to the same DSS server. An administrator can manage the contents of the Personal address books using the Address Book Management tab in the Configuration Utility. Exchange contacts The Exchange Contacts feature allows users to access their Microsoft Exchange Contacts from the front panel of devices. The feature must be activated in the DSS Configuration Utility. Users have read only access to the Exchange Contacts – entries added from the front panel of the device go into the Personal address book. ENWW Configuration 95 Guest address book The Guest address book is always available to all devices and cannot be disabled. This address book is used to store addresses added by un-authenticated users ("guests") from the front panel of devices. Public address book The Public address book is always available to all devices and cannot be disabled. An administrator can use the Address Book Management tab in the Configuration Utility to manage the contents of the address book. When enabled any address book entries added from the front panel of devices by un-authenticated users will be put into the Public address book – and thereby be available to all other devices connected to the same DSS server. Use the Public Address Book when certain e‑mail addresses and/or fax numbers need to be available to all devices. LDAP replication The LDAP Replication feature is designed to off-load LDAP servers by replicating the information into the DSS address book at a schedule set by the administrator. The address book information replicated from LDAP is stored in a dedicated, read-only and hidden address book. The configuration settings for LDAP Replication are very similar to those for LDAP Addressing. The administrator needs to supply the address/name of the LDAP server, which port to connect to, the "bind" method and credentials, as well as the "search root" (search context) and attribute settings. LDAP filters When doing an LDAP search, users and groups will appear in the result found. To be able to filter the LDAP search, follow these steps. 1. Open the Configuration Utility, and then click the Device Configuration tab 2. Click to select the device that you would like to filter. Click Configure Devices. NOTE: If all the devices need this filter, configure one and then copy the configuration to the other devices. 3. 96 The Configure Devices dialog box appears. Click the Addressing subtab. Chapter 3 Installation and configuration ENWW 4. Click to select the Enable Network Contacts (use LDAP server) check box, and then click the arrow next to LDAP Database Search Settings (Step 3). Figure 3-55 The LDAP Database Search Settings section 5. In the LDAP Filter condition text box, type in the syntax to filter the LDAP search. To exclude the groups setting for Exchange 5.5, the filter would be (! (objectclass=groupofnames)). Other e‑mail settings could include but not limited to the following: 6. ● iPlanet: (!(objectclass=groupofuniquenames)) ● Active Directory: (!(objectclass=group)) Click Apply. Configure DSS for Windows Active Directory Services You must install the Digital Sending Software and ensure that the Digital Sending Service is running before you can configure the software for the Windows Active Directory environment. Configure Authentication Follow these steps to configure Authentication for the Windows Active Directory environment. 1. ENWW Open the DSS Configuration Utility and click on the Authentication tab. Configuration 97 2. Click to select the Enable Authentication check box, and then select Microsoft Windows from the Authentication Method drop-down menu. Figure 3-56 Authentication tab 3. Type in the domain name in the Trusted Domains text box, and then click Add. 4. In the Test Windows Sign In section, select the domain from the Domain drop-down menu, and then type in the username and password for an authenticated user in the Username and Password text boxes. Click Test to test the credentials. 5. Click Apply. Configure Addressing Devices configured to use the Digital Sending Software can be configured to use one of two different types of address books: (1) an address book that resides on the server on which the Digital Sending Software is installed, and (2) the Global Address List (GAL) that exists as data in Active Directory. You can only configure a device to use one of these addressing methods at a time. In option one, the Digital Sending Software can be configured to periodically export data from the Global Address List to the service-based address book. Or, by using the Address Book Manager (an optional component of the Digital Sending Software) administrators can create recipients by entering names and e‑mail addresses or can import lists of recipients in several popular formats. In either case, devices perform queries of the service-based address book as users enter a recipient's e‑mail address at the control panel of the device. Option one has the advantage that NTLM can be used to "bind" (authenticate) to the Active Directory server. Option two only provides Simple authentication. 98 Chapter 3 Installation and configuration ENWW NOTE: NTLM authentication can be used as the bind method for option one. Option two only provides Simple authentication. If Simple is chosen, the username and password are transmitted over the network as ‘cleartext.’ This means that this information can be read by anyone with access to the data on the network. Configure the Service-Based Address Book Follow these steps to configure the service-based address book. 1. Open the DSS Configuration Utility and click the Addressing tab. 2. Click to select the Enable Network Contacts (use LDAP server) check box. 3. In the Network Directory Server (LDAP) Step 1 section, type in the IP address or Hostname of the Domain Controller or Global Catalog Server in the LDAP Server Address text box. NOTE: If the Global Catalog Server is used, the default LDAP port must be changed to 3268. 4. In the Server Authentication Requirements (Step 2) section, click to select the Server requires authentication option, and then select NTLM from the drop-down menu. 5. Type the credentials of an authenticated user into the Username, Password, and Domain text boxes. 6. In the Sync Schedule section, select the replication frequency. 7. Click Apply. Configure individual devices to connect to the LDAP interface of Active Directory 1. Open the DSS Configuration Utility, and then click the Device Configuration tab. 2. Click to select the device you want to configure, and then click Configure Device. 3. Click the Authentication subtab. Set the Authentication Method to Microsoft Windows. 4. Set the Login Method to Simple. 5. Type in the credentials of an authenticated user into the Username, Password, and Domain text boxes. 6. Type the IP Address or Hostname of the Domain Controller or Global Catalog Server. 7. Make sure the LDAP Database is Alphabetized check box is not selected. When configuring for Active Directory Services, in most cases, having this check box selected will cause names shown in the list of matching names to not appear in alphabetical order. 8. Click Apply. DSS templates DSS templates are collections of device configuration settings that can be applied to individual products or groups of products. Templates configure a product’s settings at the time that they are applied to the product. There is no automated mechanism to maintain a product’s settings to match a template. A product’s settings can change after a template has been applied due to manual editing or the application of different template(s). DSS template types are divided into the two following product-family classes: ENWW Configuration 99 ● Pre-FutureSmart ● FutureSmart Pre-FutureSmart templates are derived from the configuration settings of pre-FutureSmart products. FutureSmart templates are derived from the configuration settings of FutureSmart products. For more information on creating templates, see Create a template on page 100. The Template Product Family column in the Template List area of the Template Configuration tab lists the product-family class for each template. Move your cursor over the 'i' icon to view the firmware version of the product used to create the template and the products supported by the template family. Figure 3-57 DSS template family firmware and supported products view This section contains the following topics: ● Create a template ● Use the Template Configuration tab to manage templates ● Apply a template Create a template Create a DSS template: 1. Click the Device Configuration tab. 2. Select a product from the Device List area. 3. Right-click the selected product, and then click Create Template from the menu. 4. Type a name for the template in the Name field. 5. Type a description for the template in the Description field. NOTE: The Configurable Features section of this dialog window is read-only when creating a template. 100 Chapter 3 Installation and configuration ENWW 6. Click the OK button to complete the creation of the template. 7. Check the template to be sure there are no issues. To check for issues, configure the template and make sure none of the tabs within the template show an exclamation mark (!) next to the tab name. If an exclamation mark is present, go to that tab and fix the problem, and then save the changes. See Configure a template on page 105 for information on configuring templates. NOTE: New templates can have issues if the settings copied from the device are incomplete or conflict with other settings. For example, if a device is configured to send faxes via its internal modem but no Country/Region is configured. A second source of template issues can occur because, due to security controls, passwords cannot be retrieved from FutureSmart devices. For example, if a device has a quickset that requires a password, then when the template is first created it will need a password for that quickset but no password will be present. FutureSmart templates require that passwords that exist on the device when a template is created be re-entered into the template after the template is created. Failure to correct template issues such as these will result in errors when trying to apply the template to devices. After a template is created, it becomes available for editing on the Template Configuration tab and can be applied to products present on the Device Configuration tab. For more information on applying templates, see Apply a template on page 105. Use the Template Configuration tab to manage templates Use the Template Configuration tab to view and edit DSS templates and template groups. ENWW Configuration 101 Figure 3-58 DSS Template Configuration tab 1 2 Table 3-22 DSS Template Configuration tab Callout Component Description 1 Template Groups A list of the template groups defined on the DSS server. 2 Template List A list of the templates defined on the DSS server. Template groups The Template Groups area of the Template Configuration tab allows you to create, organize, and group templates for application to products. Create a template group Use the following steps to create a template group: 1. Click the Add Group... button in the Template Groups area. 2. Type a name for the group in the Group Name field. 3. Click the OK button to save the group. Template groups can be nested beneath other template groups. To nest an existing template group, drag and drop the group onto another group. To create a nested template group, select an existing group before creating the new group. The new template group will be created beneath the selected existing group. 102 Chapter 3 Installation and configuration ENWW Figure 3-59 DSS template groups 1 2 3 Table 3-23 DSS template groups Callout Component Description 1 Nested template groups A list of the nested template groups defined on the DSS server. 2 Templates contained in the nested group A list of the templates defined in a nested template group on the DSS server. 3 Apply Order Lists the order of application of templates in a group. Add a template to a group ▲ Select one or more templates from the Template List area. Right-click the selected template(s), select Add to Group, and then click the group to add the template(s). -orDrag and drop the template(s) onto the group in the Template Groups area. The templates in a group are given an order of application for when they are applied to a product. This order of application is listed in the group's Apply Order column. The apply order for a template group designates the order in which templates in the group, and their associated device settings, are applied to a product. The template with the greatest numerical apply order value is applied last. For example, if two templates in the same group both have send to folder settings defined, the send to folder settings defined in the template with the higher numerical apply order value will take precedence. However, a template with a lower numerical apply order value may have a group of settings not defined in templates with higher apply order values. In this case, that group of settings would be part of the overall settings applied to the selected product. ENWW Configuration 103 The following table is a scaled down example of template application ordering and settings precedence. Table 3-24 Template groups apply order example Template example Apply order Settings Template A 1 Send to folder ● Default Color Preference: Black/Gray ● Default Resolution: 600 dpi General ● Template B Final net settings 2 Template A + Template B Template B takes precedence for common settings. Settings in Template A, but not in Template B, are included. Name: Admin Send to folder ● Default Color Preference: Color ● Default Resolution: 200 dpi Send to folder ● Default Color Preference: Color ● Default Resolution: 200 dpi General ● Name: Admin Use the Remove Group... and Rename buttons to remove or rename groups in the Template Groups area. Template list The Template List area of the Template Configuration tab lists all the available templates on the DSS server. DSS templates can be edited, copied, removed, and configured in this area. Edit a template Use the following steps to edit a template: 1. Select a template from the Template List area. 2. Click the Edit Template... button. 3. Change the Name, Description, or Configurable Features settings for the template. 4. Click the OK button to save your changes. Copy a template The copy template functionality allows you to create a new template, with a unique name, based on an existing template. When creating a copy of a template, the Configurable Features defined in the source template may be changed for the new template. 104 Chapter 3 Installation and configuration ENWW NOTE: The model number and firmware version of the product used to create the original template are available on the Information tab of the copied template. 1. Select a template from the Template List area to copy. 2. Click the Copy Template... button. 3. Enter a unique name for the copied template in the Name field. NOTE: Copied templates cannot be saved with the name of an existing template. 4. Enter a description for the template in the Description field. 5. Select, or de-select, any features in the Configurable Features area. 6. Click the OK button to save the copied template. Remove a template Use the following steps to remove a template from the DSS server: 1. Select a template from the Template List area. 2. Click the Remove Template... button. 3. Click the Yes button in the dialog window to confirm the removal of the template. NOTE: The template is also removed from any groups it has been associated with. Configure a template The configure template option allows specific changes to be made to a template's settings. Clicking the Configure Template button opens a set of tabs containing tabs for each configurable feature specified in the template settings. For example, if the Send to Folder feature has been checked in the Configurable Features area of the template, the Send to Folder settings tab will be available for editing in the Configure Template subtab set. Use the following steps to configure a template: 1. Select a template from the Template List area. 2. Click the Configure Template... button. 3. Edit the template settings. 4. Click the Apply button. 5. Click the OK button. Apply a template A DSS-enabled product can have either individual templates or template groups applied to it. Templates and template groups can also be applied to device groups. Use the following steps to apply templates to a product: ENWW Configuration 105 1. Click the Device Configuration tab. 2. Select a device from the Device List. 3. Right-click the selected device. 4. Choose Apply Template to apply a single template to the device, or choose Apply Template Group to apply a template group to the device. The Template Apply Summary window displays, listing the specific details of the template application process. The Description column lists whether the template or template group was successfully applied. Template settings can be overridden by changes to the product settings made at the product controlpanel. If the settings in a template are not being applied as expected, it might be necessary to reapply the template to the product. External Database Configuration The primary means for configuring DSS to use an external database, which is any database other than the one DSS installs by default, is during installation. It is also possible to change the database that DSS uses, either from the default database to an external database, or from one external database to another, after software installation. This is done by running a utility that allows the administrator to change the connection string that DSS uses to connect to its database. This must only be done with CAREFUL CONSIDERATION of the following point: ● Data that exists in the database which DSS is currently using will be lost and not transferred to the new database. This includes, but is not limited to, DSS address books and job logs. To change the database connection string after installation: 1. Run the utility \scripts\ExternalDbConfigurationUtility \Hp.Dss.Utility.ExternalDbConfiguration.exe This utility provides the same UI for setting the database connection string as seen during installation. See step seven of Installer screens and options on page 37 for instructions. 2. Stop and then re-start the DSS service 3. Remove all the FutureSmart devices from DSS, and then add them back to DSS. 106 Chapter 3 Installation and configuration ENWW 4 Support and troubleshooting This chapter contains the following topics: ENWW ● Obtaining support ● DSS error messages 107 Obtaining support This section contains the following topics: ● HP Customer Care service and support ● Finding documentation and other supporting information ● Using Internet support HP Customer Care service and support HP provides free phone support for Digital Sending Software. The support is provided by the HP LaserJet support organization. For contact numbers, please visit www.hp.com/support. Finding documentation and other supporting information The following table outlines the source for, and description of, the information that is available about issues that can arise when using HP DSS. Table 4-1 Sources of information Source Description Device online Help system DSS-enabled devices feature an online Help system that provides instructions for resolving common problems. To use Help, press ? on the control panel. DSS event log The event log is a list of major events that DSS encounters. It can be accessed by navigating to the Log tab of the DSS Configuration Utility. Two logs can be viewed: ● The Configuration Utility Log tab shows general log messages for DSS. ● In the Device Configuration section of the Configuration Utility, a second Log tab shows log messages that are specific to the selected device. See the Help file for the Configuration Utility for a list of messages and recommended actions. Windows Event Viewer messages The Windows Application Event log and System Event log can provide significant information for issue resolution. Both logs may contain some information logged by DSS, as well as information logged by other applications, that can point to the causes of DSS behavior Control-panel messages Messages appear on the device control panel to report Digital Sending problems. Configuration Utility messages Messages appear in the Configuration Utility when problems occur. Alert notifications E‑mail alert notifications can be sent when Digital Sending problems occur. Administrators can configure DSS to send alert e-mails on the General tab of the Configuration Utility. Using Internet support Information about the software and all documentation can be found at the following Website: www.hp.com/support/dss 108 Chapter 4 Support and troubleshooting ENWW DSS error messages Select the Notify administrator of critical error check box on the General tab of the Configuration Utility to receive e‑mail messages when critical errors occur. The subject line of these e‑mail messages reads: Digital Sending Software – Critical Error Notification. The e‑mail message body reads as follows: "The Digital Sending Software server [server TCP/IP] incurred a critical error [error message]. This error might require administrative action." This section lists some of the critical-error messages that might be sent. Table 4-2 Critical error messages ENWW Error Message Suggested Actions Insufficient disk space to allow job Check available disk space on the DSS server. In some high-usage environments where numerous devices are configured in DSS, several gigabytes of free disk space might be required during peak usage periods. A notification message was not printed on the [device TCP/ IP] printer Verify that DSS can communicate with the device that is indicated in the message. Address Book checking terminated with a severe corruption indication Call HP Support or an authorized service provider. The Address Book might need to be rebuilt. The SMTP server didn't accept the e‑mail message because it was too big Reduce the e‑mail size limit in DSS to a number less than the limit that is configured at the SMTP server. A disk file was not downloaded to the [device IP] printer Remove the device (indicated by the TCP/IP address) and add the device back again to DSS. DSS error messages 109 110 Chapter 4 Support and troubleshooting ENWW Index A Address Book Manager (ABM) 90 importing addresses 91 addressing Address Book Manager (ABM) 90 configuring address books 91 Exchange contacts 95 guest address books 96 LDAP filters 96 LDAP replication 96 personal address books 95 public address books 96 authentication device settings 63 LDAP server 57 Microsoft Windows 60 C checklist, installation 37 Configuration Utility add devices to a device group 56 add licenses 46 adding devices 52 Addressing tab 90 authentication 57 authentication methods 57 Authentication tab 57 auto-generate licenses 48 Configure Devices tab 63 create a device group 56 device addressing settings 65 device configuration 54, 63 Device Configuration tab 50 device default settings 66 device list, overview 55 device log settings 66 ENWW device management 50 device settings 54, 63 general device settings 64 licensing 46 Log tab 66 Preferences tab 66 remote version 13 remove devices from a device group 57 remove licenses 47 removing devices 53 Send to Fax settings 74 Send to Folder settings 67, 71 Send to Workflow settings 78 settings 12 using the Configuration Utility 45 D database data structures 17 technical overview 15 device firmware requirements 28 hardware requirements 26 software requirements 24 devices supported devices 5 digital sending Digital Sending Software (DSS) 6 Embedded Digital Sending 6 types 6 Digital Sending Software 6 advantages 3 Configuration Utility 12 database 15 differences with Web Jetadmin 9 DSS service 13 enabled devices 14 local data store 16 using the Configuration Utility 45 Windows Active Directory Services settings 97 documentation 108 drivers, install license agreement 38 DSS. See Digital Sending Software E error messages 109 Exchange contacts 95 F fax internet 16 LAN 16 firmware requirements 28 G guest address books 96 H hardware requirements 26 help HP Customer Care 108 online 108 Web 108 HP Website 108 I installation planning 24 pre-installation checklist 37 Index 111 requirements 24 settings 37 using the installer 37 internet site, HP 108 IRIS OCR engine 14 L LDAP filters 96 LDAP replication 96 LDAP server authentication 57 licensing 17 add 46 auto-generate 48 auto-generate license 18 remove 47 requirements 18 trial 18 logs types of 108 M messages types of 108 Microsoft Windows authentication 60 T troubleshooting error messages 109 O online help 108 P personal address books 95 ports requirements 30 printing-system software, install license agreement 38 public address books 96 R Remote Configuration Utility requirements firmware 28 hardware 26 licensing 18 ports 30 software 24 Send to Fax compatible fax programs 75 device settings 78 DSS settings 75 Send to Folder device settings 71 DSS settings 67 Send to Workflow device settings 89 DSS settings 79 menu structure 79 settings Configuration Utility 12 software requirements 24 software license agreement 38 support documents 108 HP Customer Care 108 Web 108 supported devices 5 W Website, HP 108 Windows Active Directory Services addressing settings 98 authentication settings 97 13 S Send to E‑mail device settings 74 DSS settings 71 112 Index ENWW © 2014 Hewlett-Packard Development Company, L.P. www.hp.com
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Author : HP LaserJet Content Design & Delivery Create Date : 2014:03:13 09:26:13-06:00 Keywords : Edition 3, 3/2014 Modify Date : 2014:04:07 13:16:39-06:00 XMP Toolkit : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26 Creator Tool : AH Formatter V5.1 R1 (5,1,2009,0914) for Windows Metadata Date : 2014:04:07 13:16:39-06:00 Format : application/pdf Creator : HP LaserJet Content Design & Delivery Title : HP Digitial Sending Software 5.0 Subject : Edition 3, 3/2014 Producer : Acrobat Distiller 11.0 (Windows) Document ID : uuid:ecadd968-e480-443e-b721-191be053e11b Instance ID : uuid:f99ea181-8e96-4ea2-b678-1120c1238ebf Page Layout : SinglePage Page Mode : UseOutlines Page Count : 122EXIF Metadata provided by EXIF.tools